{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:54:40Z","timestamp":1772906080666,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,11]]},"DOI":"10.1109\/secon58729.2023.10287432","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:57:08Z","timestamp":1698083828000},"page":"537-545","source":"Crossref","is-referenced-by-count":6,"title":["EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis"],"prefix":"10.1109","author":[{"given":"Luming","family":"Yang","sequence":"first","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9031-3_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSN50589.2020.00055"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0142(1950)3:1<32::AID-CNCR2820030106>3.0.CO;2-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2906568"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162914"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-020-01844-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2019.8711478"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1943552.1943572"},{"key":"ref1","author":"cisco","year":"2020","journal-title":"Cisco Annual Internet Report (2018&#x2013;2023) White Paper"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3210445.3210448"},{"key":"ref16","first-page":"265","article-title":"Tensorflow: a system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00061"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548317"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50417-5_21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101917"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444944"},{"key":"ref4","first-page":"1357","article-title":"Beauty and the burst: Remote identification of encrypted video streams","author":"schuster","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730819"},{"key":"ref6","author":"dubin","year":"2016","journal-title":"I know what you saw last minute-the chrome browser case"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486211"}],"event":{"name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","location":"Madrid, Spain","start":{"date-parts":[[2023,9,11]]},"end":{"date-parts":[[2023,9,14]]}},"container-title":["2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10287388\/10287413\/10287432.pdf?arnumber=10287432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:04:27Z","timestamp":1699902267000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10287432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/secon58729.2023.10287432","relation":{},"subject":[],"published":{"date-parts":[[2023,9,11]]}}}