{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:02:54Z","timestamp":1740099774798,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1109\/ict49546.2020.9239491","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T21:07:10Z","timestamp":1604092030000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Traceback: Learning to Identify Website\u2019s Landing URLs via Noisy Web Traces Passively"],"prefix":"10.1109","author":[{"given":"Xiaoou","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yujia","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3068332"},{"key":"ref11","article-title":"You are how you click: Clickstream analysis for sybil detection","author":"wang","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1210"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036889"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2015-0015"},{"key":"ref16","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","author":"hayes","year":"2016","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzw041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"ref19","first-page":"295","article-title":"Towards understanding modem web traffic","author":"ihm","year":"2011","journal-title":"ACM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577032"},{"journal-title":"Applying web usage and structural mining for web-page recommendations A survey","year":"2015","author":"khede","key":"ref6"},{"journal-title":"Predicting user behavior over the web","year":"2010","author":"safadi","key":"ref5"},{"key":"ref8","article-title":"A web page prediction model based on click-stream tree representation of user behavior","author":"\u00f4giid\u00fcc\u00fc","year":"2003","journal-title":"KDD"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367617"},{"key":"ref2","first-page":"1","article-title":"Resurf: Reconstructing web-surfing activity from network traffic","author":"xie","year":"2013","journal-title":"Proceedings of the IFIP Networking 2013 Conference"},{"key":"ref1","article-title":"Towards understanding modem web traffic","author":"dim","year":"2011","journal-title":"Internet Measurement Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.60"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660268"},{"key":"ref21","first-page":"12","article-title":"Detecting and defending against third-party tracking on the web","author":"roesner","year":"2012","journal-title":"USENIX Association"}],"event":{"name":"2020 27th International Conference on Telecommunications (ICT)","start":{"date-parts":[[2020,10,5]]},"location":"Bali, Indonesia","end":{"date-parts":[[2020,10,7]]}},"container-title":["2020 27th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9239409\/9239422\/09239491.pdf?arnumber=9239491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:26:24Z","timestamp":1656375984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9239491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ict49546.2020.9239491","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]}}}