{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:46Z","timestamp":1772041606490,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3450076","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:01:20Z","timestamp":1622746880000},"page":"472-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Chinese Wall or Swiss Cheese? Keyword\u00a0filtering\u00a0in\u00a0the\u00a0Great\u00a0Firewall\u00a0of\u00a0China"],"prefix":"10.1145","author":[{"given":"Zachary","family":"Weinberg","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, USA"}]},{"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Resources and Motivations. In Free and Open Communications on the Internet. USENIX","author":"Aase Nicholas","unstructured":"Nicholas Aase , Jedidiah\u00a0 R. Crandall , \u00c1lvaro D\u00edaz , Jeffrey Knockel , Jorge\u00a0Oca\u00f1a Molinero , Jared Saia , Dan Wallach , and Tao Zhu . 2012. Whiskey, Weed, and Wukan on the World Wide Web : On Measuring Censors \u2019 Resources and Motivations. In Free and Open Communications on the Internet. USENIX , Berkeley, CA , Article 17, 7\u00a0pages. https:\/\/www.usenix.org\/system\/files\/conference\/foci12\/foci12-final17.pdf Nicholas Aase, Jedidiah\u00a0R. Crandall, \u00c1lvaro D\u00edaz, Jeffrey Knockel, Jorge\u00a0Oca\u00f1a Molinero, Jared Saia, Dan Wallach, and Tao Zhu. 2012. Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors\u2019 Resources and Motivations. In Free and Open Communications on the Internet. USENIX, Berkeley, CA, Article 17, 7\u00a0pages. https:\/\/www.usenix.org\/system\/files\/conference\/foci12\/foci12-final17.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Free and Open Communications on the Internet","author":"Anonymous","unstructured":"Anonymous . 2014. Towards a Comprehensive Picture of the Great Firewall\u2019s DNS Censorship . In Free and Open Communications on the Internet . USENIX , San Diego, CA , 7\u00a0pages. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall\u2019s DNS Censorship. In Free and Open Communications on the Internet. USENIX, San Diego, CA, 7\u00a0pages. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_3_2_1_4_1","first-page":"6","article-title":"The Great Firewall of China","volume":"5","author":"Barme R.","year":"1997","unstructured":"Geremie\u00a0 R. Barme and Sang Ye . 1997 . The Great Firewall of China . Wired 5 , 6 (June 1997), 13\u00a0pages. https:\/\/www.wired.com\/1997\/06\/china-3\/ Geremie\u00a0R. Barme and Sang Ye. 1997. The Great Firewall of China. Wired 5, 6 (June 1997), 13\u00a0pages. https:\/\/www.wired.com\/1997\/06\/china-3\/","journal-title":"Wired"},{"key":"e_1_3_2_1_5_1","unstructured":"Jake Bathman. 2016\u2013. The 10 000 most common English words in order of frequency. https:\/\/github.com\/first20hours\/google-10000-english  Jake Bathman. 2016\u2013. The 10 000 most common English words in order of frequency. https:\/\/github.com\/first20hours\/google-10000-english"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee R. Fielding and L. Masinter. 2005. Uniform Resource Identifier (URI): Generic Syntax. RFC 3986. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc3986.txt  T. Berners-Lee R. Fielding and L. Masinter. 2005. Uniform Resource Identifier (URI): Generic Syntax. RFC 3986. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc3986.txt","DOI":"10.17487\/rfc3986"},{"key":"e_1_3_2_1_7_1","volume-title":"Geneva: Evolving Censorship Evasion Strategies. In Computer and Communications Security","author":"Bock Kevin","year":"2019","unstructured":"Kevin Bock , George Hughey , Xiao Qiang , and Dave Levin . 2019 . Geneva: Evolving Censorship Evasion Strategies. In Computer and Communications Security . ACM , New York, NY , 2199\u20132214. https:\/\/doi.org\/10.1145\/3319535.3363189 10.1145\/3319535.3363189 Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. 2019. Geneva: Evolving Censorship Evasion Strategies. In Computer and Communications Security. ACM, New York, NY, 2199\u20132214. https:\/\/doi.org\/10.1145\/3319535.3363189"},{"key":"e_1_3_2_1_8_1","volume-title":"Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin.","author":"Bock Kevin","year":"2020","unstructured":"Kevin Bock , iyouport , Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin. 2020 . Exposing and Circumventing China\u2019s Censorship of ESNI. Technical Report. University of Maryland . https:\/\/geneva.cs.umd.edu\/posts\/china-censors-esni\/esni\/ Kevin Bock, iyouport, Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin. 2020. Exposing and Circumventing China\u2019s Censorship of ESNI. Technical Report. University of Maryland. https:\/\/geneva.cs.umd.edu\/posts\/china-censors-esni\/esni\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Free and Open Communications on the Internet","author":"Chai Zimo","unstructured":"Zimo Chai , Amirhossein Ghafari , and Amir Houmansadr . 2019. On the Importance of Encrypted-SNI to Censorship Circumvention . In Free and Open Communications on the Internet . USENIX , Santa Clara, CA , 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci19\/presentation\/chai Zimo Chai, Amirhossein Ghafari, and Amir Houmansadr. 2019. On the Importance of Encrypted-SNI to Censorship Circumvention. In Free and Open Communications on the Internet. USENIX, Santa Clara, CA, 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci19\/presentation\/chai"},{"key":"e_1_3_2_1_10_1","volume-title":"IPs, IMDB and AppStore.","author":"Chu Xia","year":"2014","unstructured":"Xia Chu . 2014. Complete GFW Rulebook for Wikipedia Plus Comprehensive List for Websites , IPs, IMDB and AppStore. ( 2014 ). https:\/\/goo.gl\/zKslcu Xia Chu. 2014. Complete GFW Rulebook for Wikipedia Plus Comprehensive List for Websites, IPs, IMDB and AppStore. (2014). https:\/\/goo.gl\/zKslcu"},{"key":"e_1_3_2_1_11_1","volume-title":"\u00a0M. Watson","author":"Clayton Richard","year":"2006","unstructured":"Richard Clayton , Steven\u00a0 J. Murdoch , and Robert N . \u00a0M. Watson . 2006 . Ignoring the Great Firewall of China. In Privacy Enhancing Technologies. Springer , Berlin, Heidelberg, 20\u201335. https:\/\/doi.org\/10.1007\/11957454_2 10.1007\/11957454_2 Richard Clayton, Steven\u00a0J. Murdoch, and Robert N.\u00a0M. Watson. 2006. Ignoring the Great Firewall of China. In Privacy Enhancing Technologies. Springer, Berlin, Heidelberg, 20\u201335. https:\/\/doi.org\/10.1007\/11957454_2"},{"key":"e_1_3_2_1_12_1","first-page":"7","article-title":"Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC","volume":"18","author":"Crandall R.","year":"2013","unstructured":"Jedidiah\u00a0 R. Crandall , Masashi Crete-Nishihata , Jeffrey Knockel , Sarah McKune , Adam Senft , Diana Tseng , and Greg Wiseman . 2013 . Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC . First Monday 18 , 7 (June 2013), 56\u00a0pages. https:\/\/doi.org\/10.5210\/fm.v18i7.4628 10.5210\/fm.v18i7.4628 Jedidiah\u00a0R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman. 2013. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (June 2013), 56\u00a0pages. https:\/\/doi.org\/10.5210\/fm.v18i7.4628","journal-title":"First Monday"},{"key":"e_1_3_2_1_13_1","volume-title":"Computer and Communications Security","author":"Crandall R.","unstructured":"Jedidiah\u00a0 R. Crandall , Daniel Zinn , Michael Byrd , Earl Barr , and Rich East . 2007. ConceptDoppler: A Weather Tracker for Internet Censorship . In Computer and Communications Security . ACM , New York, NY , 352\u2013365. https:\/\/doi.org\/10.1145\/1315245.1315290 10.1145\/1315245.1315290 Jedidiah\u00a0R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, and Rich East. 2007. ConceptDoppler: A Weather Tracker for Internet Censorship. In Computer and Communications Security. ACM, New York, NY, 352\u2013365. https:\/\/doi.org\/10.1145\/1315245.1315290"},{"key":"e_1_3_2_1_14_1","volume-title":"Jakub Da\u0142ek, Jason\u00a0Q. Ng, Greg Wiseman, and Katie Kleemola.","author":"Crete-Nishihata Masashi","year":"2020","unstructured":"Masashi Crete-Nishihata , marmight , Jakub Da\u0142ek, Jason\u00a0Q. Ng, Greg Wiseman, and Katie Kleemola. 2020 . Data related to investigation of chat client censorship. https:\/\/github.com\/citizenlab\/chat-censorship Masashi Crete-Nishihata, marmight, Jakub Da\u0142ek, Jason\u00a0Q. Ng, Greg Wiseman, and Katie Kleemola. 2020. Data related to investigation of chat client censorship. https:\/\/github.com\/citizenlab\/chat-censorship"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002914"},{"key":"e_1_3_2_1_16_1","volume-title":"Web Science","author":"Darer Alexander","year":"2010","unstructured":"Alexander Darer , Oliver Farnan , and Joss Wright . 2018. Automated Discovery of Internet Censorship by Web Crawling . In Web Science . ACM , New York, NY , 195\u2013204. https:\/\/doi.org\/10.1145\/3 2010 64.3201091 arxiv:1804.03056\u00a0[cs.CY] 10.1145\/3201064.3201091 Alexander Darer, Oliver Farnan, and Joss Wright. 2018. Automated Discovery of Internet Censorship by Web Crawling. In Web Science. ACM, New York, NY, 195\u2013204. https:\/\/doi.org\/10.1145\/3201064.3201091 arxiv:1804.03056\u00a0[cs.CY]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_18_1","volume-title":"DFN-Arbeitstagung \u00fcber Kommunikationsnetze","author":"Dornseif Maximilian","unstructured":"Maximilian Dornseif . 2003. Government mandated blocking of foreign Web content . In DFN-Arbeitstagung \u00fcber Kommunikationsnetze . Gesellschaft f\u00fcr Informatik e.V., Bonn , 617\u2013647. arxiv:cs\/0404005\u00a0[cs.CY] Maximilian Dornseif. 2003. Government mandated blocking of foreign Web content. In DFN-Arbeitstagung \u00fcber Kommunikationsnetze. Gesellschaft f\u00fcr Informatik e.V., Bonn, 617\u2013647. arxiv:cs\/0404005\u00a0[cs.CY]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_1_20_1","volume-title":"Privacy Enhancing Technologies","author":"Ensafi Roya","year":"2015","unstructured":"Roya Ensafi , Philipp Winter , Abdullah Mueen , and Jedidiah\u00a0 R. Crandall . 2015. Analyzing the Great Firewall of China Over Space and Time . In Privacy Enhancing Technologies . Sciendo , Berlin , 61\u201376. https:\/\/doi.org\/10.1515\/popets- 2015 -0005 10.1515\/popets-2015-0005 Roya Ensafi, Philipp Winter, Abdullah Mueen, and Jedidiah\u00a0R. Crandall. 2015. Analyzing the Great Firewall of China Over Space and Time. In Privacy Enhancing Technologies. Sciendo, Berlin, 61\u201376. https:\/\/doi.org\/10.1515\/popets-2015-0005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"R. Fielding and J. Reschke. 2014. Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc7230.txt  R. Fielding and J. Reschke. 2014. Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc7230.txt","DOI":"10.17487\/rfc7230"},{"key":"e_1_3_2_1_22_1","volume-title":"OONI: Open Observatory of Network Interference. In Free and Open Communications on the Internet","author":"Filast\u00f2 Arturo","year":"2012","unstructured":"Arturo Filast\u00f2 and Jacob Appelbaum . 2012 . OONI: Open Observatory of Network Interference. In Free and Open Communications on the Internet . USENIX , Bellevue, WA , 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci12\/workshop-program\/presentation\/filast%C3%B2 Arturo Filast\u00f2 and Jacob Appelbaum. 2012. OONI: Open Observatory of Network Interference. In Free and Open Communications on the Internet. USENIX, Bellevue, WA, 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci12\/workshop-program\/presentation\/filast%C3%B2"},{"key":"e_1_3_2_1_23_1","volume-title":"Mending Wall: On the Implementation of Censorship in India. In Security and Privacy in Communication Networks","author":"Gosain Devashish","year":"2018","unstructured":"Devashish Gosain , Anshika Agarwal , Sahil Shekhawat , H.\u00a0 B. Acharya , and Sambuddho Chakravarty . 2018 . Mending Wall: On the Implementation of Censorship in India. In Security and Privacy in Communication Networks . Springer , Cham , 418\u2013437. https:\/\/doi.org\/10.1007\/978-3-319-78813-5_21 arxiv:1806.06518\u00a0[cs.CR] 10.1007\/978-3-319-78813-5_21 Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H.\u00a0B. Acharya, and Sambuddho Chakravarty. 2018. Mending Wall: On the Implementation of Censorship in India. In Security and Privacy in Communication Networks. Springer, Cham, 418\u2013437. https:\/\/doi.org\/10.1007\/978-3-319-78813-5_21 arxiv:1806.06518\u00a0[cs.CR]"},{"key":"e_1_3_2_1_24_1","volume-title":"Culture-Specific Blocklist for China. In Free and Open Communications on the Internet","author":"Hounsel Austin","unstructured":"Austin Hounsel , Prateek Mittal , and Nick Feamster . 2018. Automatically Generating a Large , Culture-Specific Blocklist for China. In Free and Open Communications on the Internet . USENIX , Baltimore, MD , 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci18\/presentation\/hounsel Austin Hounsel, Prateek Mittal, and Nick Feamster. 2018. Automatically Generating a Large, Culture-Specific Blocklist for China. In Free and Open Communications on the Internet. USENIX, Baltimore, MD, 8\u00a0pages. https:\/\/www.usenix.org\/conference\/foci18\/presentation\/hounsel"},{"key":"e_1_3_2_1_25_1","volume-title":"Apollo: A System for Tracking Internet Censorship. In Workshop on Information Security and Privacy. AIS","author":"Joyce Eric","year":"2018","unstructured":"Eric Joyce , Matthew Goldeck , Christopher\u00a0 S. Leberknight , and Anna Feldman . 2018 . Apollo: A System for Tracking Internet Censorship. In Workshop on Information Security and Privacy. AIS , San Francisco, CA, 19\u00a0pages. https:\/\/aisel.aisnet.org\/wisp 2018\/7 Eric Joyce, Matthew Goldeck, Christopher\u00a0S. Leberknight, and Anna Feldman. 2018. Apollo: A System for Tracking Internet Censorship. In Workshop on Information Security and Privacy. AIS, San Francisco, CA, 19\u00a0pages. https:\/\/aisel.aisnet.org\/wisp2018\/7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"J. Klensin. 2010. Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework. RFC 5890. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc5890.txt  J. Klensin. 2010. Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework. RFC 5890. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc5890.txt","DOI":"10.17487\/rfc5890"},{"key":"e_1_3_2_1_27_1","volume-title":"Elysion","author":"Klzgrad","year":"2010","unstructured":"Klzgrad , yingyingcui , Elysion , 2010 . West Chamber Project . https:\/\/code.google.com\/archive\/p\/scholarzhang\/ Klzgrad, yingyingcui, Elysion, 2010. West Chamber Project. https:\/\/code.google.com\/archive\/p\/scholarzhang\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Three Researchers","author":"Knockel Jeffrey","unstructured":"Jeffrey Knockel , Jedidiah\u00a0 R. Crandall , and Jared Saia . 2011. Three Researchers , Five Conjectures : An Empirical Analysis of TOM-Skype Censorship and Surveillance. In Free and Open Communications on the Internet. USENIX, San Francisco, CA , 8\u00a0pages. http:\/\/www.usenix.org\/events\/foci11\/tech\/final_files\/Knockel.pdf Jeffrey Knockel, Jedidiah\u00a0R. Crandall, and Jared Saia. 2011. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance. In Free and Open Communications on the Internet. USENIX, San Francisco, CA, 8\u00a0pages. http:\/\/www.usenix.org\/events\/foci11\/tech\/final_files\/Knockel.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"Natural Language Processing for Internet Freedom","author":"Knockel Jeffrey","unstructured":"Jeffrey Knockel , Masashi Crete-Nishihata , and Lotus Ruan . 2018. The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects . In Natural Language Processing for Internet Freedom . ACL , Santa Fe, NM , 1\u201311. https:\/\/www.aclweb.org\/anthology\/W18-4201.pdf Jeffrey Knockel, Masashi Crete-Nishihata, and Lotus Ruan. 2018. The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects. In Natural Language Processing for Internet Freedom. ACL, Santa Fe, NM, 1\u201311. https:\/\/www.aclweb.org\/anthology\/W18-4201.pdf"},{"key":"e_1_3_2_1_30_1","volume-title":"Free and Open Communications on the Internet","author":"Knockel Jeffrey","unstructured":"Jeffrey Knockel , Lotus Ruan , and Masashi Crete-Nishihata . 2017. Measuring decentralization of Chinese keyword censorship via mobile games . In Free and Open Communications on the Internet . USENIX , Vancouver, BC , 9\u00a0pages. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/knockel Jeffrey Knockel, Lotus Ruan, and Masashi Crete-Nishihata. 2017. Measuring decentralization of Chinese keyword censorship via mobile games. In Free and Open Communications on the Internet. USENIX, Vancouver, BC, 9\u00a0pages. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/knockel"},{"key":"e_1_3_2_1_31_1","volume-title":"Free and Open Communications on the Internet","author":"Marczak Bill","unstructured":"Bill Marczak , Nicholas Weaver , Jakub Da\u0142ek , Roya Ensafi , David Fifield , Sarah McKune , Arn Rey , John Scott-Railton , Ron Deibert , and Vern Paxson . 2015. An analysis of China\u2019s \u201cgreat cannon \u201d. In Free and Open Communications on the Internet . USENIX , Washington, DC , 11\u00a0pages. https:\/\/www.usenix.org\/conference\/foci15\/workshop-program\/presentation\/marczak Bill Marczak, Nicholas Weaver, Jakub Da\u0142ek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, and Vern Paxson. 2015. An analysis of China\u2019s \u201cgreat cannon\u201d. In Free and Open Communications on the Internet. USENIX, Washington, DC, 11\u00a0pages. https:\/\/www.usenix.org\/conference\/foci15\/workshop-program\/presentation\/marczak"},{"key":"e_1_3_2_1_32_1","volume-title":"MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text. RFC 2047","author":"Moore K.","year":"1996","unstructured":"K. Moore . 1996 . MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text. RFC 2047 . RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc 2047.txt K. Moore. 1996. MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text. RFC 2047. RFC Editor. https:\/\/www.rfc-editor.org\/rfc\/rfc2047.txt"},{"key":"e_1_3_2_1_33_1","unstructured":"Jason\u00a0Q. Ng. 2014\u2013. Sensitive Chinese keywords. https:\/\/github.com\/jasonqng\/chinese-keywords\/blob\/master\/csv\/individual\/gfw(gb2312).csv  Jason\u00a0Q. Ng. 2014\u2013. Sensitive Chinese keywords. https:\/\/github.com\/jasonqng\/chinese-keywords\/blob\/master\/csv\/individual\/gfw(gb2312).csv"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3200947.3201037"},{"key":"e_1_3_2_1_35_1","volume-title":"Longitudinal Internet Censorship Measurement Platform. In Symposium on Security and Privacy. IEEE","author":"Niaki Arian\u00a0Akhavan","year":"2020","unstructured":"Arian\u00a0Akhavan Niaki , Shinyoung Cho , Zachary Weinberg , Nguyen\u00a0Phong Hoang , Abbas Razaghpanah , Nicolas Christin , and Phillipa Gill . 2020 . ICLab: A Global , Longitudinal Internet Censorship Measurement Platform. In Symposium on Security and Privacy. IEEE , San Francisco, CA, 135\u2013151. https:\/\/doi.org\/10.1109\/SP40000. 2020.00014 10.1109\/SP40000.2020.00014 Arian\u00a0Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen\u00a0Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. 2020. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In Symposium on Security and Privacy. IEEE, San Francisco, CA, 135\u2013151. https:\/\/doi.org\/10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.46"},{"key":"e_1_3_2_1_37_1","volume-title":"Global Measurement of DNS Manipulation. In USENIX Security Symposium. USENIX","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce , Ben Jones , Frank Li , Roya Ensafi , Nick Feamster , Nick Weaver , and Vern Paxson . 2017 . Global Measurement of DNS Manipulation. In USENIX Security Symposium. USENIX , Vancouver, BC, 307\u2013323. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/pearce Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global Measurement of DNS Manipulation. In USENIX Security Symposium. USENIX, Vancouver, BC, 307\u2013323. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/pearce"},{"key":"e_1_3_2_1_38_1","unstructured":"Eric Rescorla Kazuho Oku Nick Sullivan and Christopher\u00a0A. Wood. 2020. TLS Encrypted Client Hello. (2020). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-esni\/ Internet-Draft.  Eric Rescorla Kazuho Oku Nick Sullivan and Christopher\u00a0A. Wood. 2020. TLS Encrypted Client Hello. (2020). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-esni\/ Internet-Draft."},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX Annual Technical Conference. USENIX","author":"Scott Will","year":"2016","unstructured":"Will Scott , Thomas Anderson , Tadayoshi Kohno , and Arvind Krishnamurthy . 2016 . Satellite: Joint analysis of CDNs and network-level interference . In USENIX Annual Technical Conference. USENIX , Denver, CO, 195\u2013208. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/scott Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy. 2016. Satellite: Joint analysis of CDNs and network-level interference. In USENIX Annual Technical Conference. USENIX, Denver, CO, 195\u2013208. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/scott"},{"key":"e_1_3_2_1_40_1","volume-title":"Censmon: A web censorship monitor. In Free and Open Communications on the Internet","author":"Sfakianakis Andreas","year":"2011","unstructured":"Andreas Sfakianakis , Elias Athanasopoulos , and Sotiris Ioannidis . 2011 . Censmon: A web censorship monitor. In Free and Open Communications on the Internet . USENIX , San Francisco, CA , 6\u00a0pages. https:\/\/www.usenix.org\/events\/foci11\/tech\/final_files\/Sfakianakis.pdf Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. 2011. Censmon: A web censorship monitor. In Free and Open Communications on the Internet. USENIX, San Francisco, CA, 6\u00a0pages. https:\/\/www.usenix.org\/events\/foci11\/tech\/final_files\/Sfakianakis.pdf"},{"key":"e_1_3_2_1_41_1","unstructured":"Sukhbir Singh Arturo Filast\u00f2 and Maria Xynou. 2019. China is now blocking all language editions of Wikipedia. OONI. https:\/\/ooni.io\/post\/2019-china-wikipedia-blocking\/  Sukhbir Singh Arturo Filast\u00f2 and Maria Xynou. 2019. China is now blocking all language editions of Wikipedia. OONI. https:\/\/ooni.io\/post\/2019-china-wikipedia-blocking\/"},{"key":"e_1_3_2_1_42_1","unstructured":"Standardization Administration of China. 1980. \u4fe1\u606f\u4ea4\u6362\u7528\u6c49\u5b57\u7f16\u7801\u5b57\u7b26\u96c6\u57fa\u672c\u96c6 (Chinese ideogram coded character set for information interchange). GB 2312. https:\/\/archive.org\/details\/GB2312-1980\/  Standardization Administration of China. 1980. \u4fe1\u606f\u4ea4\u6362\u7528\u6c49\u5b57\u7f16\u7801\u5b57\u7b26\u96c6\u57fa\u672c\u96c6 (Chinese ideogram coded character set for information interchange). GB 2312. https:\/\/archive.org\/details\/GB2312-1980\/"},{"key":"e_1_3_2_1_43_1","volume-title":"Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Computer and Communications Security","author":"Raman Ram Sundara","year":"2020","unstructured":"Ram Sundara Raman , Prerana Shenoy , Katharina Kohls , and Roya Ensafi . 2020 . Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Computer and Communications Security . ACM , New York, NY , 49\u201366. https:\/\/doi.org\/10.1145\/3372297.3417883 10.1145\/3372297.3417883 Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. 2020. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In Computer and Communications Security. ACM, New York, NY, 49\u201366. https:\/\/doi.org\/10.1145\/3372297.3417883"},{"key":"e_1_3_2_1_44_1","unstructured":"teawithcarl. 2013. GitHub SSL replaced by self-signed certificate in China. Y Combinator. https:\/\/news.ycombinator.com\/item?id=5124784  teawithcarl. 2013. GitHub SSL replaced by self-signed certificate in China. Y Combinator. https:\/\/news.ycombinator.com\/item?id=5124784"},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Security Symposium. USENIX","author":"VanderSloot Benjamin","year":"2018","unstructured":"Benjamin VanderSloot , Allison McDonald , Will Scott , J.\u00a0 Alex Halderman , and Roya Ensafi . 2018 . Quack: Scalable remote measurement of application-layer censorship . In USENIX Security Symposium. USENIX , Baltimore, MD, 187\u2013202. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/vandersloot Benjamin VanderSloot, Allison McDonald, Will Scott, J.\u00a0Alex Halderman, and Roya Ensafi. 2018. Quack: Scalable remote measurement of application-layer censorship. In USENIX Security Symposium. USENIX, Baltimore, MD, 187\u2013202. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/vandersloot"},{"key":"e_1_3_2_1_46_1","volume-title":"Multilevel MDA-Lite Paris Traceroute. In Internet Measurement Conference. ACM","author":"Vermeulen Kevin","year":"2018","unstructured":"Kevin Vermeulen , Stephen\u00a0 D. Strowes , Olivier Fourmaux , and Timur Friedman . 2018 . Multilevel MDA-Lite Paris Traceroute. In Internet Measurement Conference. ACM , New York, NY, 29\u201342. https:\/\/doi.org\/10.1145\/3278532.3278536 10.1145\/3278532.3278536 Kevin Vermeulen, Stephen\u00a0D. Strowes, Olivier Fourmaux, and Timur Friedman. 2018. Multilevel MDA-Lite Paris Traceroute. In Internet Measurement Conference. ACM, New York, NY, 29\u201342. https:\/\/doi.org\/10.1145\/3278532.3278536"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_1_48_1","volume-title":"Privacy Enhancing Technologies","author":"Weinberg Zachary","year":"2017","unstructured":"Zachary Weinberg , Mahmood Sharif , Janos Szurdi , and Nicolas Christin . 2017. Topics of Controversy: An Empirical Analysis of Web Censorship Lists . In Privacy Enhancing Technologies . Sciendo , Berlin , 42\u201361. https:\/\/doi.org\/10.1515\/popets- 2017 -0004 10.1515\/popets-2017-0004 Zachary Weinberg, Mahmood Sharif, Janos Szurdi, and Nicolas Christin. 2017. Topics of Controversy: An Empirical Analysis of Web Censorship Lists. In Privacy Enhancing Technologies. Sciendo, Berlin, 42\u201361. https:\/\/doi.org\/10.1515\/popets-2017-0004"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.853818"},{"key":"e_1_3_2_1_50_1","volume-title":"Free and Open Communications on the Internet","author":"Xiong Ruohan","unstructured":"Ruohan Xiong and Jeffrey Knockel . 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message . In Free and Open Communications on the Internet . USENIX , Santa Clara, CA , 9\u00a0pages. https:\/\/www.usenix.org\/conference\/foci19\/presentation\/xiong Ruohan Xiong and Jeffrey Knockel. 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. In Free and Open Communications on the Internet. USENIX, Santa Clara, CA, 9\u00a0pages. https:\/\/www.usenix.org\/conference\/foci19\/presentation\/xiong"},{"key":"e_1_3_2_1_51_1","volume-title":"Passive and Active Measurement","author":"Xu Xueyang","year":"1926","unstructured":"Xueyang Xu , Z.\u00a0 Morley Mao , and J.\u00a0 Alex Halderman . 2011. Internet censorship in China: Where does the filtering occur? . In Passive and Active Measurement . Springer , Berlin, Heidelberg , 133\u2013142. https:\/\/doi.org\/10.1007\/978-3-642- 1926 0-9_14 10.1007\/978-3-642-19260-9_14 Xueyang Xu, Z.\u00a0Morley Mao, and J.\u00a0Alex Halderman. 2011. Internet censorship in China: Where does the filtering occur?. In Passive and Active Measurement. Springer, Berlin, Heidelberg, 133\u2013142. https:\/\/doi.org\/10.1007\/978-3-642-19260-9_14"}],"event":{"name":"WWW '21: The Web Conference 2021","location":"Ljubljana Slovenia","acronym":"WWW '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3450076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:27Z","timestamp":1750195467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":51,"alternative-id":["10.1145\/3442381.3450076","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3450076","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}