{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:47:26Z","timestamp":1725551246610},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/ictai.2011.179","type":"proceedings-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T18:07:45Z","timestamp":1324577265000},"page":"1053-1056","source":"Crossref","is-referenced-by-count":0,"title":["A Covert Communication Method Based on User-Generated Content Sites"],"prefix":"10.1109","author":[{"given":"Qingfeng","family":"Tan","sequence":"first","affiliation":[]},{"given":"Peipeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Infranet: Circumventing web censorship and surveillance","author":"feamster","year":"2001","journal-title":"Proc 11th USENIX Security Symposium"},{"key":"15","article-title":"Freedom systems 2.0 architecture","author":"boucher","year":"2000","journal-title":"White Paper Zero Knowledge Systems Inc"},{"key":"16","article-title":"Attacking the outguess","author":"fridrich","year":"2002","journal-title":"Proc ACM Workshop on Multimedia Security"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"journal-title":"JAP","year":"0","key":"3"},{"key":"2","article-title":"Tor: The second-generation onion router","author":"dingleding","year":"2004","journal-title":"Proc 13th USENIX Security Symposium"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"7","article-title":"Chipping away at censorship firewalls with user-generated content","author":"burnett","year":"2010","journal-title":"Proc 11th Usenix Security Symp"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"year":"0","key":"4"},{"journal-title":"Friend-to-Friend Networks","year":"2000","author":"bricklin","key":"9"},{"key":"8","article-title":"Safe and private data sharing with turtle: Friends team-up and beat the system","author":"popescu","year":"2004","journal-title":"Security Protocols 10th International Workshop"}],"event":{"name":"2011 IEEE 23rd International Conference on Tools with Artificial Intelligence (ICTAI)","start":{"date-parts":[[2011,11,7]]},"location":"Boca Raton, FL, USA","end":{"date-parts":[[2011,11,9]]}},"container-title":["2011 IEEE 23rd International Conference on Tools with Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6101101\/6103298\/06103470.pdf?arnumber=6103470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:43:34Z","timestamp":1497959014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6103470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ictai.2011.179","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}