{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:24:09Z","timestamp":1768069449470,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/infcom.2011.5935064","type":"proceedings-article","created":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T10:59:10Z","timestamp":1310036350000},"page":"2426-2434","source":"Crossref","is-referenced-by-count":21,"title":["Long PN code based DSSS watermarking"],"prefix":"10.1109","author":[{"given":"Junwei","family":"Huang","sequence":"first","affiliation":[]},{"given":"Xian","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"ref11","article-title":"Sleepy watermark tracing: An active network-based intrusion response framework","author":"wang","year":"2001","journal-title":"Proceedings of 16th International Conference on Information Security (IFIP\/Sec)"},{"key":"ref12","article-title":"Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays","author":"wang","year":"2003","journal-title":"Proceedings of the 2003 ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102133","article-title":"Tracking anonymous peer-to-peer voip calls on the internet","author":"wang","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer Communications Security (CCS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.28"},{"key":"ref15","article-title":"Multi-flow attacks against network flow watermarking schemes","author":"kiyavash","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.80"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.30","article-title":"Network flow watermarking attack on low-latency anonymous communication systems","author":"wang","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_15"},{"key":"ref19","author":"peterson","year":"1972","journal-title":"Error-Correcting Codes"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062144"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.14","article-title":"Dsss-based flow marking technique for invisible traceback","author":"yu","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P)"},{"key":"ref6","article-title":"On flow correlation attacks and countermeasures in mix networks","author":"zhu","year":"2004","journal-title":"Proceedings of Workshop on Privacy Enhancing Technologies (PET)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"ref8","article-title":"Low-cost traffic analysis of tor","author":"murdoch","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (S&P)"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-27809-2_25","article-title":"Timing attacks in low-latency mix-based systems","author":"levine","year":"2004","journal-title":"Proceedings of Financial Cryptography (FC)"},{"key":"ref2","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref1","year":"2010"},{"key":"ref9","article-title":"On flow marking attacks in wireless anonymous communication networks","author":"fu","year":"2005","journal-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)"},{"key":"ref20","author":"lee","year":"2002","journal-title":"Spread Spectrum CDMA IS-95 and IS-2000 for RF Communications"},{"key":"ref21","author":"oppenheim","year":"1997","journal-title":"Signals and Systems"}],"event":{"name":"IEEE INFOCOM 2011 - IEEE Conference on Computer Communications","location":"Shanghai, China","start":{"date-parts":[[2011,4,10]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888673\/5934870\/05935064.pdf?arnumber=5935064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T22:56:22Z","timestamp":1497912982000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5935064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/infcom.2011.5935064","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}