{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:09:31Z","timestamp":1766268571395,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T00:00:00Z","timestamp":1565136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,7]]},"DOI":"10.1145\/3341188.3341192","type":"proceedings-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T20:51:45Z","timestamp":1564433505000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Inferring ADU Combinations from Encrypted QUIC Stream"],"prefix":"10.1145","author":[{"given":"Hua","family":"Wu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"}]},{"given":"Xiaoyan","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,7]]},"reference":[{"volume-title":"Cisco Visual Networking Index: Forecast and Trends","year":"2017","key":"e_1_3_2_1_1_1","unstructured":"Cisco. 2019. Cisco Visual Networking Index: Forecast and Trends , 2017 --2022. Retrieved May 5, 2019 from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html Cisco. 2019. Cisco Visual Networking Index: Forecast and Trends, 2017--2022. Retrieved May 5, 2019 from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"e_1_3_2_1_3_1","volume-title":"White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis. Retrieved","author":"Mitra G, Vairam P K, SLPSK","year":"2019","unstructured":"Mitra G, Vairam P K, SLPSK P, and 2019 . White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis. Retrieved May 1, 2019 from https:\/\/arxiv.org\/pdf\/1903.06475.pdf Mitra G, Vairam P K, SLPSK P, and et al. 2019. White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis. Retrieved May 1, 2019 from https:\/\/arxiv.org\/pdf\/1903.06475.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486211"},{"key":"e_1_3_2_1_5_1","volume":"201","author":"Swet","unstructured":"Swet I and Iyengar J. 201 5. QUIC Loss Recovery And Congestion Control. Retrieved May 1, 2019 from https:\/\/tools.ietf.org\/html\/draft-tsvwg-quic-loss-recovery-00 Swet I and Iyengar J. 2015. QUIC Loss Recovery And Congestion Control. Retrieved May 1, 2019 from https:\/\/tools.ietf.org\/html\/draft-tsvwg-quic-loss-recovery-00","journal-title":"Iyengar J."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406218"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210445.3210448"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486321"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4728-4"},{"key":"e_1_3_2_1_11_1","volume-title":"International Young Researcher Summit on Quality of Experience in Emerging Multimedia Services (QEEMS","author":"Orsolic Irena","year":"2017","unstructured":"Irena Orsolic , Lea Skorin-Kapov , and Mirko Suznjevic . 2017. Towards a Framework for Classifying YouTube QoE Based on Monitoring of Encrypted Traffic . In International Young Researcher Summit on Quality of Experience in Emerging Multimedia Services (QEEMS 2017 ). Irena Orsolic, Lea Skorin-Kapov, and Mirko Suznjevic. 2017. Towards a Framework for Classifying YouTube QoE Based on Monitoring of Encrypted Traffic. In International Young Researcher Summit on Quality of Experience in Emerging Multimedia Services (QEEMS 2017)."},{"key":"e_1_3_2_1_12_1","volume-title":"2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--6.","author":"Pan Wubin","year":"2016","unstructured":"Wubin Pan , Gaung Cheng , Hua Wu , and Yongning Tang . 2016 . Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks . In 2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--6. Wubin Pan, Gaung Cheng, Hua Wu, and Yongning Tang. 2016. Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks. In 2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--6."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 1357--1374.","author":"Schuster Roei","key":"e_1_3_2_1_14_1","unstructured":"Roei Schuster , Vitaly Shmatikov , and Eran Tromer . 2017. Beauty and the burst: Remote identification of encrypted video streams . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1357--1374. Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the burst: Remote identification of encrypted video streams. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1357--1374."},{"key":"e_1_3_2_1_15_1","volume-title":"27th Twente Student Conference on IT. Enschede The Netherlands.","author":"Stikkelorum M","year":"2017","unstructured":"M Stikkelorum . 2017 . I Know What You Watched: Fingerprint Attack on YouTube Video Streams . In 27th Twente Student Conference on IT. Enschede The Netherlands. M Stikkelorum. 2017. I Know What You Watched: Fingerprint Attack on YouTube Video Streams. In 27th Twente Student Conference on IT. Enschede The Netherlands."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01645-5_6"}],"event":{"name":"CFI'19: The 14th International Conference on Future Internet Technologies","sponsor":["FIF Future Internet Forum"],"location":"Phuket Thailand","acronym":"CFI'19"},"container-title":["Proceedings of the 14th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341188.3341192","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341188.3341192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:15Z","timestamp":1750201995000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341188.3341192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,7]]},"references-count":16,"alternative-id":["10.1145\/3341188.3341192","10.1145\/3341188"],"URL":"https:\/\/doi.org\/10.1145\/3341188.3341192","relation":{},"subject":[],"published":{"date-parts":[[2019,8,7]]},"assertion":[{"value":"2019-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}