{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:19:06Z","timestamp":1778602746106,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472153"],"award-info":[{"award-number":["62472153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24A20289"],"award-info":[{"award-number":["U24A20289"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2025JJ50350"],"award-info":[{"award-number":["2025JJ50350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3580566","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T13:42:34Z","timestamp":1750167754000},"page":"1255-1268","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Congestion-Related Attacks via Fine-Grained Queue Diagnosis"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1974-4731","authenticated-orcid":false,"given":"Rui","family":"Dai","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0062-0213","authenticated-orcid":false,"given":"Dan","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6030-0481","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, State University of New York, New Paltz, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8712-2964","authenticated-orcid":false,"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Semiconductors (College of Integrated Circuits), Hunan University, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109632"},{"key":"ref2","first-page":"219","article-title":"Bolt: Sub-RTT congestion control for ultra-low latency","volume-title":"Proc. 20th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Arslan"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275768"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544240"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23115"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3704434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3169136"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179404"},{"key":"ref9","volume-title":"Netease\u2019s servers crashed for 9 hours"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365408"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117066"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2948167"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/505696.505704"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102170"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.04.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.03.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3222846"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3054528"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108800"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3556973"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref23","first-page":"667","article-title":"IMap: Fast and scalable in-network scanning with programmable switches","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Li"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3522104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3161015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544257"},{"key":"ref27","first-page":"6203","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Zhou"},{"key":"ref28","first-page":"571","article-title":"HorusEye: A realtime IoT malicious traffic detection framework using programmable switches","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Dong"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3048265"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833673"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23068"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3195871"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2025.3541143"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761806"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126053"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3266757"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23102"},{"key":"ref42","volume-title":"MAWI working group traffic archive."},{"key":"ref43","volume-title":"Attacks on congestion control by a misbehaving TCP receiver."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3565009.3569520"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544263"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621365"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621157"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5097"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11039010.pdf?arnumber=11039010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T06:58:58Z","timestamp":1766127538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11039010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3580566","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}