{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:07Z","timestamp":1766484247189,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Plan of China","award":["2020YFB1805204"],"award-info":[{"award-number":["2020YFB1805204"]}]},{"name":"Science Foundation of Jiangsu Province of China","award":["BK20201266"],"award-info":[{"award-number":["BK20201266"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1145\/3600061.3600080","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T03:40:40Z","timestamp":1693971640000},"page":"109-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Online Detection of 1D and 2D Hierarchical Super-Spreaders in High-Speed Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3681-0406","authenticated-orcid":false,"given":"Hao","family":"Su","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5353-9374","authenticated-orcid":false,"given":"Qingjun","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University of China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. CAIDA UCSD anonymized 2017 internet traces on Jan. 17. http:\/\/www.caida.org\/data\/passive\/passive_2017_dataset.xml. (2017)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024623"},{"volume-title":"Proc","author":"Baldoni Roberto","key":"e_1_3_2_1_3_1","unstructured":"Roberto Baldoni, Giuseppe\u00a0Antonio Di\u00a0Luna, and Leonardo Querzoni. 2013. Collaborative detection of coordinated port scans. In Proc. of ICDCN. Springer, 102\u2013117."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098832"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276336"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131377"},{"volume-title":"Proc","author":"Cormode Graham","key":"e_1_3_2_1_8_1","unstructured":"Graham Cormode, Flip Korn, Shanmugavelayutham Muthukrishnan, and Divesh Srivastava. 2003. Finding hierarchical heavy hitters in data streams. In Proc. of VLDB. Elsevier, 464\u2013475."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324172.1324174"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of USENIX. 817\u2013832","author":"Fayaz K","year":"2015","unstructured":"Seyed\u00a0K Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and elastic ddos defense. In Proc. of USENIX. 817\u2013832."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Philippe Flajolet \u00c9ric Fusy Olivier Gandouet and Fr\u00e9d\u00e9ric Meunier. 2007. Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. In DMTCS. Discrete Mathematics and Theoretical Computer Science 137\u2013156.","DOI":"10.46298\/dmtcs.3545"},{"key":"e_1_3_2_1_12_1","first-page":"514","article-title":"Detection of superpoints using a vector bloom filter","volume":"11","author":"Liu Weijiang","year":"2015","unstructured":"Weijiang Liu, Wenyu Qu, Jian Gong, and Keqiu Li. 2015. Detection of superpoints using a vector bloom filter. IEEE TITF 11, 3 (2015), 514\u2013527.","journal-title":"IEEE TITF"},{"key":"e_1_3_2_1_13_1","first-page":"547","article-title":"Identifying high-cardinality hosts from network-wide traffic measurements","volume":"13","author":"Liu Yang","year":"2015","unstructured":"Yang Liu, Wenji Chen, and Yong Guan. 2015. Identifying high-cardinality hosts from network-wide traffic measurements. IEEE TDSC 13, 5 (2015), 547\u2013558.","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3108033"},{"volume-title":"Proc","author":"Mitzenmacher Michael","key":"e_1_3_2_1_15_1","unstructured":"Michael Mitzenmacher, Thomas Steinke, and Justin Thaler. 2012. Hierarchical heavy hitters with the space saving algorithm. In Proc. of ALENEX. SIAM, 160\u2013174."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2021.110718"},{"key":"e_1_3_2_1_17_1","first-page":"803","article-title":"Computing hierarchical summary from two-dimensional big data streams","volume":"29","author":"Shah Zubair","year":"2017","unstructured":"Zubair Shah, Abdun\u00a0Naser Mahmood, Michael Barlow, Zahir Tari, Xun Yi, and Albert\u00a0Y Zomaya. 2017. Computing hierarchical summary from two-dimensional big data streams. IEEE TPDS 29, 4 (2017), 803\u2013818.","journal-title":"IEEE TPDS"},{"volume-title":"Proc","author":"Studer Ahren","key":"e_1_3_2_1_18_1","unstructured":"Ahren Studer and Adrian Perrig. 2009. The coremelt attack. In Proc. of ESORICS. Springer, 37\u201352."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"},{"key":"e_1_3_2_1_20_1","volume-title":"MVPipe: Enabling Lightweight Updates and Fast Convergence in Hierarchical Heavy Hitter Detection. arXiv preprint arXiv:2107.05954","author":"Tang Lu","year":"2021","unstructured":"Lu Tang, Qun Huang, and Patrick\u00a0PC Lee. 2021. MVPipe: Enabling Lightweight Updates and Fast Convergence in Hierarchical Heavy Hitter Detection. arXiv preprint arXiv:2107.05954 (2021)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2015.30"},{"key":"e_1_3_2_1_22_1","first-page":"1086","article-title":"A data streaming method for monitoring host connection degrees of high-speed links","volume":"6","author":"Wang Pinghui","year":"2011","unstructured":"Pinghui Wang, Xiaohong Guan, Tao Qin, and Qiuzhen Huang. 2011. A data streaming method for monitoring host connection degrees of high-speed links. IEEE TITF 6, 3 (2011), 1086\u20131098.","journal-title":"IEEE TITF"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188227"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2753842"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521269"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2080285"}],"event":{"name":"APNET 2023: 7th Asia-Pacific Workshop on Networking","acronym":"APNET 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 7th Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600061.3600080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600061.3600080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:50Z","timestamp":1750178210000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600061.3600080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":26,"alternative-id":["10.1145\/3600061.3600080","10.1145\/3600061"],"URL":"https:\/\/doi.org\/10.1145\/3600061.3600080","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]},"assertion":[{"value":"2023-09-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}