{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:41:50Z","timestamp":1760420510954,"version":"build-2065373602"},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,22]]},"DOI":"10.1109\/icnp65844.2025.11192369","type":"proceedings-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T17:38:54Z","timestamp":1760377134000},"page":"1-2","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Generative Resilient Network Architecture in Untrusted Network Environments"],"prefix":"10.1109","author":[{"given":"Haisong","family":"Bi","sequence":"first","affiliation":[{"name":"Fudan University,China"}]},{"given":"Jin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Fudan University,China"}]},{"given":"Kun","family":"Qiu","sequence":"additional","affiliation":[{"name":"Fudan University,China"}]},{"given":"Tiezhen","family":"Jia","sequence":"additional","affiliation":[{"name":"Songshan Laboratory,Zhengzhou,China"}]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Songshan Laboratory,Zhengzhou,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"753","article-title":"Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670272"},{"key":"ref3","first-page":"2689","article-title":"Fingerprinting obfuscated proxy traffic with encapsulated tls handshakes","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Xue"},{"key":"ref4","first-page":"3381","article-title":"How great is the great firewall? measuring china\u2019s dns censorship","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Hoang"},{"key":"ref5","first-page":"2617","article-title":"Gfweb: Measuring the great firewall\u2019s web censorship at scale","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Hoang"},{"article-title":"Detecting and evading censorship-in-depth: A case study of iran\u2019s protocol whitelister","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bock","key":"ref6"}],"event":{"name":"2025 IEEE 33rd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2025,9,22]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2025,9,25]]}},"container-title":["2025 IEEE 33rd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11192357\/11192322\/11192369.pdf?arnumber=11192369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:10:34Z","timestamp":1760418634000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11192369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/icnp65844.2025.11192369","relation":{},"subject":[],"published":{"date-parts":[[2025,9,22]]}}}