{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:45:41Z","timestamp":1770223541816,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1525642"],"award-info":[{"award-number":["1525642"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134074","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2053-2069","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Compressive Traffic Analysis"],"prefix":"10.1145","author":[{"given":"Milad","family":"Nasr","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Arya","family":"Mazumdar","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2111670"},{"key":"e_1_3_2_2_2_1","unstructured":"Alexandr Andoni Piotr Indyk Thijs Laarhoven Ilya Razenshteyn and Ludwig Schmidt. 2015. Practical and optimal LSH for angular distance. In Advances in Neural Information Processing Systems. 1225--1233."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_18"},{"key":"e_1_3_2_2_4_1","volume-title":"Statistical Signal Processing","author":"Bajwa Waheed U","unstructured":"Waheed U Bajwa, Jarvis D Haupt, Gil M Raz, Stephen J Wright, and Robert D Nowak. 2007. Toeplitz-structured compressed sensing matrices. In Statistical Signal Processing. IEEE, 294--298."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00365-007-9003-x"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4286571"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513359"},{"key":"e_1_3_2_2_8_1","volume-title":"Random subdictionaries and coherence conditions for sparse signal recovery. arXiv preprint arXiv:1303.1847","author":"Barg Alexander","year":"2013","unstructured":"Alexander Barg, Arya Mazumdar, and Rongrong Wang. 2013. Random subdictionaries and coherence conditions for sparse signal recovery. arXiv preprint arXiv:1303.1847 (2013)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA521228"},{"key":"e_1_3_2_2_10_1","first-page":"19","article-title":"Operating Systems Support for Planetary-Scale Network Services","volume":"4","author":"Bavier Andy C","year":"2004","unstructured":"Andy C Bavier, Mic Bowman, Brent N Chun, David E Culler, Scott Karlin, Steve Muir, Larry L Peterson, Timothy Roscoe, Tammo Spalink, and Mike Wawrzoniak. 2004. Operating Systems Support for Planetary-Scale Network Services. In NSDI, Vol. 4. 19--19.","journal-title":"NSDI"},{"key":"e_1_3_2_2_11_1","unstructured":"Christopher M Bishop. Pattern recognition and machine learning."},{"key":"e_1_3_2_2_12_1","volume-title":"Brijesh Joshi, and Rob Johnson.","author":"Cai Xiang","year":"2012","unstructured":"Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses. In ACM CCS. 605--616."},{"key":"e_1_3_2_2_13_1","unstructured":"The CAIDA UCSD Anonymized Internet Traces 2016 - [2016]. http:\/\/www.caida. org\/data\/passive\/passive_2016_dataset.xml."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2043161"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"e_1_3_2_2_16_1","volume-title":"Stable signal recovery from incomplete and inaccurate measurements. Communications on pure and applied mathematics 59, 8","author":"Candes Emmanuel J","year":"2006","unstructured":"Emmanuel J Candes, Justin K Romberg, and Terence Tao. 2006. Stable signal recovery from incomplete and inaccurate measurements. Communications on pure and applied mathematics 59, 8 (2006), 1207--1223."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885507"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914731"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_2_21_1","unstructured":"Heyning Cheng and Ron Avnur. Traffic Analysis of SSL Encrypted Web Browsing. https:\/\/pdfs.semanticscholar.org\/1a98\/7c4fe65fa347a863dece665955ee7e01791b. pdf."},{"key":"e_1_3_2_2_22_1","unstructured":"Compressive Imaging: A New Single-Pixel Camera. http:\/\/dsp.rice.edu\/cscamera."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Baris Coskun and Nasir D Memon. 2009. Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. In ACSAC. Citeseer 473--483.","DOI":"10.1109\/ACSAC.2009.51"},{"key":"e_1_3_2_2_24_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 35--50","author":"Danezis George","year":"2004","unstructured":"George Danezis. 2004. The traffic analysis of continuous-time mixes. In International Workshop on Privacy Enhancing Technologies. Springer, 35--50."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.10073"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2007.04.002"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"e_1_3_2_2_30_1","volume-title":"Umesh Shankar, Vern Paxson, Jason Coit, and Stuart Staniford.","author":"Donoho David L","year":"2002","unstructured":"David L Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, and Stuart Staniford. 2002. Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In RAID. Springer, 17--35."},{"key":"e_1_3_2_2_31_1","volume-title":"Compressed sensing: theory and applications","author":"Eldar Yonina C","unstructured":"Yonina C Eldar and Gitta Kutyniok. 2012. Compressed sensing: theory and applications. Cambridge University Press."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"J. Geddes M. Schuchard and N. Hopper. 2013. Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention. In CCS.","DOI":"10.1145\/2508859.2516742"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","unstructured":"Xun Gong Negar Kiyavash and Nikita Borisov. 2010. Fingerprinting websites using remote traffic analysis. In ACM CCS. ACM 684--686. 10.1145\/1866307.1866397","DOI":"10.1145\/1866307.1866397"},{"key":"e_1_3_2_2_34_1","volume-title":"Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality. Theory of computing 8, 1","author":"Har-Peled Sariel","year":"2012","unstructured":"Sariel Har-Peled, Piotr Indyk, and Rajeev Motwani. 2012. Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality. Theory of computing 8, 1 (2012), 321--350."},{"key":"e_1_3_2_2_35_1","volume-title":"k-fingerprinting: A robust scalable website fingerprinting technique. arXiv preprint arXiv:1509.00789","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. arXiv preprint arXiv:1509.00789 (2016)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890881"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_2_38_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 171--178","author":"Hintz Andrew","year":"2002","unstructured":"Andrew Hintz. 2002. Fingerprinting websites using traffic analysis. In International Workshop on Privacy Enhancing Technologies. Springer, 171--178."},{"key":"e_1_3_2_2_39_1","volume-title":"SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In NDSS.","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr and Nikita Borisov. 2011. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In NDSS."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.11.005"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_11"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Amir Houmansadr Chad Brubaker and Vitaly Shmatikov. 2013. The Parrot Is Dead: Observing Unobservable Network Communications. In S&P.","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_2_43_1","volume-title":"RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. In NDSS.","author":"Houmansadr Amir","year":"2009","unstructured":"Amir Houmansadr, Negar Kiyavash, and Nikita Borisov. 2009. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. In NDSS."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2272740"},{"key":"e_1_3_2_2_45_1","volume-title":"Independent component analysis","author":"Hyv\u00e4rinen Aapo","unstructured":"Aapo Hyv\u00e4rinen, Juha Karhunen, and Erkki Oja. 2004. Independent component analysis. Vol. 46. John Wiley & Sons."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064240"},{"key":"e_1_3_2_2_48_1","volume-title":"Principal component analysis","author":"Jolliffe Ian","unstructured":"Ian Jolliffe. 2002. Principal component analysis. Wiley Online Library."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2196256"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","unstructured":"Marc Liberatore and Brian Neil Levine. 2006. Inferring the source of encrypted HTTP connections. In ACM CCS. ACM 255--263. 10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2178036"},{"key":"e_1_3_2_2_55_1","volume-title":"Proceedings of the 22nd Annual Conference on Computational Learning Theory.","author":"List Nikolas","year":"2009","unstructured":"Nikolas List and Hans Ulrich Simon. 2009. SVM-optimization and steepestdescent line search. In Proceedings of the 22nd Annual Conference on Computational Learning Theory."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"e_1_3_2_2_57_1","volume-title":"The theory of error-correcting codes","author":"MacWilliams Florence Jessie","unstructured":"Florence Jessie MacWilliams and Neil James Alexander Sloane. 1977. The theory of error-correcting codes. Elsevier."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831295"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20218"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-008-9110-x"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","unstructured":"Andriy Panchenko Fabian Lanze Andreas Zinnen Martin Henze Jan Pennekamp Klaus Wehrle and Thomas Engel. 2016. Website Fingerprinting at Internet Scale. In NDSS. 10.14722\/ndss.2016.23477","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_63_1","volume-title":"An introduction to signal detection and estimation","author":"Poor H Vincent","unstructured":"H Vincent Poor. 2013. An introduction to signal detection and estimation. Springer Science & Business Media."},{"key":"e_1_3_2_2_64_1","volume-title":"Xinyuan Wang, Douglas S Reeves, and Peng Ning.","author":"Pyun Young June","year":"2007","unstructured":"Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S Reeves, and Peng Ning. 2007. Tracing traffic through intermediate hosts that repacketize flows. In INFOCOM. IEEE, 634--642."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_4"},{"key":"e_1_3_2_2_66_1","volume-title":"Compressive sensing and structured random matrices. Theoretical foundations and numerical methods for sparse recovery 9","author":"Rauhut Holger","year":"2010","unstructured":"Holger Rauhut. 2010. Compressive sensing and structured random matrices. Theoretical foundations and numerical methods for sparse recovery 9 (2010), 1--92."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471041"},{"key":"e_1_3_2_2_70_1","unstructured":"Roei Schuster Vitaly Shmatikov and Eran Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In USENIX Security."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"crossref","unstructured":"Gregory Shakhnarovich Piotr Indyk and Trevor Darrell. 2006. Nearest-neighbor methods in learning and vision: theory and practice.","DOI":"10.7551\/mitpress\/4908.001.0001"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163275"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"e_1_3_2_2_74_1","volume-title":"Proc. Computational Imaging IV at SPIE Electronic Imaging, San Jose","author":"Takhar D","year":"2006","unstructured":"D Takhar, V Bansal, M Wakin, M Duarte, D Baron, KF Kelly, and RG Baraniuk. 2006. A compressed sensing camera: New theory and an implementation using digital micromirrors. Proc. Computational Imaging IV at SPIE Electronic Imaging, San Jose (2006)."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2005.05.029"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","unstructured":"Liang Wang Kevin P. Dyer Aditya Akella Thomas Ristenpart and Thomas Shrimpton. 2015. Seeing Through Network-Protocol Obfuscation. In ACM CCS. 10.1145\/2810103.2813715","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_2_77_1","unstructured":"Tao Wang Xiang Cai Rishab Nithyanand Rob Johnson and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In USENIX Security. 143--157."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","unstructured":"Xinyuan Wang S. Chen and S. Jajodia. 2005. Tracking Anonymous Peer-to-peer VoIP Calls on the Internet. In CCS. 10.1145\/1102120.1102133","DOI":"10.1145\/1102120.1102133"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"crossref","unstructured":"Xinyuan Wang and Douglas S Reeves. 2003. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays. In CCS.","DOI":"10.1145\/948109.948115"},{"key":"e_1_3_2_2_82_1","volume-title":"Inter-packet delay based correlation for tracing encrypted connections through stepping stones","author":"Wang Xinyuan","unstructured":"Xinyuan Wang, Douglas S Reeves, and S Felix Wu. 2002. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In ESORICS. Springer, 244--263."},{"key":"e_1_3_2_2_83_1","volume-title":"Snowbird Learning Workshop","author":"Weiss Yair","year":"2007","unstructured":"Yair Weiss, Hyun Sung Chang, and William T Freeman. 2007. Learning compressed sensing. In Snowbird Learning Workshop, Allerton, CA."},{"key":"e_1_3_2_2_84_1","volume-title":"Kevin Z Snow, and Fabian Monrose.","author":"White Andrew M","year":"2011","unstructured":"Andrew M White, Austin R Matthews, Kevin Z Snow, and Fabian Monrose. 2011. Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks. In IEEE S&P. 3--18."},{"key":"e_1_3_2_2_85_1","volume-title":"Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations","author":"Wright Charles V","unstructured":"Charles V Wright, Lucas Ballard, Scott E Coull, Fabian Monrose, and Gerald M Masson. 2008. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In IEEE S&P. IEEE, 35--49."},{"key":"e_1_3_2_2_86_1","unstructured":"Charles V Wright Lucas Ballard Fabian Monrose and Gerald M Masson. 2007. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?. In USENIX Security."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2010-618"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/10722599_12"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.14"},{"key":"e_1_3_2_2_90_1","first-page":"184","article-title":"Detecting Stepping Stones","volume":"171","author":"Zhang Yin","year":"2000","unstructured":"Yin Zhang and Vern Paxson. 2000. Detecting Stepping Stones. In USENIX Security, Vol. 171. 184.","journal-title":"USENIX Security"},{"key":"e_1_3_2_2_91_1","volume-title":"ACM SIGCOMM Computer Communication Review","volume":"39","author":"Zhang Yin","year":"2009","unstructured":"Yin Zhang, Matthew Roughan, Walter Willinger, and Lili Qiu. 2009. Spatiotemporal compressive sensing and internet traffic matrices. In ACM SIGCOMM Computer Communication Review, Vol. 39. ACM, 267--278."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","unstructured":"Ye Zhu and Riccardo Bettati. Unmixing Mix Traffic. In PETS. 110--127. 10.1007\/11767831_8","DOI":"10.1007\/11767831_8"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134074","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134074","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134074"}},"subtitle":["A New Paradigm for Scalable Traffic Analysis"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":91,"alternative-id":["10.1145\/3133956.3134074","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134074","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}