{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:41:44Z","timestamp":1755218504583,"version":"3.43.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376265"],"award-info":[{"award-number":["62376265"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3587621","type":"journal-article","created":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:05:58Z","timestamp":1752102358000},"page":"7542-7557","source":"Crossref","is-referenced-by-count":0,"title":["Magnifier: Detecting Network Access via Lightweight Traffic-Based Fingerprints"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2268-7416","authenticated-orcid":false,"given":"Wenhao","family":"Li","sequence":"first","affiliation":[{"name":"Research Institute, China Telecom Company Ltd., Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1115-2387","authenticated-orcid":false,"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences (CAS), Institute of Information Engineering, Beijing, China"}]},{"given":"Huaifeng","family":"Bao","sequence":"additional","affiliation":[{"name":"Tencent Technology Company Ltd., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1630-6058","authenticated-orcid":false,"given":"Xiao-Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences (CAS), Institute of Information Engineering, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7445-9103","authenticated-orcid":false,"given":"Lingyun","family":"Ying","sequence":"additional","affiliation":[{"name":"QI-ANXIN Technology Research Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2195-0799","authenticated-orcid":false,"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences (CAS), Institute of Information Engineering, Beijing, China"}]},{"given":"Huamin","family":"Jin","sequence":"additional","affiliation":[{"name":"Research Institute, China Telecom Company Ltd., Guangzhou, China"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Research Institute, China Telecom Company Ltd., Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45670-5_8"},{"issue":"100","key":"ref2","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"Wright","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3216603"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2018.7407"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00096"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939836"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109368"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24083"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3246765"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_65"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068830"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218525"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114363"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3267885"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3691410"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645407"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109648"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109652"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872430"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583473"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583200"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590451"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101681"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155175"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3071595"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318962"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318966"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref47","article-title":"Deep learning for network traffic classification","author":"Bayat","year":"2021","journal-title":"arXiv:2106.12693"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11075885.pdf?arnumber=11075885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T05:36:49Z","timestamp":1754458609000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11075885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3587621","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}