{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:54:51Z","timestamp":1776887691491,"version":"3.51.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162914","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"74-79","source":"Crossref","is-referenced-by-count":25,"title":["Identification of Encrypted Video Streaming Based on Differential Fingerprints"],"prefix":"10.1109","author":[{"given":"Hua","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhenhua","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Shuyi","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879616"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647508"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3210445.3210448"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872932"},{"key":"ref17","article-title":"Towards a Framework for Classifying YouTube QoE Based on Monitoring of Encrypted Traffic","author":"orsolic","year":"0","journal-title":"International Young Researcher Summit on Quality of Experience in Emerging Multimedia Services (QEEMS 2017)"},{"key":"ref18","first-page":"1","article-title":"Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks","author":"pan","year":"0","journal-title":"Quality of Service (IWQoS) 2016 IEEE\/ACM 24th Int Symposium on IEEE"},{"key":"ref19","author":"dierks","year":"2008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2906568"},{"key":"ref6","author":"stikkelorum","year":"2017","journal-title":"I know what you watched Fingerprint attack on youtube video streams"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444944"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04279"},{"key":"ref7","first-page":"1357","article-title":"Beauty and the burst: Remote identification of encrypted video streams","author":"schuster","year":"0","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486211"},{"key":"ref1","year":"0","journal-title":"Cisco Visual Networking Index Forecast and Trends"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,7,6]]},"end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162914.pdf?arnumber=9162914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:08Z","timestamp":1656453368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162914","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}