{"id":"https://openalex.org/W3118698238","doi":"https://doi.org/10.1145/3444370.3444584","title":"Fading with the Time","display_name":"Fading with the Time","publication_year":2020,"publication_date":"2020-12-04","ids":{"openalex":"https://openalex.org/W3118698238","doi":"https://doi.org/10.1145/3444370.3444584","mag":"3118698238"},"language":"en","primary_location":{"id":"doi:10.1145/3444370.3444584","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050625778","display_name":"Xinda Cheng","orcid":"https://orcid.org/0000-0003-1830-8356"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinda Cheng","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044196870","display_name":"Ning Hu","orcid":"https://orcid.org/0000-0002-8355-0969"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Hu","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology1, Cyberspace Security Research Center2 Guangzhou University1, Peng Cheng Laboratory2 Guangzhou, Guangdong, China1, Shenzhen, Guangdong, China2"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology1, Cyberspace Security Research Center2 Guangzhou University1, Peng Cheng Laboratory2 Guangzhou, Guangdong, China1, Shenzhen, Guangdong, China2","institution_ids":["https://openalex.org/I4210136793","https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458193","display_name":"Chi Zhang","orcid":"https://orcid.org/0000-0002-6528-1427"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022746086","display_name":"Yan Zhao","orcid":"https://orcid.org/0000-0003-1143-355X"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhao","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050625778"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18459139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"271","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210947871208191},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.666151762008667},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6231675148010254},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5007805824279785},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.46067532896995544},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.45767661929130554},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.45488739013671875},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.41847875714302063},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22745108604431152}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210947871208191},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.666151762008667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6231675148010254},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5007805824279785},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.46067532896995544},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.45767661929130554},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.45488739013671875},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.41847875714302063},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22745108604431152}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3444370.3444584","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W139582188","https://openalex.org/W1985776777","https://openalex.org/W2111695118","https://openalex.org/W2171294352","https://openalex.org/W2171318529","https://openalex.org/W2506529408","https://openalex.org/W2971413445","https://openalex.org/W2978622907","https://openalex.org/W4231030511","https://openalex.org/W4252543659"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W3195032220","https://openalex.org/W4387988068"],"abstract_inverted_index":{"Nowadays,":[0],"most":[1,69,176],"Internet":[2,126],"applications":[3],"are":[4],"generally":[5],"faced":[6],"with":[7],"various":[8],"traffic":[9],"monitoring":[10,13],"and":[11,19,39,46,52,63,139,148,180],"content":[12],"threats.":[14],"To":[15],"protect":[16],"business":[17],"secrets":[18],"personal":[20],"privacy,":[21],"anonymous":[22,56,70,112,145,177,191],"communication":[23,30,44,57,71,146,178,192],"technology":[24,31],"has":[25],"attracted":[26],"widespread":[27],"attention.":[28],"Anonymous":[29],"not":[32,165],"only":[33],"provides":[34],"protection":[35,76,185],"of":[36,68,95,111,124,143,186,190],"confidentiality,":[37,64],"integrity":[38],"availability,":[40],"but":[41],"also":[42],"hides":[43],"relationships":[45],"routing":[47,51],"information":[48,88,98,110,134,159],"through":[49],"onion":[50],"other":[53],"technologies.":[54],"Although":[55],"networks":[58,72,179],"can":[59,181],"provide":[60],"better":[61],"security":[62,100],"the":[65,80,120,125,136,140,144,156,161,184,187],"control":[66,87,97,109,133,141,158,188],"plane":[67,189],"still":[73],"lacks":[74],"adequate":[75],"mechanisms.":[77],"For":[78],"example,":[79],"Tor":[81],"network":[82,113],"needs":[83],"to":[84,131,154],"explicitly":[85],"download":[86],"from":[89],"a":[90,105,128],"directory":[91],"server.":[92],"This":[93,102,171],"method":[94,106,172],"obtaining":[96,108],"exists":[99],"risks.":[101],"paper":[103],"proposes":[104],"for":[107,175],"based":[114],"on":[115,160],"asynchronous":[116],"communication.":[117],"We":[118],"use":[119],"public":[121,162],"storage":[122],"service":[123],"as":[127],"transit":[129],"platform":[130,163],"exchange":[132],"between":[135],"user":[137],"terminal":[138],"center":[142],"network,":[147],"design":[149],"an":[150],"automatic":[151],"destruction":[152],"mechanism":[153],"make":[155],"buffered":[157],"will":[164],"be":[166],"obtained":[167],"by":[168],"third":[169],"parties.":[170],"is":[173],"suitable":[174],"effectively":[182],"improve":[183],"networks.":[193]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
