{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:40:25Z","timestamp":1730342425061,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615560","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"173-179","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the Limits of Privacy and Data Usage for Web Browsing Analytics"],"prefix":"10.23919","author":[{"given":"Daniel","family":"Perdices","sequence":"first","affiliation":[{"name":"Escuela Polit&#x00E9;cnica Superior, Universidad Aut&#x00F3;noma de Madrid,Dept. Electronics and Communication Technologies,Madrid,Spain"}]},{"given":"Jorge E.","family":"Lopez de Vergara","sequence":"additional","affiliation":[{"name":"Escuela Polit&#x00E9;cnica Superior, Universidad Aut&#x00F3;noma de Madrid,Dept. Electronics and Communication Technologies,Madrid,Spain"}]},{"given":"Ivan","family":"Gonzalez","sequence":"additional","affiliation":[{"name":"Escuela Polit&#x00E9;cnica Superior, Universidad Aut&#x00F3;noma de Madrid,Dept. Electronics and Communication Technologies,Madrid,Spain"}]}],"member":"263","reference":[{"key":"ref31","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2015","journal-title":"Proceedings of the 3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref30","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"0","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840921"},{"key":"ref14","first-page":"339","article-title":"On web browsing privacy in anonymized netflows","author":"coull","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3411740.3411743"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927409"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7925139"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2999856"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems","year":"2015","author":"abadi","key":"ref28"},{"journal-title":"Tor security advisory exit relays running sslstrip in May and June 2020","year":"0","key":"ref3"},{"key":"ref27","article-title":"Fully understanding the hashing trick","volume":"31","author":"freksen","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3394231.3397897"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref29"},{"key":"ref5","article-title":"Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information","author":"aitken","year":"2013","journal-title":"RFC 7011"},{"journal-title":"Alexa Top Sites","year":"2020","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398819"},{"journal-title":"Over 25% Of Tor Exit Relays Spied On Users' Dark Web Activities","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269065"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029190"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9344978"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI51738.2020.00042"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615560.pdf?arnumber=9615560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:01:15Z","timestamp":1659484875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615560","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}