{"id":"https://openalex.org/W2966224590","doi":"https://doi.org/10.1145/3341188.3341192","title":"Inferring ADU Combinations from Encrypted QUIC Stream","display_name":"Inferring ADU Combinations from Encrypted QUIC Stream","publication_year":2019,"publication_date":"2019-07-29","ids":{"openalex":"https://openalex.org/W2966224590","doi":"https://doi.org/10.1145/3341188.3341192","mag":"2966224590"},"language":"en","primary_location":{"id":"doi:10.1145/3341188.3341192","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341188.3341192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Future Internet Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.9801,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82181387,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8692787885665894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7991145849227905},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5186147689819336},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.42273014783859253},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4194600582122803},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14161798357963562}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8692787885665894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7991145849227905},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5186147689819336},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.42273014783859253},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4194600582122803},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14161798357963562},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3341188.3341192","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341188.3341192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Future Internet Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1495551028","https://openalex.org/W2488344565","https://openalex.org/W2555248751","https://openalex.org/W2598137689","https://openalex.org/W2610855322","https://openalex.org/W2745034467","https://openalex.org/W2790600716","https://openalex.org/W2793336017","https://openalex.org/W2801435620","https://openalex.org/W2809211034","https://openalex.org/W2930666255"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W1997872857"],"abstract_inverted_index":{"Video":[0],"traffic":[1],"has":[2],"experienced":[3],"rapid":[4],"growth":[5],"in":[6,121],"the":[7,32,39,45,118,122,133,138,153],"past":[8],"and":[9,28,130],"will":[10],"continue":[11],"to":[12,20,65,75,83,111],"grow":[13],"rapidly.":[14],"It":[15],"is":[16],"an":[17,53,73,100,149],"essential":[18],"issue":[19],"monitor":[21],"video":[22,97,126,143],"streaming":[23,59,93,98],"for":[24,116],"both":[25],"network":[26,29],"management":[27],"security.":[30],"With":[31],"popularity":[33],"of":[34,38,47,132,155],"encrypted":[35,54,69,91,123,140,156],"video,":[36],"most":[37],"analysis":[40,154],"methods":[41],"are":[42,105,109,135],"based":[43],"on":[44],"extraction":[46],"application":[48,85],"data":[49,86],"units":[50],"(ADUs)":[51],"from":[52,68,90],"stream.":[55],"However,":[56],"that":[57],"QUIC":[58,70,92,125,142,157],"use":[60],"multiplexing":[61],"makes":[62],"it":[63],"impossible":[64],"extract":[66,84],"ADU":[67],"streaming.":[71,127,158],"In":[72],"effort":[74],"overcome":[76],"this":[77],"challenge,":[78],"we":[79],"proposed":[80,146],"a":[81],"method":[82,134,147],"unit":[87],"combination":[88],"(ADUC)":[89],"instead.":[94],"Taking":[95],"YouTube":[96,124,141],"as":[99],"example,":[101],"several":[102],"stream":[103],"features":[104,108],"defined.":[106],"These":[107],"used":[110],"develop":[112],"machine":[113],"learning":[114],"models":[115],"classifying":[117],"ADUC":[119],"types":[120],"The":[128],"feasibility":[129],"accuracy":[131],"validated":[136],"by":[137],"actual":[139],"streams.":[144],"Our":[145],"represents":[148],"initial":[150],"step":[151],"towards":[152]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
