{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:35:44Z","timestamp":1759332944745,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506532","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"205-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario"],"prefix":"10.1145","author":[{"given":"Xuebin","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zeyu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing"}]},{"given":"Wentao","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing"}]},{"given":"Meiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing"}]},{"given":"Yanyan","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Cyber Security, People's Public Security University of China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"volume-title":"Users --- Tor Metrics. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2021-08-16&end=2021-11-14&country=all&events=off. ([n. d.]). Accessed","year":"2021","key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Tor Project , Users --- Tor Metrics. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2021-08-16&end=2021-11-14&country=all&events=off. ([n. d.]). Accessed November 2021 . [n. d.]. Tor Project, Users --- Tor Metrics. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2021-08-16&end=2021-11-14&country=all&events=off. ([n. d.]). Accessed November 2021."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Tor Project Users --- Tor Metrics. https:\/\/metrics.torproject.org\/userstats-bridge-transport.html?start=2021-08-16&end=2021-11-14&transport=!&lang;&transport=!&lang;&lang;OR&rang;&transport=obfs4&transport=meek. ([n. d.]). Accessed November 2021.  [n. d.]. Tor Project Users --- Tor Metrics. https:\/\/metrics.torproject.org\/userstats-bridge-transport.html?start=2021-08-16&end=2021-11-14&transport=!&lang;&transport=!&lang;&lang;OR&rang;&transport=obfs4&transport=meek. ([n. d.]). Accessed November 2021."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Tor Specification. ([n. d.]). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec-v2.txt  [n. d.]. Tor Specification. ([n. d.]). https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec-v2.txt"},{"key":"e_1_3_2_1_4_1","volume-title":"May","author":"Angel Yawning","year":"2014","unstructured":"Yawning Angel and Philipp Winter . [n. d.]. obfs4 (the obfourscator) , May 2014 . URl : https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc\/obfs4-spec.txt ([n. d.]). Yawning Angel and Philipp Winter. [n. d.]. obfs4 (the obfourscator), May 2014. URl: https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc\/obfs4-spec.txt ([n. d.])."},{"key":"e_1_3_2_1_5_1","first-page":"293","article-title":"Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace","volume":"2","author":"Christin Nicolas","year":"2012","unstructured":"Nicolas Christin . 2012 . Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace . Archives of Neurology 2 , 3 (2012), 293 . Nicolas Christin. 2012. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Archives of Neurology 2, 3 (2012), 293.","journal-title":"Archives of Neurology"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium. 1187--1203","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . k-fingerprinting: A Robust Scalable Website Fingerprinting Technique .. In USENIX Security Symposium. 1187--1203 . Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique.. In USENIX Security Symposium. 1187--1203."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00036"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23261"},{"key":"e_1_3_2_1_10_1","unstructured":"Albert Kwon Mashael Alsabah David Lazar Marc Dacier and Srinivas Devadas. 2015. Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In usenix security symposium. 287--302.  Albert Kwon Mashael Alsabah David Lazar Marc Dacier and Srinivas Devadas. 2015. Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In usenix security symposium. 287--302."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS50287.2020.9202018"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.  Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139564"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_16_1","volume-title":"Tor: The secondgeneration onion router. In Usenix Security.","author":"Syverson Paul","year":"2004","unstructured":"Paul Syverson , R Dingledine , and N Mathewson . 2004 . Tor: The secondgeneration onion router. In Usenix Security. Paul Syverson, R Dingledine, and N Mathewson. 2004. Tor: The secondgeneration onion router. In Usenix Security."},{"key":"e_1_3_2_1_17_1","volume-title":"An Obfs-based Tor Anonymous Communication Anline Identification Method. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 361--366","author":"Wang Han","year":"2020","unstructured":"Han Wang , Xiangyang Luo , and Yuchen Sun . 2020 . An Obfs-based Tor Anonymous Communication Anline Identification Method. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 361--366 . Han Wang, Xiangyang Luo, and Yuchen Sun. 2020. An Obfs-based Tor Anonymous Communication Anline Identification Method. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 361--366."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219717"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium. 143--157","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting .. In USENIX Security Symposium. 143--157 . Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting.. In USENIX Security Symposium. 143--157."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":20,"alternative-id":["10.1145\/3491396.3506532","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506532","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}