{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:36:03Z","timestamp":1774542963740,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["HR00112190126"],"award-info":[{"award-number":["HR00112190126"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599775","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:13:58Z","timestamp":1691172838000},"page":"3750-3761","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7607-520X","authenticated-orcid":false,"given":"Jacob","family":"Brown","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1652-8419","authenticated-orcid":false,"given":"Xi","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0835-8598","authenticated-orcid":false,"given":"Van","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2803-5649","authenticated-orcid":false,"given":"Arjun Nitin","family":"Bhagoji","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9868-3318","authenticated-orcid":false,"given":"Nguyen Phong","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4057-0118","authenticated-orcid":false,"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0718-6605","authenticated-orcid":false,"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"United States Freedom Score","year":"2022","unstructured":"2022. United States Freedom Score . Freedom House . ( 2022 ). https:\/\/ freedomhouse.org\/country\/united-states\/freedom-net\/2022 2022. United States Freedom Score. Freedom House. (2022). https:\/\/ freedomhouse.org\/country\/united-states\/freedom-net\/2022"},{"key":"e_1_3_2_2_2_1","volume-title":"Wild: Analyzing Internet Filtering in Syria. IMC","author":"Abdelberi C.","year":"2014","unstructured":"C. Abdelberi , T. Chen , M. Cunche , ED. Cristofaro , A. Friedman , and M. K\u00e2afar . 2014 . Censorship in the Wild: Analyzing Internet Filtering in Syria. IMC (2014). C. Abdelberi, T. Chen, M. Cunche, ED. Cristofaro, A. Friedman, and M. K\u00e2afar. 2014. Censorship in the Wild: Analyzing Internet Filtering in Syria. IMC (2014)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.03.008"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Charu C Aggarwal. 2017. An introduction to outlier analysis. In Outlier analysis. Charu C Aggarwal. 2017. An introduction to outlier analysis. In Outlier analysis.","DOI":"10.1007\/978-3-319-47578-3"},{"key":"e_1_3_2_2_5_1","volume-title":"Introduction to machine learning","author":"Alpaydin Ethem","unstructured":"Ethem Alpaydin . 2020. Introduction to machine learning . MIT press . Ethem Alpaydin. 2020. Introduction to machine learning. MIT press."},{"key":"e_1_3_2_2_6_1","volume-title":"Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. In FOCI.","author":"Anonymous","year":"2020","unstructured":"Anonymous , AA. Niaki , NP. Hoang , P. Gill , and A. Houmansadr . 2020 . Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. In FOCI. Anonymous, AA. Niaki, NP. Hoang, P. Gill, and A. Houmansadr. 2020. Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. In FOCI."},{"key":"e_1_3_2_2_7_1","volume-title":"Drebin: Effective and explainable detection of android malware in your pocket.. In NDSS.","author":"Arp D.","year":"2014","unstructured":"D. Arp , M. Spreitzenbarth , M. Hubner , H. Gascon , and K. Rieck . 2014 . Drebin: Effective and explainable detection of android malware in your pocket.. In NDSS. D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. 2014. Drebin: Effective and explainable detection of android malware in your pocket.. In NDSS."},{"key":"e_1_3_2_2_8_1","volume-title":"Iran: A First Look. In FOCI.","author":"Aryan S.","year":"2013","unstructured":"S. Aryan , H. Aryan , and AJ. Halderman . 2013 . Internet Censorship in Iran: A First Look. In FOCI. S. Aryan, H. Aryan, and AJ. Halderman. 2013. Internet Censorship in Iran: A First Look. In FOCI."},{"key":"e_1_3_2_2_9_1","unstructured":"S. Basso. 2021. Measuring DoT\/DoH Blocking Using OONI Probe. (2021). S. Basso. 2021. Measuring DoT\/DoH Blocking Using OONI Probe. (2021)."},{"key":"e_1_3_2_2_10_1","unstructured":"K. Bock Y. Fax K. Reese J. Singh and D. Levin. 2020. Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister. In FOCI. K. Bock Y. Fax K. Reese J. Singh and D. Levin. 2020. Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister. In FOCI."},{"key":"e_1_3_2_2_11_1","volume-title":"Geneva: Evolving Censorship Evasion Strategies. In CCS' 19.","author":"Bock Kevin","year":"2019","unstructured":"Kevin Bock , George Hughey , Xiao Qiang , and Dave Levin . 2019 . Geneva: Evolving Censorship Evasion Strategies. In CCS' 19. Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. 2019. Geneva: Evolving Censorship Evasion Strategies. In CCS' 19."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8020"},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/github. com\/censoredplanet\/censoredplanet\/blob\/master\/docs\/dns.rst","author":"Planet Censored","year":"2022","unstructured":"Censored Planet . 2022. Satellite Documentation . ( 2022 ). https:\/\/github. com\/censoredplanet\/censoredplanet\/blob\/master\/docs\/dns.rst Censored Planet. 2022. Satellite Documentation. (2022). https:\/\/github. com\/censoredplanet\/censoredplanet\/blob\/master\/docs\/dns.rst"},{"key":"e_1_3_2_2_14_1","volume-title":"https:\/\/docs. censoredplanet.org\/dns.html#satellite-v2-2","author":"Planet Censored","year":"2022","unstructured":"Censored Planet . 2022. Satellite V2.2. ( 2022 ). https:\/\/docs. censoredplanet.org\/dns.html#satellite-v2-2 Censored Planet. 2022. Satellite V2.2. (2022). https:\/\/docs. censoredplanet.org\/dns.html#satellite-v2-2"},{"key":"e_1_3_2_2_15_1","volume-title":"https:\/\/github.com\/citizenlab\/test-lists","author":"Lab Citizen","year":"2014","unstructured":"Citizen Lab . 2014. ( 2014 ). https:\/\/github.com\/citizenlab\/test-lists Citizen Lab. 2014. (2014). https:\/\/github.com\/citizenlab\/test-lists"},{"key":"e_1_3_2_2_16_1","volume-title":"Reset: Reclaiming the internet for civil society","author":"Deibert RJ.","year":"2020","unstructured":"RJ. Deibert . 2020 . Reset: Reclaiming the internet for civil society . House of Anansi . RJ. Deibert. 2020. Reset: Reclaiming the internet for civil society. House of Anansi."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 13th USENIX Security Symposium). 303--319","author":"Dingledine R.","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . 2004. Tor: The Second-Generation Onion Router . In Proceedings of the 13th USENIX Security Symposium). 303--319 . R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium). 303--319."},{"key":"e_1_3_2_2_18_1","unstructured":"H. Duan N. Weaver Z. Zhao M. Hu J. Liang J. Jiang K. Li and V. Paxson. 2012. Hold-On: Protecting Against On-Path DNS Poisoning. In STIN. H. Duan N. Weaver Z. Zhao M. Hu J. Liang J. Jiang K. Li and V. Paxson. 2012. Hold-On: Protecting Against On-Path DNS Poisoning. In STIN."},{"key":"e_1_3_2_2_19_1","volume-title":"OONI: Open Observatory of Network Interference. In FOCI.","author":"Filasto A.","year":"2012","unstructured":"A. Filasto and J. Appelbaum . 2012 . OONI: Open Observatory of Network Interference. In FOCI. A. Filasto and J. Appelbaum. 2012. OONI: Open Observatory of Network Interference. In FOCI."},{"key":"e_1_3_2_2_20_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman JH.","year":"2001","unstructured":"JH. Friedman . 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics ( 2001 ). JH. Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001)."},{"key":"e_1_3_2_2_21_1","unstructured":"L\u00e9o Grinsztajn Edouard Oyallon and Ga\u00ebl Varoquaux. 2022. Why do tree-based models still outperform deep learning on tabular data?. In Neurips. L\u00e9o Grinsztajn Edouard Oyallon and Ga\u00ebl Varoquaux. 2022. Why do tree-based models still outperform deep learning on tabular data?. In Neurips."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_2_23_1","unstructured":"G. Ho A. Cidon L. Gavish M. Schweighauser V. Paxson S. Savage GM. Voelker and G. Wagner. 2019. Detecting and characterizing lateral phishing at scale. In USENIX Security. G. Ho A. Cidon L. Gavish M. Schweighauser V. Paxson S. Savage GM. Voelker and G. Wagner. 2019. Detecting and characterizing lateral phishing at scale. In USENIX Security."},{"key":"e_1_3_2_2_24_1","volume-title":"https:\/\/gfwatch.org","author":"Hoang NP.","year":"2022","unstructured":"NP. Hoang . 2022. GF Watch Dashboard . ( 2022 ). https:\/\/gfwatch.org NP. Hoang. 2022. GFWatch Dashboard. (2022). https:\/\/gfwatch.org"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"NP. Hoang AA. Niaki N. Borisov P. Gill and M. Polychronakis. 2020. Assessing the Privacy Benefits of Domain Name Encryption. In AsiaCCS. NP. Hoang AA. Niaki N. Borisov P. Gill and M. Polychronakis. 2020. Assessing the Privacy Benefits of Domain Name Encryption. In AsiaCCS.","DOI":"10.1145\/3320269.3384728"},{"key":"e_1_3_2_2_26_1","volume-title":"30th USENIX Security Symposium.","author":"Hoang NP.","unstructured":"NP. Hoang , AA. Niaki , J. Dalek , J. Knockel , P. Lin , B. Marczak , M. Crete-Nishihata , P. Gill , and M. Polychronakis . 2021. How Great is the Great Firewall? Measuring China's DNS Censorship . In 30th USENIX Security Symposium. NP. Hoang, AA. Niaki, J. Dalek, J. Knockel, P. Lin, B. Marczak, M. Crete-Nishihata, P. Gill, and M. Polychronakis. 2021. How Great is the Great Firewall? Measuring China's DNS Censorship. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"N. Hoang A. Niaki P. Gill and M. Polychronakis. 2021. Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting. In PET. N. Hoang A. Niaki P. Gill and M. Polychronakis. 2021. Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting. In PET.","DOI":"10.2478\/popets-2021-0078"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"NP. Hoang AA. Niaki M. Polychronakis and P. Gill. 2020. The web is still small after more than a decade. CCR (2020). NP. Hoang AA. Niaki M. Polychronakis and P. Gill. 2020. The web is still small after more than a decade. CCR (2020).","DOI":"10.1145\/3402413.3402417"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"NP. Hoang M. Polychronakis and P. Gill. 2022. Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering. In PAM. NP. Hoang M. Polychronakis and P. Gill. 2022. Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering. In PAM.","DOI":"10.1007\/978-3-030-98785-5_23"},{"key":"e_1_3_2_2_30_1","unstructured":"A. Hounsel J. Holland B. Kaiser K. Borgolte N. Feamster and J. Mayer. 2020. Identifying disinformation websites using infrastructure features. In FOCI. A. Hounsel J. Holland B. Kaiser K. Borgolte N. Feamster and J. Mayer. 2020. Identifying disinformation websites using infrastructure features. In FOCI."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"S. Khattak M. Javed SA. Khayam ZA. Uzmi and V. Paxson. 2014. A Look at the Consequences of Internet Censorship Through an ISP Lens. In IMC. S. Khattak M. Javed SA. Khayam ZA. Uzmi and V. Paxson. 2014. A Look at the Consequences of Internet Censorship Through an ISP Lens. In IMC.","DOI":"10.1145\/2663716.2663750"},{"key":"e_1_3_2_2_32_1","unstructured":"FT. Liu KM. Ting and Z. Zhou. [n. d.]. Isolation forest. In ICDM. FT. Liu KM. Ting and Z. Zhou. [n. d.]. Isolation forest. In ICDM."},{"key":"e_1_3_2_2_33_1","unstructured":"S. Lundberg and S. Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems (2017). S. Lundberg and S. Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems (2017)."},{"key":"e_1_3_2_2_34_1","volume-title":"Forbidden: A Global View of CDN Geoblocking. In IMC.","author":"McDonald A.","year":"2018","unstructured":"A. McDonald , M. Bernhard , L. Valenta , B. VanderSloot , W. Scott , N. Sullivan , JA. Halderman , and R. Ensafi . 2018 . 403 Forbidden: A Global View of CDN Geoblocking. In IMC. A. McDonald, M. Bernhard, L. Valenta, B. VanderSloot, W. Scott, N. Sullivan, JA. Halderman, and R. Ensafi. 2018. 403 Forbidden: A Global View of CDN Geoblocking. In IMC."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Y. Mirsky T. Doitshman Y. Elovici and A. Shabtai. 2018. Kitsune: an ensemble of autoencoders for online network intrusion detection. (2018). Y. Mirsky T. Doitshman Y. Elovici and A. Shabtai. 2018. Kitsune: an ensemble of autoencoders for online network intrusion detection. (2018).","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain Names - Implementation And Specification. RFC 1035. IETF. https:\/\/tools.ietf.org\/html\/rfc1035 P. Mockapetris. 1987. Domain Names - Implementation And Specification. RFC 1035. IETF. https:\/\/tools.ietf.org\/html\/rfc1035","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_37_1","unstructured":"Z. Nabi. 2013. The Anatomy of Web Censorship in Pakistan. In FOCI. Z. Nabi. 2013. The Anatomy of Web Censorship in Pakistan. In FOCI."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"AA. Niaki S. Cho Z. Weinberg NP. Hoang A. Razaghpanah N. Christin and P. Gill. 2020. ICLab: A Global Longitudinal Internet Censorship Measurement Platform. In IEEESP. AA. Niaki S. Cho Z. Weinberg NP. Hoang A. Razaghpanah N. Christin and P. Gill. 2020. ICLab: A Global Longitudinal Internet Censorship Measurement Platform. In IEEESP.","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_2_39_1","unstructured":"D Nobori and Y Shinjo. 2014. VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. USENIX NSDI. D Nobori and Y Shinjo. 2014. VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. USENIX NSDI."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"S. Nourin V. Tran X. Jiang K. Bock N. Feamster NP. Hoang and D. Levin. 2023. Measuring and Evading Turkmenistan's Internet Censorship. In WWW. S. Nourin V. Tran X. Jiang K. Bock N. Feamster NP. Hoang and D. Levin. 2023. Measuring and Evading Turkmenistan's Internet Censorship. In WWW.","DOI":"10.1145\/3543507.3583189"},{"key":"e_1_3_2_2_41_1","unstructured":"NP. Hoang and S. Doreen and M. Polychronakis. 2019. Measuring I2P Censorship at a Global Scale. In USENIX FOCI. NP. Hoang and S. Doreen and M. Polychronakis. 2019. Measuring I2P Censorship at a Global Scale. In USENIX FOCI."},{"key":"e_1_3_2_2_42_1","unstructured":"OONI. 2021. OONI's test for Washington Post on 2021\/09\/08. (2021). https:\/\/explorer.ooni.org\/measurement\/20210908T091405Z_ webconnectivity_CN_4837_n1_pFAh6EtU8Px3gwku?input=https%3A%2F%2Fwww.washingtonpost.com%2F OONI. 2021. OONI's test for Washington Post on 2021\/09\/08. (2021). https:\/\/explorer.ooni.org\/measurement\/20210908T091405Z_ webconnectivity_CN_4837_n1_pFAh6EtU8Px3gwku?input=https%3A%2F%2Fwww.washingtonpost.com%2F"},{"key":"e_1_3_2_2_43_1","unstructured":"OONI. 2022. Blocking fingerprints intended for confirming website censorship. (2022). https:\/\/github.com\/ooni\/blocking-fingerprints\/blob\/ main\/fingerprints_dns.csv OONI. 2022. Blocking fingerprints intended for confirming website censorship. (2022). https:\/\/github.com\/ooni\/blocking-fingerprints\/blob\/ main\/fingerprints_dns.csv"},{"key":"e_1_3_2_2_44_1","unstructured":"OONI. 2022. Censorship Detection Rules. (2022). https:\/\/github.com\/ooni\/ pipeline\/blob\/master\/af\/fastpath\/fastpath\/utils.py OONI. 2022. Censorship Detection Rules. (2022). https:\/\/github.com\/ooni\/ pipeline\/blob\/master\/af\/fastpath\/fastpath\/utils.py"},{"key":"e_1_3_2_2_45_1","unstructured":"OONI. 2022. Documentation for features in raw OONI measurement records. (2022). https:\/\/github.com\/ooni\/spec\/tree\/master\/data-formats OONI. 2022. Documentation for features in raw OONI measurement records. (2022). https:\/\/github.com\/ooni\/spec\/tree\/master\/data-formats"},{"key":"e_1_3_2_2_46_1","volume-title":"FQA: What do you mean by Anomalies?","author":"OONI.","year":"2022","unstructured":"OONI. 2022 . FQA: What do you mean by Anomalies? (2022). https:\/\/ooni. org\/support\/faq\/#what-do-you-mean-by-anomalies OONI. 2022. FQA: What do you mean by Anomalies? (2022). https:\/\/ooni. org\/support\/faq\/#what-do-you-mean-by-anomalies"},{"key":"e_1_3_2_2_47_1","volume-title":"Augur: Internet-Wide Detection of Connectivity Disruptions","author":"Pearce P.","year":"2017","unstructured":"P. Pearce , R. Ensafi , F. Li , N. Feamster , and V. Paxson . 2017 . Augur: Internet-Wide Detection of Connectivity Disruptions . IEEESP. P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson. 2017. Augur: Internet-Wide Detection of Connectivity Disruptions. IEEESP."},{"key":"e_1_3_2_2_48_1","volume-title":"Global Measurement of DNS Manipulation. In USENIX Security Symposium.","author":"Pearce P.","unstructured":"P. Pearce , Ben Jones , F. Li , Roya Ensafi , N. Feamster , N. Weaver , and V. Paxson . 2017 . Global Measurement of DNS Manipulation. In USENIX Security Symposium. P. Pearce, Ben Jones, F. Li, Roya Ensafi, N. Feamster, N. Weaver, and V. Paxson. 2017. Global Measurement of DNS Manipulation. In USENIX Security Symposium."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"B. Polverini and W. Pottenger. 2011. Using clustering to detect Chinese censor- ware. In CSIIRW. B. Polverini and W. Pottenger. 2011. Using clustering to detect Chinese censor- ware. In CSIIRW.","DOI":"10.1145\/2179298.2179331"},{"key":"e_1_3_2_2_50_1","unstructured":"P. Ramakrishna A. Filast\u00f2 M. Xynou RS. Raman K. Middleton M. Zhang D. Madory M. Roberts and A. Dainotti. 2021. A multi-perspective view of Internet censorship in Myanmar. FOCI. P. Ramakrishna A. Filast\u00f2 M. Xynou RS. Raman K. Middleton M. Zhang D. Madory M. Roberts and A. Dainotti. 2021. A multi-perspective view of Internet censorship in Myanmar. FOCI."},{"key":"e_1_3_2_2_51_1","volume-title":"Censored Planet: An Internet- wide, Longitudinal Censorship Observatory. In CCS.","author":"Raman RS.","year":"2020","unstructured":"RS. Raman , P. Shenoy , K. Kohls , and R. Ensafi . 2020 . Censored Planet: An Internet- wide, Longitudinal Censorship Observatory. In CCS. RS. Raman, P. Shenoy, K. Kohls, and R. Ensafi. 2020. Censored Planet: An Internet- wide, Longitudinal Censorship Observatory. In CCS."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"RS. Raman A. Stoll J. Dalek R. Ramesh W. Scott and R. Ensafi. 2020. Measuring the Deployment of Network Censorship Filters at Global Scale. In NDSS. RS. Raman A. Stoll J. Dalek R. Ramesh W. Scott and R. Ensafi. 2020. Measuring the Deployment of Network Censorship Filters at Global Scale. In NDSS.","DOI":"10.14722\/ndss.2020.23099"},{"key":"e_1_3_2_2_53_1","volume-title":"Decentralized Control: A Case Study of Russia. In NDSS.","author":"Ramesh R.","year":"2020","unstructured":"R. Ramesh , RS. Raman , M. Bernhard , V. Ongkowijaya , L. Evdokimov , A. Edmundson , S. Sprecher , M. Ikram , and R. Ensafi . 2020 . Decentralized Control: A Case Study of Russia. In NDSS. R. Ramesh, RS. Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, and R. Ensafi. 2020. Decentralized Control: A Case Study of Russia. In NDSS."},{"key":"e_1_3_2_2_54_1","unstructured":"RIPE. 2022. RIPE Atlas Population Coverage. (2022). https:\/\/sg-pub.ripe. net\/petros\/population_coverage\/ RIPE. 2022. RIPE Atlas Population Coverage. (2022). https:\/\/sg-pub.ripe. net\/petros\/population_coverage\/"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"B. Sch\u00f6lkopf AJ. Smola F. Bach etal 2002. Learning with kernels: support vector machines regularization optimization and beyond. MIT press. B. Sch\u00f6lkopf AJ. Smola F. Bach et al. 2002. Learning with kernels: support vector machines regularization optimization and beyond. MIT press.","DOI":"10.7551\/mitpress\/4175.001.0001"},{"key":"e_1_3_2_2_56_1","volume-title":"Satellite: Joint Analysis of CDNs and Network-Level Interference. In ATC.","author":"Scott W.","year":"2016","unstructured":"W. Scott , T. Anderson , T. Kohno , and A. Krishnamurthy . 2016 . Satellite: Joint Analysis of CDNs and Network-Level Interference. In ATC. W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. 2016. Satellite: Joint Analysis of CDNs and Network-Level Interference. In ATC."},{"key":"e_1_3_2_2_57_1","volume-title":"The Collateral Damage of Internet Censorship by DNS Injection. SIGCOMM CCR","author":"Neo Sparks","year":"2021","unstructured":"Sparks and Neo and Tank and Smith and Dozer. 2021. The Collateral Damage of Internet Censorship by DNS Injection. SIGCOMM CCR ( 2021 ). Sparks and Neo and Tank and Smith and Dozer. 2021. The Collateral Damage of Internet Censorship by DNS Injection. SIGCOMM CCR (2021)."},{"key":"e_1_3_2_2_58_1","volume-title":"Quack: Scalable Remote Measurement of Application-Layer Censorship.","author":"VanderSloot B.","year":"2018","unstructured":"B. VanderSloot , A. McDonald , W. Scott , A. Halderman , and R. Ensafi . 2018 . Quack: Scalable Remote Measurement of Application-Layer Censorship. B. VanderSloot, A. McDonald, W. Scott, A. Halderman, and R. Ensafi. 2018. Quack: Scalable Remote Measurement of Application-Layer Censorship."},{"key":"e_1_3_2_2_59_1","volume-title":"Uganda: Data on internet blocks and nationwide internet outage amid 2021 general election.","author":"Xynou M.","year":"2021","unstructured":"M. Xynou , S. Basso , R. Padmanabhan , and A. Filast\u00f2 . 2021 . Uganda: Data on internet blocks and nationwide internet outage amid 2021 general election. (2021). M. Xynou, S. Basso, R. Padmanabhan, and A. Filast\u00f2. 2021. Uganda: Data on internet blocks and nationwide internet outage amid 2021 general election. (2021)."},{"key":"e_1_3_2_2_60_1","unstructured":"M. Xynou and A. Filast\u00f2. 2021. How countries attempt to block Signal Private Messenger App around the world. (2021). M. Xynou and A. Filast\u00f2. 2021. How countries attempt to block Signal Private Messenger App around the world. (2021)."},{"key":"e_1_3_2_2_61_1","unstructured":"M. Xynou and A. Filast\u00f2. 2021. Russia started blocking Tor. (2021). M. Xynou and A. Filast\u00f2. 2021. Russia started blocking Tor. (2021)."},{"key":"e_1_3_2_2_62_1","volume-title":"Zambia: Social media blocked amid 2021 general elections.","author":"Xynou M.","year":"2021","unstructured":"M. Xynou and A. Filast\u00f2 . 2021 . Zambia: Social media blocked amid 2021 general elections. (2021). M. Xynou and A. Filast\u00f2. 2021. Zambia: Social media blocked amid 2021 general elections. (2021)."},{"key":"e_1_3_2_2_63_1","volume-title":"Ukraine: An OONI network measurement analysis.","author":"Xynou M.","year":"2022","unstructured":"M. Xynou and A. Filast\u00f2 . 2022 . New blocks emerge in Russia amid war in Ukraine: An OONI network measurement analysis. (2022). M. Xynou and A. Filast\u00f2. 2022. New blocks emerge in Russia amid war in Ukraine: An OONI network measurement analysis. (2022)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"TK. Yadav A. Sinha D. Gosain PK. Sharma and S. Chakravarty. 2018. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In IMC. TK. Yadav A. Sinha D. Gosain PK. Sharma and S. Chakravarty. 2018. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In IMC.","DOI":"10.1145\/3278532.3278555"},{"key":"e_1_3_2_2_65_1","unstructured":"K. Yang S. Kpotufe and N. Feamster. 2020. Feature Extraction for Novelty Detection in Network Traffic. (2020). K. Yang S. Kpotufe and N. Feamster. 2020. Feature Extraction for Novelty Detection in Network Traffic. (2020)."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599775","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":66,"alternative-id":["10.1145\/3580305.3599775","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599775","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}