{"id":"https://openalex.org/W3093651575","doi":"https://doi.org/10.1109/iscc50000.2020.9219610","title":"AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables","display_name":"AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093651575","doi":"https://doi.org/10.1109/iscc50000.2020.9219610","mag":"3093651575"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103837328","display_name":"Chunjing Han","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunjing Han","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104121726","display_name":"Kunkun Sun","orcid":"https://orcid.org/0000-0002-4530-5778"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunkun Sun","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110364708","display_name":"Haina Tang","orcid":"https://orcid.org/0000-0002-7150-0243"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210100255","display_name":"Beijing Academy of Artificial Intelligence","ror":"https://ror.org/016a74861","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210100255"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haina Tang","raw_affiliation_strings":["School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210100255","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004458037","display_name":"Yulei Wu","orcid":"https://orcid.org/0000-0003-0801-8443"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yulei Wu","raw_affiliation_strings":["College of Engineering, Mathematics and Physical Sciences, University of Exeter, Exeter, UK"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Mathematics and Physical Sciences, University of Exeter, Exeter, UK","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109413565","display_name":"Xiaodan Zhang","orcid":"https://orcid.org/0000-0001-9196-1082"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodan Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Science, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103837328"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12924274,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8312779068946838},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.818634033203125},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.813027024269104},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.628041684627533},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5718686580657959},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5269877314567566},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.51632159948349},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4332781136035919},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10692939162254333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8312779068946838},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.818634033203125},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.813027024269104},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.628041684627533},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5718686580657959},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5269877314567566},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.51632159948349},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4332781136035919},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10692939162254333},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1536765932","https://openalex.org/W1594076931","https://openalex.org/W1601700586","https://openalex.org/W1970837734","https://openalex.org/W2005708967","https://openalex.org/W2023044001","https://openalex.org/W2024089312","https://openalex.org/W2033511666","https://openalex.org/W2046560018","https://openalex.org/W2066911794","https://openalex.org/W2078021840","https://openalex.org/W2147118406","https://openalex.org/W2147215426","https://openalex.org/W2295688862","https://openalex.org/W2328150949","https://openalex.org/W2407740141","https://openalex.org/W2949839345","https://openalex.org/W2955609830","https://openalex.org/W2968944812","https://openalex.org/W4256143890","https://openalex.org/W6635554926","https://openalex.org/W6636058479","https://openalex.org/W6640494863"],"related_works":["https://openalex.org/W4394360958","https://openalex.org/W2061122711","https://openalex.org/W4247954915","https://openalex.org/W2131958170","https://openalex.org/W2273754158","https://openalex.org/W2336747664","https://openalex.org/W2357130048","https://openalex.org/W2948670949","https://openalex.org/W4288047943","https://openalex.org/W4206605161"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,18,42,63,69,77,86,90,102,115,127,132,142,152],"problem":[3],"of":[4,8,21,50,89,97,118,157],"trace":[5],"anonymization":[6,15,96,108,133,156],"performance":[7,134],"backbone":[9,22,116],"networks,":[10],"we":[11],"propose":[12],"a":[13,51,58,105],"real-time":[14],"method":[16,32,129],"for":[17,154],"IP":[19],"address":[20],"network":[23,52,107],"packets":[24,74,93],"based":[25,40],"on":[26,41,101,114],"flow":[27,38,53,70,82],"tables":[28],"(named":[29],"AFT-Anon).":[30],"This":[31],"can":[33,75,130,150],"dynamically":[34],"build":[35],"an":[36,119],"anonymous":[37],"table":[39],"captured":[43],"data":[44,48,73,92,98],"packets.":[45,99],"The":[46],"first":[47],"packet":[49],"is":[54,110],"encrypted":[55,64,78],"according":[56],"to":[57,94],"specific":[59],"encryption":[60],"algorithm,":[61],"and":[62,84,112,148],"fields":[65,79,88],"are":[66],"stored":[67],"in":[68],"record.":[71],"Subsequent":[72],"obtain":[76],"by":[80,135],"searching":[81],"records":[83],"replace":[85],"corresponding":[87],"original":[91],"achieve":[95],"Based":[100],"proposed":[103,128],"method,":[104],"high-speed":[106],"system":[109],"developed":[111],"deployed":[113],"links":[117],"Internet":[120],"service":[121],"provider.":[122],"Experimental":[123],"results":[124],"show":[125],"that":[126],"improve":[131],"more":[136],"than":[137],"20":[138],"times,":[139],"compared":[140],"with":[141],"existing":[143],"methods":[144],"such":[145],"as":[146],"Crypto-Pan,":[147],"it":[149],"meet":[151],"requirements":[153],"online":[155],"10G":[158],"link.":[159]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
