{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:24:14Z","timestamp":1771230254330,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Security and Software Engineering Research Center (S2ERC), an NSF sponsored multi-university Industry\/University Cooperative Research Center (I\/UCRC)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/tifs.2015.2503271","type":"journal-article","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T19:29:34Z","timestamp":1448393374000},"page":"528-542","source":"Crossref","is-referenced-by-count":43,"title":["Fast Detection of Transformed Data Leaks"],"prefix":"10.1109","volume":"11","author":[{"family":"Xiaokui Shu","sequence":"first","affiliation":[]},{"family":"Jing Zhang","sequence":"additional","affiliation":[]},{"family":"Danfeng Daphne Yao","sequence":"additional","affiliation":[]},{"family":"Wu-Chun Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"7","article-title":"Towards practical avoidance of information leakage in enterprise networks","author":"croft","year":"2011","journal-title":"Proc 6th USENIX Conf Hot Topics Secur (HotSec)"},{"key":"ref38","first-page":"1043","article-title":"AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection","author":"yang","year":"2013","journal-title":"Proc 20th ACM Conf Comput Commun Secur"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.01.022"},{"key":"ref32","first-page":"1","article-title":"On measuring the similarity of network hosts: Pitfalls, new metrics, and empirical analyses","author":"coull","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177121"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455806"},{"key":"ref37","first-page":"1029","article-title":"Preventing accidental data disclosure in modern operating systems","author":"nadkarni","year":"2013","journal-title":"Proc 20th ACM Conf Comput Commun Secur"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2441955.2441961"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1990.9999"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2327966"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/1756-0500-2-73"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-012-0209-1"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.06.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s004530010062"},{"key":"ref29","first-page":"505","article-title":"Secure and efficient outsourcing of sequence comparisons","author":"blanton","year":"2012","journal-title":"Proc 17th Eur Symp Res Comput Secur"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699130"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179383"},{"key":"ref20","year":"2015","journal-title":"GoCloudDLP"},{"key":"ref22","first-page":"3","article-title":"Bro: A system for detecting network intruders in real-time","volume":"7","author":"paxson","year":"1998","journal-title":"Proc 7th Conf USENIX Secur Symp (SSYM)"},{"key":"ref21","first-page":"229","article-title":"Snort&#x2014;Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th USENIX Conf Syst Admin (LISA)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.138"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185359"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/1748-7188-6-25"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1690"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-S2-S10"},{"key":"ref58","first-page":"1","article-title":"Bio-sequence database scanning on a GPU","author":"liu","year":"2006","journal-title":"Proc Int Symp Parallel Distrib Process"},{"key":"ref57","article-title":"Firefox and malware: When browsers attack","author":"w\u00fcest","year":"2009"},{"key":"ref56","first-page":"104","article-title":"Information leak detection in financial e-mails using mail pattern analysis under partial information","volume":"7","author":"kalyan","year":"2007","journal-title":"Proc 7th WSEAS Int Conf Appl Informat Commun (AIC)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref54","article-title":"Fingerprinting by random polynomials","author":"rabin","year":"1981"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.120"},{"key":"ref10","first-page":"1","article-title":"Identifying and filtering near-duplicate documents","author":"broder","year":"2000","journal-title":"Proc Ann Symp Combinatorial Pattern Matching"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2005.63","article-title":"Collaborative Internet worm containment","volume":"3","author":"cai","year":"2005","journal-title":"IEEE Security Privacy"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2010.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.143"},{"key":"ref14","year":"2015","journal-title":"Symantec Data Loss Prevention"},{"key":"ref15","first-page":"222","article-title":"Data leak detection as a service","author":"shu","year":"2012","journal-title":"Proc 8th Int Conf Secur Privacy Commun Netw (SecureComm)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501751"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100235"},{"key":"ref18","year":"2015","journal-title":"Identity Finder"},{"key":"ref19","year":"2015","journal-title":"Cloud Data Security From the Inside Out&#x2014;Global Velocity"},{"key":"ref4","year":"2014","journal-title":"Global Corporate IT Security Risks"},{"key":"ref3","year":"2015","journal-title":"Data Breach QuickView 2014 Data Breach Trends"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-15512-3_4","article-title":"Improving NFA-based signature matching using ordered binary decision diagrams","author":"yang","year":"2010","journal-title":"Proc 13th Int Symp Recent Adv Intrusion Detect"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699106"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398363"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23076"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.100"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966916"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.82"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809872"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7365556\/7336560.pdf?arnumber=7336560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:52Z","timestamp":1633919752000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7336560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":62,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2503271","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}