{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:57Z","timestamp":1755839577283,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603906","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"701-707","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Network Time Covert Channels Based on Image Processing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5666-4556","authenticated-orcid":false,"given":"Xuwen","family":"Huang","sequence":"first","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9030-0266","authenticated-orcid":false,"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7706-6734","authenticated-orcid":false,"given":"Zhiqiang","family":"Li","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2680-6892","authenticated-orcid":false,"given":"Teng","family":"Zhan","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3118853"},{"key":"e_1_3_2_1_3_1","volume-title":"Using covert timing channels for attack detection in MANETs[C]\/\/MILCOM 2012-2012 IEEE Military Communications Conference","author":"Edwards J J","year":"2012","unstructured":"Edwards J J , Brown J D , Mason P C . Using covert timing channels for attack detection in MANETs[C]\/\/MILCOM 2012-2012 IEEE Military Communications Conference . IEEE , 2012 : 1-7. Edwards J J, Brown J D, Mason P C. Using covert timing channels for attack detection in MANETs[C]\/\/MILCOM 2012-2012 IEEE Military Communications Conference. IEEE, 2012: 1-7."},{"key":"e_1_3_2_1_4_1","first-page":"1485","article-title":"Covert timing channels codes for communication over interactive traffic[C]\/\/2009 IEEE International Conference on Acoustics","volume":"2009","author":"Kiyavash N","unstructured":"Kiyavash N , Coleman T . Covert timing channels codes for communication over interactive traffic[C]\/\/2009 IEEE International Conference on Acoustics , Speech and Signal Processing. IEEE , 2009 : 1485 - 1488 . Kiyavash N, Coleman T. Covert timing channels codes for communication over interactive traffic[C]\/\/2009 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2009: 1485-1488.","journal-title":"Speech and Signal Processing. IEEE"},{"key":"e_1_3_2_1_5_1","volume-title":"Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards[C]\/\/2013 IEEE Global Communications Conference (GLOBECOM)","author":"Radhakrishnan S V","year":"2013","unstructured":"Radhakrishnan S V , Uluagac A S , Beyah R. Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards[C]\/\/2013 IEEE Global Communications Conference (GLOBECOM) . IEEE , 2013 : 722-728. Radhakrishnan S V, Uluagac A S, Beyah R. Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards[C]\/\/2013 IEEE Global Communications Conference (GLOBECOM). IEEE, 2013: 722-728."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102307"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170076"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3241451"},{"key":"e_1_3_2_1_9_1","volume-title":"A protocol independent approach in network covert channel detection[C]\/\/2019 IEEE International Conference on Computational Science and Engineering","author":"Ayub M A","year":"2019","unstructured":"Ayub M A , Smith S , Siraj A. A protocol independent approach in network covert channel detection[C]\/\/2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE , 2019 : 165-170. Ayub M A, Smith S, Siraj A. A protocol independent approach in network covert channel detection[C]\/\/2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2019: 165-170."},{"key":"e_1_3_2_1_10_1","volume-title":"Machine learning and deep learning methods for cybersecurity[J]. Ieee access","author":"Xin Y","year":"2018","unstructured":"Xin Y , Kong L , Liu Z , Machine learning and deep learning methods for cybersecurity[J]. Ieee access , 2018 , 6: 35365-35381. Xin Y, Kong L, Liu Z, Machine learning and deep learning methods for cybersecurity[J]. Ieee access, 2018, 6: 35365-35381."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1440"},{"key":"e_1_3_2_1_12_1","volume-title":"Network covert channels: Design, analysis, detection, and elimination[D]","author":"Cabuk S.","year":"2006","unstructured":"Cabuk S. Network covert channels: Design, analysis, detection, and elimination[D] . Purdue University , 2006 . Cabuk S. Network covert channels: Design, analysis, detection, and elimination[D]. Purdue University, 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"The Kolmogorov-Smirnov test for goodness of fit[J]. Journal of the American statistical Association","author":"Massey F J","year":"1951","unstructured":"Massey Jr F J . The Kolmogorov-Smirnov test for goodness of fit[J]. Journal of the American statistical Association , 1951 , 46(253): 68-78. Massey Jr F J. The Kolmogorov-Smirnov test for goodness of fit[J]. Journal of the American statistical Association, 1951, 46(253): 68-78."},{"volume-title":"IP covert timing channels: design and detection[C]\/\/Proceedings of the 11th ACM conference on Computer and communications security. 2004: 178-187","author":"Cabuk S","key":"e_1_3_2_1_14_1","unstructured":"Cabuk S , Brodley C E , Shields C. IP covert timing channels: design and detection[C]\/\/Proceedings of the 11th ACM conference on Computer and communications security. 2004: 178-187 . Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection[C]\/\/Proceedings of the 11th ACM conference on Computer and communications security. 2004: 178-187."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"e_1_3_2_1_16_1","author":"Li H","year":"2022","unstructured":"Li H , Song T , Yang Y. Generic and Sensitive Anomaly Detection of Network Covert Timing Channels[J] . IEEE Transactions on Dependable and Secure Computing , 2022 . Li H, Song T, Yang Y. Generic and Sensitive Anomaly Detection of Network Covert Timing Channels[J]. IEEE Transactions on Dependable and Secure Computing, 2022.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164392"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Encoding time series as images for visual inspection and classification using tiled convolutional neural networks[C]\/\/Workshops at the twenty-ninth AAAI conference on artificial intelligence. Menlo Park, CA","author":"Wang Z","year":"2015","unstructured":"Wang Z , Oates T . Encoding time series as images for visual inspection and classification using tiled convolutional neural networks[C]\/\/Workshops at the twenty-ninth AAAI conference on artificial intelligence. Menlo Park, CA , USA: AAAI , 2015 , 1 . Wang Z, Oates T. Encoding time series as images for visual inspection and classification using tiled convolutional neural networks[C]\/\/Workshops at the twenty-ninth AAAI conference on artificial intelligence. Menlo Park, CA, USA: AAAI, 2015, 1.","journal-title":"USA: AAAI"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/4\/9\/004"},{"key":"e_1_3_2_1_20_1","volume-title":"Recurrence plots for the analysis of complex systems[J]. Physics reports","author":"Marwan N","year":"2007","unstructured":"Marwan N , Romano M C , Thiel M , Recurrence plots for the analysis of complex systems[J]. Physics reports , 2007 , 438(5-6): 237-329. Marwan N, Romano M C, Thiel M, Recurrence plots for the analysis of complex systems[J]. Physics reports, 2007, 438(5-6): 237-329."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs13224712"},{"key":"e_1_3_2_1_22_1","volume-title":"Mobilevit: light-weight, general-purpose, and mobile-friendly vision transformer[J]. arXiv preprint arXiv:2110.02178","author":"Mehta S","year":"2021","unstructured":"Mehta S , Rastegari M. Mobilevit: light-weight, general-purpose, and mobile-friendly vision transformer[J]. arXiv preprint arXiv:2110.02178 , 2021 . Mehta S, Rastegari M. Mobilevit: light-weight, general-purpose, and mobile-friendly vision transformer[J]. arXiv preprint arXiv:2110.02178, 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3455716.3455762"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"He K Zhang X Ren S Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778.  He K Zhang X Ren S Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Liu Z Lin Y Cao Y Swin transformer: Hierarchical vision transformer using shifted windows[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2021: 10012-10022.  Liu Z Lin Y Cao Y Swin transformer: Hierarchical vision transformer using shifted windows[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2021: 10012-10022.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Liu Z Mao H Wu C Y A convnet for the 2020s[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2022: 11976-11986.  Liu Z Mao H Wu C Y A convnet for the 2020s[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2022: 11976-11986.","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Ma N Zhang X Zheng H T Shufflenet v2: Practical guidelines for efficient cnn architecture design[C]\/\/Proceedings of the European conference on computer vision (ECCV). 2018: 116-131.  Ma N Zhang X Zheng H T Shufflenet v2: Practical guidelines for efficient cnn architecture design[C]\/\/Proceedings of the European conference on computer vision (ECCV). 2018: 116-131.","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"e_1_3_2_1_28_1","first-page":"2204","article-title":"Theory to implementation[C]\/\/IEEE INFOCOM 2009","volume":"2009","author":"Sellke S H","unstructured":"Sellke S H , Wang C C , Bagchi S , TCP\/IP timing channels : Theory to implementation[C]\/\/IEEE INFOCOM 2009 . IEEE , 2009 : 2204 - 2212 . Sellke S H, Wang C C, Bagchi S, TCP\/IP timing channels: Theory to implementation[C]\/\/IEEE INFOCOM 2009. IEEE, 2009: 2204-2212.","journal-title":"IEEE"},{"key":"e_1_3_2_1_29_1","volume-title":"Keyboards and Covert Channels[C]\/\/USENIX Security Symposium","author":"Shah G","year":"2006","unstructured":"Shah G , Molina A , Blaze M. Keyboards and Covert Channels[C]\/\/USENIX Security Symposium . 2006 , 15: 64. Shah G, Molina A, Blaze M. Keyboards and Covert Channels[C]\/\/USENIX Security Symposium. 2006, 15: 64."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3244168"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046234"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3131598"},{"volume-title":"Electronics and Mechatronics Conference (IEMTRONICS). IEEE","author":"Al-Eidi S","key":"e_1_3_2_1_34_1","unstructured":"Al-Eidi S , Darwish O , Husari G , Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing [C]\/\/2022 IEEE International IOT , Electronics and Mechatronics Conference (IEMTRONICS). IEEE , 2022: 1-7. Al-Eidi S, Darwish O, Husari G, Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing[C]\/\/2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE, 2022: 1-7."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105546"},{"key":"e_1_3_2_1_36_1","volume-title":"Don't Walk: Chasing Higher FLOPS for Faster Neural Networks[J]. arXiv preprint arXiv:2303.03667","author":"Chen J","year":"2023","unstructured":"Chen J , Kao S , He H , Run , Don't Walk: Chasing Higher FLOPS for Faster Neural Networks[J]. arXiv preprint arXiv:2303.03667 , 2023 . Chen J, Kao S, He H, Run, Don't Walk: Chasing Higher FLOPS for Faster Neural Networks[J]. arXiv preprint arXiv:2303.03667, 2023."}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:05Z","timestamp":1750178765000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":36,"alternative-id":["10.1145\/3603781.3603906","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603906","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}