{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T10:06:57Z","timestamp":1747390017063,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11760-020-01844-8","type":"journal-article","created":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T18:03:05Z","timestamp":1609696985000},"page":"1161-1168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A natural language-inspired multilabel video streaming source identification method based on deep neural networks"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7844-6227","authenticated-orcid":false,"given":"Yan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Dezhi","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Subir","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,3]]},"reference":[{"issue":"3","key":"1844_CR1","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/08838151.2014.935854","volume":"58","author":"B Burroughs","year":"2014","unstructured":"Burroughs, B., Rugg, A.: Extending the broadcast: streaming culture and the problems of digital geographies. J. Broadcast. Electron. Media 58(3), 365\u2013380 (2014)","journal-title":"J. Broadcast. Electron. Media"},{"issue":"2","key":"1844_CR2","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans. Netw. Serv. Manag. 16(2), 445\u2013458 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"1844_CR3","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103\u2013114 (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"1844_CR4","doi-asserted-by":"crossref","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 605\u2013616 (2012)","DOI":"10.1145\/2382196.2382260"},{"key":"1844_CR5","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-Boo, I still see you: why efficient traffic analysis countermeasures fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 332\u2013346 (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"1844_CR6","doi-asserted-by":"crossref","unstructured":"Wang, T., Wang, G., Li, X., Zheng, H., Zhao, B.Y.: Characterizing and detecting malicious crowdsourcing. In: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp. 537\u2013538 (2013)","DOI":"10.1145\/2486001.2491719"},{"key":"1844_CR7","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Juarez, M., Imani, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1928\u20131943 (2018).","DOI":"10.1145\/3243734.3243768"},{"key":"1844_CR8","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website Fingerprinting at Internet Scale, pp. 21\u201324 (2017)","DOI":"10.14722\/ndss.2016.23477"},{"issue":"12","key":"1844_CR9","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/TIFS.2017.2730819","volume":"12","author":"R Dubin","year":"2017","unstructured":"Dubin, R., Dvir, A., Pele, O., Hadar, O.: I know what you saw last minute-encrypted HTTP adaptive video streaming title classification. IEEE Trans. Inf. Forensics Secur. 12(12), 3039\u20133049 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1844_CR10","doi-asserted-by":"crossref","unstructured":"Rahman, M.S., Mathews, N., Wright, M.: Poster: video fingerprinting in tor. In: Proceedings of the ACM Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3363273"},{"key":"1844_CR11","doi-asserted-by":"crossref","unstructured":"Cui, W., Chen, T., Fields, C., Chen, J., Sierra, A., Chan-Tin, E.: Revisiting assumptions for website fingerprinting attacks. In: AsiaCCS 2019\u2014Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 328\u2013339 (2019)","DOI":"10.1145\/3321705.3329802"},{"key":"1844_CR12","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandrany, P.: Secure shell (SSH) traffic analysis with flow based features using shallow and deep networks. In: 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, vol. 2017, pp. 2026\u20132032 (2017)","DOI":"10.1109\/ICACCI.2017.8126143"},{"key":"1844_CR13","doi-asserted-by":"crossref","unstructured":"Shi, Y., Biswas, S.: A deep-learning enabled traffic analysis engine for video source identification. In: 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019, pp. 15\u201321 (2019)","DOI":"10.1109\/COMSNETS.2019.8711478"},{"key":"1844_CR14","doi-asserted-by":"crossref","unstructured":"Cruz, M., Ocampo, R., Montes, I., Atienza, R.: Fingerprinting BitTorrent traffic in encrypted tunnels using recurrent deep learning. In: Proceedings\u20142017 5th International Symposium on Computing and Networking, CANDAR 2017, vol. 2018-Janua, pp. 434\u2013438 (2018)","DOI":"10.1109\/CANDAR.2017.74"},{"key":"1844_CR15","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: 2016 IEEE Workshop on Spoken Language Technology, SLT 2016\u2014Proceedings, pp. 414\u2013419 (2013)"},{"key":"1844_CR16","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, D., Dyer, C., He, X., Smola, A., Hovy, E.: Hierarchical attention networks for document classification. In: Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1480\u20131489 (2016)","DOI":"10.18653\/v1\/N16-1174"},{"key":"1844_CR17","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: EMNLP 2014\u20142014 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference, pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"1844_CR18","unstructured":"Berger, M.J.: Large scale multi-label text classification with semantic word vectors. Tech. Rep., pp. 1\u20138 (2014)"},{"key":"1844_CR19","volume-title":"OpenVPN: Building and Integrating Virtual Private Networks","author":"M Feilner","year":"2006","unstructured":"Feilner, M.: OpenVPN: Building and Integrating Virtual Private Networks. Packt Publishing, Birmingham (2006)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-020-01844-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-020-01844-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-020-01844-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T08:48:50Z","timestamp":1670662130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-020-01844-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,3]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1844"],"URL":"https:\/\/doi.org\/10.1007\/s11760-020-01844-8","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2021,1,3]]},"assertion":[{"value":"22 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}