{"id":"https://openalex.org/W2946816317","doi":"https://doi.org/10.1109/comsnets.2019.8711478","title":"A Deep-Learning Enabled Traffic Analysis Engine for Video Source Identification","display_name":"A Deep-Learning Enabled Traffic Analysis Engine for Video Source Identification","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2946816317","doi":"https://doi.org/10.1109/comsnets.2019.8711478","mag":"2946816317"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2019.8711478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2019.8711478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089007798","display_name":"Yan Shi","orcid":"https://orcid.org/0000-0002-7844-6227"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yan Shi","raw_affiliation_strings":["Electrical and Computer Engineering, Michigan State University, East Lansing, MI"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University, East Lansing, MI","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107170592","display_name":"Subir Biswas","orcid":"https://orcid.org/0000-0003-0828-2500"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Subir Biswas","raw_affiliation_strings":["Electrical and Computer Engineering, Michigan State University, East Lansing, MI"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University, East Lansing, MI","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089007798"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":0.8401,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.79890517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.775275468826294},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6599836349487305},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6369306445121765},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5487754940986633},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5357239842414856},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5227789282798767},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5059811472892761},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4801616072654724},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.46419015526771545},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44789278507232666},{"id":"https://openalex.org/keywords/traffic-shaping","display_name":"Traffic shaping","score":0.4223243296146393},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.42205655574798584},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38134533166885376},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3749169707298279},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3745192289352417},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.18300414085388184},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16127857565879822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.775275468826294},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6599836349487305},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6369306445121765},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5487754940986633},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5357239842414856},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5227789282798767},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5059811472892761},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4801616072654724},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.46419015526771545},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44789278507232666},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.4223243296146393},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.42205655574798584},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38134533166885376},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3749169707298279},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3745192289352417},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.18300414085388184},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16127857565879822},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2019.8711478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2019.8711478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W753012316","https://openalex.org/W1578389446","https://openalex.org/W1908991523","https://openalex.org/W1993568446","https://openalex.org/W2021949962","https://openalex.org/W2022895127","https://openalex.org/W2027302330","https://openalex.org/W2052565897","https://openalex.org/W2091010933","https://openalex.org/W2096118443","https://openalex.org/W2108217512","https://openalex.org/W2120702739","https://openalex.org/W2135579486","https://openalex.org/W2145038566","https://openalex.org/W2151976397","https://openalex.org/W2159007257","https://openalex.org/W2159346114","https://openalex.org/W2500368581","https://openalex.org/W2545174153","https://openalex.org/W2624675905","https://openalex.org/W4210531213","https://openalex.org/W4232271737","https://openalex.org/W6622239757","https://openalex.org/W6673330293","https://openalex.org/W6683237734"],"related_works":["https://openalex.org/W2179036394","https://openalex.org/W4206905835","https://openalex.org/W266939152","https://openalex.org/W2613715541","https://openalex.org/W2157447183","https://openalex.org/W3166874438","https://openalex.org/W2141958076","https://openalex.org/W158006909","https://openalex.org/W3121070838","https://openalex.org/W3174245262"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,50],"deep-learning":[4],"based":[5],"traffic":[6,27,43,56,79],"analysis":[7],"system":[8,30],"for":[9,29,55,96],"identifying":[10],"streaming":[11],"video":[12,58],"sources":[13,28],"within":[14,81],"encrypted":[15,82],"tunnels.":[16,84],"The":[17,46,61,85],"overall":[18],"goal":[19],"is":[20,64],"to":[21,36,91],"extract":[22],"information":[23],"about":[24],"applications":[25],"and":[26,32,41,66,98],"administrators":[31],"internet":[33],"service":[34],"providers":[35],"perform":[37],"better":[38],"resource":[39],"allocation":[40],"other":[42],"management":[44],"operations.":[45],"proposed":[47,106],"architecture":[48],"uses":[49],"deep":[51],"neural":[52],"network":[53],"(DNN)":[54],"analysis-based":[57],"source":[59],"classification.":[60],"DNN":[62,87],"model":[63],"trained":[65,103],"validated":[67],"using":[68],"an":[69],"experimental":[70],"setup":[71],"that":[72],"simulates":[73],"real-world":[74],"complex":[75],"situations":[76],"such":[77],"as":[78],"combinations":[80],"VPN":[83],"implemented":[86],"classifiers":[88],"are":[89],"shown":[90],"provide":[92],"acceptable":[93],"classification":[94],"accuracies":[95],"single":[97],"combined":[99],"multi-stream":[100],"scenarios":[101],"when":[102],"with":[104],"our":[105],"features.":[107]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
