{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:45:17Z","timestamp":1772207117017,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62072446"],"award-info":[{"award-number":["62072446"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62472431"],"award-info":[{"award-number":["62472431"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62102430"],"award-info":[{"award-number":["62102430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62102429"],"award-info":[{"award-number":["62102429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2023JJ30640"],"award-info":[{"award-number":["2023JJ30640"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Research Plan Program by National University of Defense Technology","award":["ZK22-55"],"award-info":[{"award-number":["ZK22-55"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2024.3515816","type":"journal-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T17:29:47Z","timestamp":1733938187000},"page":"8280-8295","source":"Crossref","is-referenced-by-count":2,"title":["The Analysis of Encrypted Video Stream Based on Low-Dimensional Embedding Method"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9306-2056","authenticated-orcid":false,"given":"Luming","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7275-8190","authenticated-orcid":false,"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5930-8881","authenticated-orcid":false,"given":"Lin","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0720-4925","authenticated-orcid":false,"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Cisco Annual Internet Report (2018\u20132023) White Paper","year":"2020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1943552.1943572"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730819"},{"key":"ref4","first-page":"1357","article-title":"Beauty and the burst: Remote identification of encrypted video streams","volume-title":"Proc. 26th USENIX Secur. Symp. (USENIX Secur.)","author":"Schuster"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486211"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SPW63631.2024.00008"},{"key":"ref7","first-page":"1","article-title":"I know what you saw last minute\u2014The chrome browser case","volume-title":"Proc. BlackHat Eur. Conf.","author":"Dubin","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101917"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50417-5_21"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444944"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162914"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSN50589.2020.00055"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9031-3_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECON58729.2023.10287432"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref20","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Shen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00247"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3179955"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2011.87"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6757893"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787486"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DMIAF.2016.7574935"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD57460.2023.10151992"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC59175.2023.10253830"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5028-3_21"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103623"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2019.8711478"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-020-01844-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2906568"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3210445.3210448"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548317"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00061"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24261-3_7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0142(1950)3:1<32::AID-CNCR2820030106>3.0.CO;2-3"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10793092.pdf?arnumber=10793092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T05:03:12Z","timestamp":1754715792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3515816","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}