{"id":"https://openalex.org/W4381744274","doi":"https://doi.org/10.1109/cscwd57460.2023.10151992","title":"Long-Short Terms Frequency: A Method for Encrypted Video Streaming Identification","display_name":"Long-Short Terms Frequency: A Method for Encrypted Video Streaming Identification","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4381744274","doi":"https://doi.org/10.1109/cscwd57460.2023.10151992"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd57460.2023.10151992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd57460.2023.10151992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053287050","display_name":"Meijie Du","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meijie Du","raw_affiliation_strings":["National Engineering Research Center of Information Security,Beijing,China","National Engineering Research Center of Information Security, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"National Engineering Research Center of Information Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078462276","display_name":"Minchao Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minchao Xu","raw_affiliation_strings":["National Engineering Research Center of Information Security,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Research Center of Information Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Research Center of Information Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028655214","display_name":"Kedong Liu","orcid":"https://orcid.org/0000-0002-6585-7078"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kedong Liu","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing,China","National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing,China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068232576","display_name":"Weitao Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weitao Tang","raw_affiliation_strings":["National Engineering Research Center of Information Security,Beijing,China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","National Engineering Research Center of Information Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Engineering Research Center of Information Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067458908","display_name":"Lijuan Zheng","orcid":"https://orcid.org/0000-0002-9925-6836"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijuan Zheng","raw_affiliation_strings":["National Engineering Research Center of Information Security,Beijing,China","National Engineering Research Center of Information Security, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"National Engineering Research Center of Information Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100713362","display_name":"Qingyun Liu","orcid":"https://orcid.org/0000-0003-4815-3463"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Liu","raw_affiliation_strings":["National Engineering Research Center of Information Security,Beijing,China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Research Center of Information Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Research Center of Information Security, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053287050"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210160629","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.4011,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84680419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1581","last_page":"1588"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8550903797149658},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7157021164894104},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6794437766075134},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6577849388122559},{"id":"https://openalex.org/keywords/video-tracking","display_name":"Video tracking","score":0.49601420760154724},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4106443524360657},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3723975419998169},{"id":"https://openalex.org/keywords/video-processing","display_name":"Video processing","score":0.34436291456222534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29172199964523315},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18108394742012024},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11996367573738098}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8550903797149658},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7157021164894104},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6794437766075134},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6577849388122559},{"id":"https://openalex.org/C202474056","wikidata":"https://www.wikidata.org/wiki/Q1931635","display_name":"Video tracking","level":3,"score":0.49601420760154724},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4106443524360657},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3723975419998169},{"id":"https://openalex.org/C65483669","wikidata":"https://www.wikidata.org/wiki/Q3536669","display_name":"Video processing","level":2,"score":0.34436291456222534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29172199964523315},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18108394742012024},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11996367573738098},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd57460.2023.10151992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd57460.2023.10151992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389850132","https://openalex.org/W1574724839","https://openalex.org/W2377190948","https://openalex.org/W2096476311","https://openalex.org/W4361855866","https://openalex.org/W1965900363","https://openalex.org/W169721953","https://openalex.org/W2899854151","https://openalex.org/W1623638113","https://openalex.org/W3034776505"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1,168],"the":[2,82,91,135,141,169,187],"vigorous":[3],"development":[4],"of":[5,93,105,115],"self-media":[6],"services,":[7,42],"more":[8,10,56,128],"and":[9,31,151,178,180],"individual":[11],"users":[12],"upload":[13],"videos":[14,34],"freely.":[15],"While":[16],"bringing":[17],"goodness,":[18],"it":[19,25,55,86,190],"also":[20],"inevitably":[21],"brings":[22],"evil.":[23],"Therefore,":[24],"is":[26,79,87],"particularly":[27],"necessary":[28],"to":[29,49,58,81,89,118,139],"identify":[30],"supervise":[32],"illegal":[33],"through":[35],"network":[36,60],"stream.":[37,61],"However,":[38,113],"many":[39],"video":[40,76,83,95,107,123,137,161,188],"streaming":[41],"such":[43,126],"as":[44,127],"YouTube,":[45],"have":[46,101,164],"applied":[47],"encryption":[48],"protect":[50],"users\u2019":[51],"privacy,":[52],"which":[53,78],"makes":[54],"difficult":[57],"analyze":[59,90],"Many":[62],"researches":[63],"show":[64],"that":[65,166],"DASH":[66],"(Dynamic":[67],"Adaptive":[68],"Streaming":[69],"over":[70],"HTTP)":[71],"will":[72],"leak":[73],"information":[74],"about":[75],"segmentation,":[77],"related":[80],"content.":[84],"Consequently,":[85],"possible":[88],"content":[92],"encrypted":[94,106,160],"stream":[96],"without":[97],"decryption.":[98],"Previous":[99],"studies":[100],"proposed":[102],"a":[103,121,148,193],"series":[104],"identification":[108,195],"methods":[109],"based":[110],"on":[111],"this.":[112],"most":[114],"them":[116],"need":[117],"wait":[119,133],"for":[120,134,158],"long":[122],"playback":[124,138],"time,":[125],"than":[129],"10s,":[130],"or":[131],"even":[132,181],"entire":[136],"complete":[140],"identification.":[142,162],"In":[143],"this":[144],"paper,":[145],"we":[146],"propose":[147],"fast,":[149],"lightweight,":[150],"accurate":[152],"method":[153,172],"named":[154],"Long-Short":[155],"Terms":[156],"Frequency(LSTF)":[157],"online":[159],"Experiments":[163],"proved":[165],"compared":[167],"state-of-the-art,":[170],"our":[171],"has":[173,192],"advantages":[174],"in":[175],"both":[176],"speed":[177],"accuracy,":[179],"if":[182],"CDN":[183],"switching":[184],"occurs":[185],"during":[186],"playback,":[189],"still":[191],"high":[194],"accuracy.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
