{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:54:53Z","timestamp":1776887693261,"version":"3.51.2"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s11432-024-4474-6","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T01:26:47Z","timestamp":1760405207000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dive into streaming: efficient identification of encrypted dynamic DASH video traffic"],"prefix":"10.1007","volume":"69","author":[{"given":"Xiyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zheyuan","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yiyang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"4474_CR1","series-title":"Sandvine Technical Report","first-page":"4","volume-title":"2024 Global Internet Phenomena Report","author":"Sandvine","year":"2024","unstructured":"Sandvine. 2024 Global Internet Phenomena Report. Sandvine Technical Report. 2024. 4\u20135"},{"key":"4474_CR2","volume-title":"Ericsson Mobility Report Data and Forecasts. Analysis of Traffic Profiles","author":"Ericsson","year":"2023","unstructured":"Ericsson. Ericsson Mobility Report Data and Forecasts. Analysis of Traffic Profiles. 2023"},{"key":"4474_CR3","volume-title":"Adolescences","author":"M Hattingh","year":"2021","unstructured":"Hattingh M. The dark side of YouTube: a systematic review of literature. In: Adolescences. London: IntechOpen, 2021"},{"key":"4474_CR4","first-page":"1107","volume-title":"Proceedings of IEEE Annual Consumer Communications & Networking Conference","author":"A Reed","year":"2016","unstructured":"Reed A, Klimkowski B. Leaky streams: identifying variable bitrate dash videos streamed over encrypted 802.11n connections. In: Proceedings of IEEE Annual Consumer Communications & Networking Conference, 2016. 1107\u20131112"},{"key":"4474_CR5","first-page":"361","volume-title":"Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy","author":"A Reed","year":"2017","unstructured":"Reed A, Kranch M J. Identifying https-protected Netflix videos in real-time. In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017. 361\u2013368"},{"key":"4474_CR6","first-page":"1538","volume-title":"Proceedings of IEEE Conference on Computer Communications","author":"J Gu","year":"2018","unstructured":"Gu J, Wang J, Yu Z, et al. Walls have ears: traffic-based side-channel attack in video streaming. In: Proceedings of IEEE Conference on Computer Communications, 2018. 1538\u20131546"},{"key":"4474_CR7","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/TNET.2019.2906568","volume":"27","author":"J Gu","year":"2019","unstructured":"Gu J, Wang J, Yu Z, et al. Traffic-based side-channel attack in video streaming. IEEE ACM Trans Netwing, 2019, 27: 972\u2013985","journal-title":"IEEE ACM Trans Netwing"},{"key":"4474_CR8","first-page":"74","volume-title":"Proceedings of IEEE Conference on Computer Communications Workshops","author":"H Wu","year":"2020","unstructured":"Wu H, Yu Z, Cheng G, et al. Identification of encrypted video streaming based on differential fingerprints. In: Proceedings of IEEE Conference on Computer Communications Workshops, 2020. 74\u201379"},{"key":"4474_CR9","doi-asserted-by":"publisher","first-page":"103623","DOI":"10.1016\/j.cose.2023.103623","volume":"137","author":"X Zhang","year":"2024","unstructured":"Zhang X, Xiong G, Li Z, et al. Traffic spills the beans: a robust video identification attack against YouTube. Comput Secur, 2024, 137: 103623","journal-title":"Comput Secur"},{"key":"4474_CR10","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/TIFS.2017.2730819","volume":"12","author":"R Dubin","year":"2017","unstructured":"Dubin R, Dvir A, Pele O, et al. I know what you saw last minute encrypted HTTP adaptive video streaming title classification. IEEE Trans Inform Forensic Secur, 2017, 12: 3039\u20133049","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4474_CR11","first-page":"283","volume-title":"Proceedings of the 16th International Conference on Mobility, Sensing and Networking","author":"L Yang","year":"2020","unstructured":"Yang L, Fu S, Luo Y, et al. Markov probability fingerprints: a method for identifying encrypted video traffic. In: Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020. 283\u2013290"},{"key":"4474_CR12","volume-title":"Proceedings of ACM Multimedia","author":"W Tang","year":"2024","unstructured":"Tang W, Li J, Du M, et al. Zenith: real-time identification of DASH encrypted video traffic with distortion. In: Proceedings of ACM Multimedia, 2024"},{"key":"4474_CR13","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-981-97-5028-3_21","volume-title":"Proceedings of Australasian Conference on Information Security and Privacy","author":"H Zhao","year":"2024","unstructured":"Zhao H, Wu H, Bian X, et al. Unveiling the unseen: video recognition attacks on social software. In: Proceedings of Australasian Conference on Information Security and Privacy, 2024. 412\u2013432"},{"key":"4474_CR14","first-page":"1357","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"R Schuster","year":"2017","unstructured":"Schuster R, Shmatikov V, Tromer E. Beauty and the burst: remote identification of encrypted video streams. In: Proceedings of the 26th USENIX Security Symposium, 2017. 1357\u20131374"},{"key":"4474_CR15","first-page":"1","volume-title":"Proceedings of IEEE International Symposium on Network Computing and Applications","author":"Y Li","year":"2018","unstructured":"Li Y, Huang Y, Xu R, et al. Deep content: unveiling video streaming content from encrypted wifi traffic. In: Proceedings of IEEE International Symposium on Network Computing and Applications, 2018. 1\u20138"},{"key":"4474_CR16","first-page":"1","volume-title":"Proceedings of International Conference on Frontiers of Information Technology","author":"M Khan","year":"2021","unstructured":"Khan M, Bukhari S, Khan S, et al. ISP can identify YouTube videos that you just watched. In: Proceedings of International Conference on Frontiers of Information Technology, 2021. 1\u20136"},{"key":"4474_CR17","doi-asserted-by":"publisher","first-page":"350","DOI":"10.3390\/electronics11030350","volume":"11","author":"M U S Khan","year":"2022","unstructured":"Khan M U S, Bukhari S M A H, Maqsood T, et al. SCNN-attack: a side-channel attack to identify YouTube videos in a VPN and non-VPN network traffic. Electronics, 2022, 11: 350","journal-title":"Electronics"},{"key":"4474_CR18","first-page":"1307","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"S Bae","year":"2022","unstructured":"Bae S, Son M, Kim D, et al. Watching the watchers: practical video identification attack in LTE networks. In: Proceedings of the 31st USENIX Security Symposium, 2022. 1307\u20131324"},{"key":"4474_CR19","volume-title":"Proceedings of Symposium on Networked Systems Design and Implementation","author":"Z Song","year":"2023","unstructured":"Song Z, Chen K, Sarda N, et al. HALP: Heuristic aided learned preference eviction policy for YouTube content delivery network. In: Proceedings of Symposium on Networked Systems Design and Implementation, 2023"},{"key":"4474_CR20","first-page":"1","volume-title":"Proceedings of the 22nd International Conference on Computer Communication and Networks (ICCCN)","author":"L Chen","year":"2013","unstructured":"Chen L, Zhou Y, Chiu D M. Video browsing\u2014a study of user behavior in online VoD services. In: Proceedings of the 22nd International Conference on Computer Communication and Networks (ICCCN), 2013. 1\u20137"},{"key":"4474_CR21","doi-asserted-by":"publisher","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","volume":"183\u2013184","author":"G Aceto","year":"2021","unstructured":"Aceto G, Ciuonzo D, Montieri A, et al. DISTILLER: encrypted traffic classification via multimodal multitask deep learning. J Netw Comput Appl, 2021, 183\u2013184: 102985","journal-title":"J Netw Comput Appl"},{"key":"4474_CR22","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TNSM.2021.3071441","volume":"18","author":"T Shapira","year":"2021","unstructured":"Shapira T, Shavitt Y. FlowPic: a generic representation for encrypted traffic classification and applications identification. IEEE Trans Netw Serv Manage, 2021, 18: 1218\u20131232","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4474_CR23","first-page":"80","volume-title":"Proceedings of IEEE International Performance, Computing, and Communications Conference","author":"S Liu","year":"2022","unstructured":"Liu S, Zhang L, Sun P, et al. Video traffic identification with a distribution distance-based feature selection. In: Proceedings of IEEE International Performance, Computing, and Communications Conference, 2022. 80\u201386"},{"key":"4474_CR24","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TNSM.2020.3036497","volume":"17","author":"S Wassermann","year":"2020","unstructured":"Wassermann S, Seufert M, Casas P, et al. ViCrypt to the rescue: real-time, machine-learning-driven video-QoE monitoring for encrypted streaming traffic. IEEE Trans Netw Serv Manage, 2020, 17: 2007\u20132023","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4474_CR25","first-page":"1","volume-title":"Proceedings of IEEE\/ACM International Symposium on Quality of Service","author":"M Shen","year":"2020","unstructured":"Shen M, Zhang J, Xu K, et al. DeepQoE: real-time measurement of video QoE from encrypted traffic with deep learning. In: Proceedings of IEEE\/ACM International Symposium on Quality of Service, 2020. 1\u201310"},{"key":"4474_CR26","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TNSM.2019.2924942","volume":"16","author":"T Mangla","year":"2019","unstructured":"Mangla T, Halepovic E, Ammar M, et al. Using session modeling to estimate HTTP-based video QoE metrics from encrypted network traffic. IEEE Trans Netw Serv Manage, 2019, 16: 1086\u20131099","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4474_CR27","first-page":"1928","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"P Sirinam","year":"2018","unstructured":"Sirinam P, Imani M, Juarez M, et al. Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018. 1928\u20131943"},{"key":"4474_CR28","first-page":"1171","volume-title":"Proceedings of IEEE Conference on Computer Communications","author":"C Liu","year":"2019","unstructured":"Liu C, He L, Xiong G, et al. FS-Net: a flow sequence network for encrypted traffic classification. In: Proceedings of IEEE Conference on Computer Communications, 2019. 1171\u20131179"},{"key":"4474_CR29","first-page":"633","volume-title":"Proceedings of the ACM Web Conference","author":"X Lin","year":"2022","unstructured":"Lin X, Xiong G, Gou G, et al. Et-bert: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference, 2022. 633\u2013642"},{"key":"4474_CR30","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","volume":"31","author":"P Lin","year":"2023","unstructured":"Lin P, Ye K, Hu Y, et al. A novel multimodal deep learning framework for encrypted traffic classification. IEEE ACM Trans Netwing, 2023, 31: 1369\u20131384","journal-title":"IEEE ACM Trans Netwing"},{"key":"4474_CR31","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2022.04.018","volume":"601","author":"Z Niu","year":"2022","unstructured":"Niu Z, Xue J, Qu D, et al. A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. Inf Sci, 2022, 601: 162\u2013174","journal-title":"Inf Sci"},{"key":"4474_CR32","doi-asserted-by":"publisher","first-page":"103143","DOI":"10.1016\/j.cose.2023.103143","volume":"128","author":"Z Wang","year":"2023","unstructured":"Wang Z, Thing V L L. Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. Comput Secur, 2023, 128: 103143","journal-title":"Comput Secur"},{"key":"4474_CR33","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand T, Sullivan G J, Bjontegaard G, et al. Overview of the H.264\/AVC video coding standard. IEEE Trans Circuits Syst Video Technol, 2003, 13: 560\u2013576","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4474_CR34","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3325867.3325873","volume":"22","author":"T Zhang","year":"2019","unstructured":"Zhang T, Mao S. An overview of emerging video coding standards. GetMobile-Mobile Comp Comm, 2019, 22: 13\u201320","journal-title":"GetMobile-Mobile Comp Comm"},{"key":"4474_CR35","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/JPROC.2021.3058584","volume":"109","author":"J Han","year":"2021","unstructured":"Han J, Li B, Mukherjee D, et al. A technical overview of AV1. Proc IEEE, 2021, 109: 1435\u20131462","journal-title":"Proc IEEE"},{"key":"4474_CR36","volume-title":"Information technology-coding of audio-visual objects part 14: MP4 file format","author":"ISO\/IEC","year":"2020","unstructured":"ISO\/IEC. Information technology-coding of audio-visual objects part 14: MP4 file format. International Organization for Standardization. 2020. 14496-14"},{"key":"4474_CR37","first-page":"1","volume-title":"Proceedings of the 21st International Workshop on Network and Operating Systems Support for Digital Audio and Video","author":"J Bankoski","year":"2011","unstructured":"Bankoski J. Intro to WebM. In: Proceedings of the 21st International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2011. 1\u20132"},{"key":"4474_CR38","volume-title":"Information technology-dynamic adaptive streaming over HTTP (DASH) part 1: media presentation description and segment formats","author":"ISO\/IEC","year":"2022","unstructured":"ISO\/IEC. Information technology-dynamic adaptive streaming over HTTP (DASH) part 1: media presentation description and segment formats. International Organization for Standardization, 2022. 23009-1"},{"key":"4474_CR39","volume-title":"Selenium: official Python bindings for Selenium WebDriver. Version 4.23.1","author":"Software Freedom Conservancy","year":"2024","unstructured":"Software Freedom Conservancy. Selenium: official Python bindings for Selenium WebDriver. Version 4.23.1. 2024"},{"key":"4474_CR40","volume-title":"Mitmproxy: a free and open source interactive HTTPS proxy. Version 10.4","author":"A Cortesi","year":"2024","unstructured":"Cortesi A, Hils M, Kriechbaumer T. Mitmproxy: a free and open source interactive HTTPS proxy. Version 10.4. 2024"},{"key":"4474_CR41","volume-title":"Tshark: terminal-based Wireshark. Version 4.2.6","author":"Wireshark Foundation","year":"2024","unstructured":"Wireshark Foundation. Tshark: terminal-based Wireshark. Version 4.2.6. 2024"},{"key":"4474_CR42","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/3651863.3651883","volume-title":"Proceedings of the 34th Edition of the Workshop on Network and Operating System Support for Digital Audio and Video","author":"Y Zhao","year":"2024","unstructured":"Zhao Y, Wu H, Chen L, et al. Identifying video resolution from encrypted QUIC streams in segment-combined transmission scenarios. In: Proceedings of the 34th Edition of the Workshop on Network and Operating System Support for Digital Audio and Video, 2024. 50\u201356"},{"key":"4474_CR43","volume-title":"Proceedings of Ekoparty Security Conference (EKO)","author":"J Rizzo","year":"2012","unstructured":"Rizzo J, Duong T. The CRIME attack. In: Proceedings of Ekoparty Security Conference (EKO), 2012"},{"key":"4474_CR44","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446","volume-title":"The Transport Layer Security (TLS) protocol version 1.3","author":"E Rescorla","year":"2018","unstructured":"Rescorla E. The Transport Layer Security (TLS) protocol version 1.3. RFC8446. 2018"},{"key":"4474_CR45","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JPROC.2020.2989782","volume":"108","author":"X Y Zhang","year":"2020","unstructured":"Zhang X Y, Liu C L, Suen C Y. Towards robust pattern recognition: a review. Proc IEEE, 2020, 108: 894\u2013922","journal-title":"Proc IEEE"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4474-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4474-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4474-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T03:51:05Z","timestamp":1760413865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4474-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["4474"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4474-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"8 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112304"}}