{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T20:28:39Z","timestamp":1775161719925,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,27]]},"DOI":"10.1145\/3473604.3474560","type":"proceedings-article","created":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T20:52:03Z","timestamp":1629319923000},"page":"8-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Measuring QQMail's automated email censorship in China"],"prefix":"10.1145","author":[{"given":"Jeffrey","family":"Knockel","sequence":"first","affiliation":[{"name":"Citizen Lab, University of Toronto"}]},{"given":"Lotus","family":"Ruan","sequence":"additional","affiliation":[{"name":"Citizen Lab, University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet","author":"Anonymous","year":"2014","unstructured":"Anonymous . 2014 . Towards a Comprehensive Picture of the Great Firewall's DNS Censorship . USENIX Workshop on Free and Open Communications on the Internet (2014). https:\/\/www.usenix.org\/system\/files\/conference\/foci14\/foci14-anonymous.pdf Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. USENIX Workshop on Free and Open Communications on the Internet (2014). https:\/\/www.usenix.org\/system\/files\/conference\/foci14\/foci14-anonymous.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Miguel Araujo. 2017. What is QQ Mail and what is it for? Available at https:\/\/www.qqmail.info\/what-is-qq-mail-and-what-is-it-for.html. (2017).  Miguel Araujo. 2017. What is QQ Mail and what is it for? Available at https:\/\/www.qqmail.info\/what-is-qq-mail-and-what-is-it-for.html. (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 586--598","author":"Bock Kevin","year":"2020","unstructured":"Kevin Bock , George Hughey , Louis-Henri Merino , Tania Arya , Daniel Liscinsky , Regina Pogosian , and Dave Levin . 2020 . Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion . In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 586--598 . Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, and Dave Levin. 2020. Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 586--598."},{"key":"e_1_3_2_1_4_1","unstructured":"Carolyn Clancy. 2020. Country overview: China. Available at https:\/\/help.returnpath.com\/hc\/en-us\/articles\/220562707-Country-overview-China-. (2020).  Carolyn Clancy. 2020. Country overview: China. Available at https:\/\/help.returnpath.com\/hc\/en-us\/articles\/220562707-Country-overview-China-. (2020)."},{"key":"e_1_3_2_1_5_1","volume-title":"Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (6","author":"Crandall Jedidiah R.","year":"2013","unstructured":"Jedidiah R. Crandall , Masashi Crete-Nishihata , Jeffrey Knockel , Sarah McKune , Adam Senft , Diana Tseng , and Greg Wiseman . 2013. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (6 2013 ). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4628\/3727 Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman. 2013. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (6 2013). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4628\/3727"},{"key":"e_1_3_2_1_6_1","volume-title":"14th ACM Conference on Computer and Communications Security","author":"Crandall Jedidiah R.","year":"2007","unstructured":"Jedidiah R. Crandall , Daniel Zinn , Michael Byrd , Earl Barr , and Ric East . 2007 . ConceptDoppler: A weather tracker for Internet censorship . In 14th ACM Conference on Computer and Communications Security , Oct. 29-Nov 2, 2007. 1--18. Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, and Ric East. 2007. ConceptDoppler: A weather tracker for Internet censorship. In 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov 2, 2007. 1--18."},{"key":"e_1_3_2_1_7_1","volume-title":"Enabling Xi Jinping To Rule Indefinitely. (3","author":"Doubek James","year":"2018","unstructured":"James Doubek . 2018. China Removes Presidential Term Limits , Enabling Xi Jinping To Rule Indefinitely. (3 2018 ). James Doubek. 2018. China Removes Presidential Term Limits, Enabling Xi Jinping To Rule Indefinitely. (3 2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research. INternational and Pan-American Copyright Conventions, New Jersey.","author":"Glaser Barney","year":"2006","unstructured":"Barney Glaser and Anselm Strauss . 2006 . The Discovery of Grounded Theory: Strategies for Qualitative Research. INternational and Pan-American Copyright Conventions, New Jersey. Barney Glaser and Anselm Strauss. 2006. The Discovery of Grounded Theory: Strategies for Qualitative Research. INternational and Pan-American Copyright Conventions, New Jersey."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. [n. d.]. Create task-specific email addresses. Available at https:\/\/support.google.com\/a\/users\/answer\/9308648?hl=en. ([n. d.]).  Google. [n. d.]. Create task-specific email addresses. Available at https:\/\/support.google.com\/a\/users\/answer\/9308648?hl=en. ([n. d.])."},{"key":"e_1_3_2_1_10_1","volume-title":"Asia Chats: Investigating Regionally-based Keyword Censorship in LINE. Technical Report. Citizen Lab","author":"Hardy Seth","year":"2013","unstructured":"Seth Hardy . 2013 . Asia Chats: Investigating Regionally-based Keyword Censorship in LINE. Technical Report. Citizen Lab , University of Toronto . https:\/\/citizenlab.ca\/2013\/11\/asia-chats-investigating-regionally-based-keyword-censorship-line\/ Seth Hardy. 2013. Asia Chats: Investigating Regionally-based Keyword Censorship in LINE. Technical Report. Citizen Lab, University of Toronto. https:\/\/citizenlab.ca\/2013\/11\/asia-chats-investigating-regionally-based-keyword-censorship-line\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis.","author":"Hoang Nguyen Phong","year":"2021","unstructured":"Nguyen Phong Hoang , Arian Akhavan Niaki , Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021 . How Great is the Great Firewall? Measuring China's DNS Censorship . (2021). arXiv:cs.CR\/2106.02167 Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021. How Great is the Great Firewall? Measuring China's DNS Censorship. (2021). arXiv:cs.CR\/2106.02167"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055413000014"},{"key":"e_1_3_2_1_13_1","volume-title":"Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In 5th USENIX Workshop on Free and Open Communications on the Internet.","author":"Knockel Jeffrey","unstructured":"Jeffrey Knockel , Masashi Crete-Nishihata , Jason Q. Ng , Adam Senft , and Jedidiah R. Crandall . 2015 . Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In 5th USENIX Workshop on Free and Open Communications on the Internet. Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, and Jedidiah R. Crandall. 2015. Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In 5th USENIX Workshop on Free and Open Communications on the Internet."},{"key":"e_1_3_2_1_14_1","volume-title":"First Workshop on NLP for Internet Freedom. https:\/\/www.aclweb.org\/anthology\/W18-4201","author":"Knockel Jeffrey","year":"2018","unstructured":"Jeffrey Knockel , Masashi Crete-Nishihata , and Lotus Ruan . 2018 . The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects . In First Workshop on NLP for Internet Freedom. https:\/\/www.aclweb.org\/anthology\/W18-4201 Jeffrey Knockel, Masashi Crete-Nishihata, and Lotus Ruan. 2018. The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects. In First Workshop on NLP for Internet Freedom. https:\/\/www.aclweb.org\/anthology\/W18-4201"},{"key":"e_1_3_2_1_15_1","volume-title":"7th USENIX Workshop on Free and Open Communications on the Internet. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/knockel","author":"Knockel Jeffrey","year":"2017","unstructured":"Jeffrey Knockel , Lotus Ruan , and Masashi Crete-Nishihata . 2017 . Measuring Decentralization of Chinese Keyword Censorship via Mobile Games . In 7th USENIX Workshop on Free and Open Communications on the Internet. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/knockel Jeffrey Knockel, Lotus Ruan, and Masashi Crete-Nishihata. 2017. Measuring Decentralization of Chinese Keyword Censorship via Mobile Games. In 7th USENIX Workshop on Free and Open Communications on the Internet. https:\/\/www.usenix.org\/conference\/foci17\/workshop-program\/presentation\/knockel"},{"key":"e_1_3_2_1_16_1","volume-title":"How companies censor bloggers. First Monday 14, 2","author":"MacKinnon Rebecca","year":"2009","unstructured":"Rebecca MacKinnon . 2009. China's Censorship 2.0 : How companies censor bloggers. First Monday 14, 2 ( 2009 ). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2378\/2089 Rebecca MacKinnon. 2009. China's Censorship 2.0: How companies censor bloggers. First Monday 14, 2 (2009). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2378\/2089"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"Blake Miller. 2019. The Limits of Commercialized Censorship in China. (2019). https:\/\/doi.org\/10.31235\/osf.io\/wn7pr 10.31235\/osf.io","DOI":"10.31235\/osf.io\/wn7pr"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"Blake Miller. 2019. The Limits of Commercialized Censorship in China. (2019). https:\/\/doi.org\/10.31235\/osf.io\/wn7pr","DOI":"10.31235\/osf.io\/wn7pr"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.1.117"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 30th Web Conference (WWW'21)","author":"Rambert R","year":"2021","unstructured":"R Rambert , Z Weinberg , D Barradas , and N Christin . 2021 . Chinese wall or Swiss cheese? Keyword filtering in the Great Firewall of China . In Proceedings of the 30th Web Conference (WWW'21) . Ljubljana, Slovenia (online). R Rambert, Z Weinberg, D Barradas, and N Christin. 2021. Chinese wall or Swiss cheese? Keyword filtering in the Great Firewall of China. In Proceedings of the 30th Web Conference (WWW'21). Ljubljana, Slovenia (online)."},{"key":"e_1_3_2_1_20_1","volume-title":"One App","author":"Ruan Lotus","year":"2016","unstructured":"Lotus Ruan , Jeffrey Knockel , Jason Q. Ng , and Masashi Crete-Nishihata . 2016. One App , Two Systems : How WeChat uses one censorship policy in China and another internationally. Technical Report. Citizen Lab, University of Toronto . https:\/\/citizenlab.ca\/ 2016 \/11\/wechat-china-censorship-one-app-two-systems\/ Lotus Ruan, Jeffrey Knockel, Jason Q. Ng, and Masashi Crete-Nishihata. 2016. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally. Technical Report. Citizen Lab, University of Toronto. https:\/\/citizenlab.ca\/2016\/11\/wechat-china-censorship-one-app-two-systems\/"},{"key":"e_1_3_2_1_21_1","volume-title":"Delegated Censorship: The Dynamic, Layered, and Multistage Information Control Regime in China","author":"Sun Taiyi","year":"2021","unstructured":"Taiyi Sun and Quansheng Zhao . 2021 . Delegated Censorship: The Dynamic, Layered, and Multistage Information Control Regime in China . Politics & Society ( 2021), 00323292211013181. Taiyi Sun and Quansheng Zhao. 2021. Delegated Censorship: The Dynamic, Layered, and Multistage Information Control Regime in China. Politics & Society (2021), 00323292211013181."},{"key":"e_1_3_2_1_22_1","volume-title":"The Not-So-Great Firewall of China. 2600 23, 4","year":"2006","unstructured":"Tokachu. 2006. The Not-So-Great Firewall of China. 2600 23, 4 ( 2006 ), 58--60. Tokachu. 2006. The Not-So-Great Firewall of China. 2600 23, 4 (2006), 58--60."},{"key":"e_1_3_2_1_24_1","unstructured":"United States Department of State and the Broadcasting Board of Governors Office of Inspector General. 2010. Report of Inspection: Voice of America's Chinese Branch. Available at https:\/\/www.stateoig.gov\/system\/files\/145823.pdf. (2010).  United States Department of State and the Broadcasting Board of Governors Office of Inspector General. 2010. Report of Inspection: Voice of America's Chinese Branch. Available at https:\/\/www.stateoig.gov\/system\/files\/145823.pdf. (2010)."},{"key":"e_1_3_2_1_25_1","volume-title":"9th USENIX Workshop on Free and Open Communications on the Internet. Santa Clara.","author":"Xiong Ruohan","year":"2019","unstructured":"Ruohan Xiong and Jeffrey Knockel . 2019 . An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message . In 9th USENIX Workshop on Free and Open Communications on the Internet. Santa Clara. Ruohan Xiong and Jeffrey Knockel. 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. In 9th USENIX Workshop on Free and Open Communications on the Internet. Santa Clara."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security. 227--240","author":"Zhu Tao","year":"2013","unstructured":"Tao Zhu , David Phipps , Adam Pridgen , Jedidiah R Crandall , and Dan S Wallach . 2013 . The Velocity of Censorship: High-fidelity Detection of Microblog Post Deletions . In Proceedings of the 22nd USENIX Conference on Security. 227--240 . Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R Crandall, and Dan S Wallach. 2013. The Velocity of Censorship: High-fidelity Detection of Microblog Post Deletions. In Proceedings of the 22nd USENIX Conference on Security. 227--240."},{"key":"e_1_3_2_1_27_1","unstructured":"\u56fd\u5bb6\u4e92\u8054\u7f51\u5e94\u6025\u4e2d\u5fc3. 2003. \u4e2d\u56fd\u4e92\u8054\u7f51\u53cd\u5783\u573e\u90ae\u4ef6\u7684\u73b0\u72b6. (9 2003). https:\/\/www.cert.org.cn\/publish\/main\/49\/2012\/20120330182937909855444\/20120330182937909855444_.html  \u56fd\u5bb6\u4e92\u8054\u7f51\u5e94\u6025\u4e2d\u5fc3. 2003. \u4e2d\u56fd\u4e92\u8054\u7f51\u53cd\u5783\u573e\u90ae\u4ef6\u7684\u73b0\u72b6. (9 2003). https:\/\/www.cert.org.cn\/publish\/main\/49\/2012\/20120330182937909855444\/20120330182937909855444_.html"},{"key":"e_1_3_2_1_28_1","unstructured":"\u79e6\u515d. 2015. \u8be6\u8ff0GFW\u5bf9SMTP\u534f\u8bae\u7684\u4e09\u79cd\u5c01\u9501\u624b\u6cd5. Available at https:\/\/fqrouter.tumblr.com\/post\/43400982633\/gfwsmtp. (2015).  \u79e6\u515d. 2015. \u8be6\u8ff0GFW\u5bf9SMTP\u534f\u8bae\u7684\u4e09\u79cd\u5c01\u9501\u624b\u6cd5. Available at https:\/\/fqrouter.tumblr.com\/post\/43400982633\/gfwsmtp. (2015)."}],"event":{"name":"SIGCOMM '21: ACM SIGCOMM 2021 Conference","location":"Virtual Event USA","acronym":"SIGCOMM '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473604.3474560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3473604.3474560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:14Z","timestamp":1750193294000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473604.3474560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":28,"alternative-id":["10.1145\/3473604.3474560","10.1145\/3473604"],"URL":"https:\/\/doi.org\/10.1145\/3473604.3474560","relation":{},"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"2021-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}