{"id":"https://openalex.org/W4387870894","doi":"https://doi.org/10.1109/secon58729.2023.10287432","title":"EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis","display_name":"EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis","publication_year":2023,"publication_date":"2023-09-11","ids":{"openalex":"https://openalex.org/W4387870894","doi":"https://doi.org/10.1109/secon58729.2023.10287432"},"language":"en","primary_location":{"id":"doi:10.1109/secon58729.2023.10287432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon58729.2023.10287432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078558551","display_name":"Luming Yang","orcid":"https://orcid.org/0000-0002-5539-5025"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Luming Yang","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424209","display_name":"Yongjun Wang","orcid":"https://orcid.org/0000-0002-3627-1465"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjun Wang","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082564456","display_name":"Shaojing Fu","orcid":"https://orcid.org/0000-0002-7275-8190"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaojing Fu","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100383303","display_name":"Lin Liu","orcid":"https://orcid.org/0000-0002-5930-8881"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Liu","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057427094","display_name":"Yuchuan Luo","orcid":"https://orcid.org/0000-0002-0720-4925"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchuan Luo","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078558551"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":1.2437,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83898919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"537","last_page":"545"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.845585823059082},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6851089596748352},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6329548358917236},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5150139331817627},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4815514385700226},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4612973630428314},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.4389897584915161},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.4320949912071228},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40384191274642944},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38502687215805054},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27066391706466675}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.845585823059082},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6851089596748352},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6329548358917236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5150139331817627},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4815514385700226},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4612973630428314},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.4389897584915161},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.4320949912071228},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40384191274642944},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38502687215805054},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27066391706466675},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secon58729.2023.10287432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon58729.2023.10287432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1972191802","https://openalex.org/W2152575748","https://openalex.org/W2256681573","https://openalex.org/W2315694766","https://openalex.org/W2598137689","https://openalex.org/W2750601856","https://openalex.org/W2793336017","https://openalex.org/W2809211034","https://openalex.org/W2885862920","https://openalex.org/W2902920262","https://openalex.org/W2945873538","https://openalex.org/W2946816317","https://openalex.org/W2948526509","https://openalex.org/W2953384591","https://openalex.org/W3031299494","https://openalex.org/W3035952106","https://openalex.org/W3048461626","https://openalex.org/W3088943193","https://openalex.org/W3106188540","https://openalex.org/W3118967841","https://openalex.org/W3154321031","https://openalex.org/W4226326522","https://openalex.org/W6713134421","https://openalex.org/W6743795535"],"related_works":["https://openalex.org/W2081900870","https://openalex.org/W579810227","https://openalex.org/W2037549926","https://openalex.org/W2952780262","https://openalex.org/W2979495269","https://openalex.org/W2392917763","https://openalex.org/W2345479200","https://openalex.org/W2083429127","https://openalex.org/W2183306018","https://openalex.org/W2100090372"],"abstract_inverted_index":{"The":[0,157],"rise":[1],"in":[2,10,21,29,149],"video":[3,15,23,35,77,172,191],"streaming":[4],"has":[5],"led":[6],"to":[7,63,65,122],"an":[8],"increase":[9],"network":[11,117,138],"traffic,":[12],"with":[13,79,146,203],"encrypted":[14,34,76],"streams":[16,78],"playing":[17],"a":[18,48,88,137,160,178],"significant":[19],"role":[20],"illegal":[22],"detection.":[24],"However,":[25],"there":[26],"are":[27],"challenges":[28],"performing":[30],"content":[31,74,173],"analysis":[32,101,198],"of":[33,75,127,181],"streams,":[36],"including":[37],"label":[38],"limitations":[39],"and":[40,151,196],"complex":[41],"calculations.":[42],"In":[43,120],"this":[44],"paper,":[45],"we":[46,135],"proposed":[47],"low-dimensional":[49,80,89],"embedding":[50,129],"method":[51],"based":[52,140],"on":[53,115,141,159],"Byte":[54],"Rate":[55],"Sequences":[56],"(BRS),":[57],"named":[58],"EVS2vec":[59,92,150,165,175],"(Encrypted":[60],"Video":[61],"Stream":[62],"Vector),":[64],"solve":[66],"these":[67],"problems":[68],"effectively.":[69],"It":[70],"can":[71,93,109,176,199],"represent":[72],"the":[73,84,112,124,128],"vectors":[81],"by":[82,132],"mapping":[83],"indefinite-length":[85],"sequence":[86],"into":[87],"Euclidean":[90],"space.":[91],"thereby":[94],"be":[95,201],"applied":[96],"for":[97,189],"not":[98],"only":[99],"supervised":[100],"but":[102],"also":[103,110,200],"unsupervised":[104],"analysis.":[105],"Furthermore,":[106],"using":[107,154],"BRS":[108],"save":[111],"time":[113],"overhead":[114,168],"fine-grained":[116],"traffic":[118],"parsing.":[119],"order":[121],"ensure":[123],"content-related":[125],"distinguishability":[126],"result,":[130],"inspired":[131],"contrastive":[133],"learning,":[134],"designed":[136],"structure":[139],"Recurrent":[142],"Neural":[143],"Network":[144],"(RNN)":[145],"self-attention":[147],"mechanism":[148],"trained":[152],"it":[153],"siamese":[155],"network.":[156],"experiments":[158],"public":[161],"dataset":[162],"show":[163],"that":[164],"saves":[166],"storage":[167],"while":[169],"containing":[170],"enough":[171],"information.":[174],"achieve":[177],"high":[179],"accuracy":[180],"similarity":[182],"threshold,":[183],"reaching":[184],"96.71%.":[185],"An":[186],"8-dimensional":[187],"fingerprint":[188],"each":[190],"is":[192],"constructed.":[193],"Moreover,":[194],"classification":[195],"clustering":[197],"performed":[202],"acceptable":[204],"results.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
