{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:20:24Z","timestamp":1755926424310},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/iscc47284.2019.8969639","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T05:16:57Z","timestamp":1580447817000},"source":"Crossref","is-referenced-by-count":10,"title":["SignalCookie: Discovering Guard Relays of Hidden Services in Parallel"],"prefix":"10.1109","author":[{"given":"Muqian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xuebin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tingwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zelin","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2178036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"ref12","article-title":"Rainbow: A robust and invisible non-blind watermark for network flows","author":"houmansadr","year":"2009","journal-title":"NDSS"},{"key":"ref13","article-title":"Swirl: A scalable watermark to detect correlated network flows","author":"houmansadr","year":"2011","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382449"},{"key":"ref15","year":"2018","journal-title":"SHADOW"},{"key":"ref16","year":"2018","journal-title":"STEM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851798"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1053003560"},{"key":"ref19","year":"2018","journal-title":"Announcing the vanguards add-on for onion services"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566894"},{"key":"ref6","article-title":"Circuit fingerprinting attacks: passive de-anonymization of tor hidden services","author":"kwon","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref5","year":"0","journal-title":"Tor&#x2019;s open research topics 2018 edition"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23261"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"ref9","year":"0","journal-title":"Tor specification"},{"key":"ref20","year":"2018","journal-title":"Guard eclipse attack"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"ref21","first-page":"271","article-title":"Raptor: Routing attacks on privacy in tor","author":"sun","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0011"}],"event":{"name":"2019 IEEE Symposium on Computers and Communications (ISCC)","location":"Barcelona, Spain","start":{"date-parts":[[2019,6,29]]},"end":{"date-parts":[[2019,7,3]]}},"container-title":["2019 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961334\/8969568\/08969639.pdf?arnumber=8969639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T17:10:05Z","timestamp":1657991405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8969639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscc47284.2019.8969639","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}