{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:42:18Z","timestamp":1725730938245},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iwqos.2015.7404750","type":"proceedings-article","created":{"date-parts":[[2016,2,11]],"date-time":"2016-02-11T23:06:12Z","timestamp":1455231972000},"page":"309-318","source":"Crossref","is-referenced-by-count":10,"title":["Fine-grained dissection of WeChat in cellular networks"],"prefix":"10.1109","author":[{"given":"Qun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Caifeng","family":"He","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2044046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"journal-title":"JD-GUI","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref14","article-title":"An Empirical Study of Video Messaging Services on Smartphones","author":"liu","year":"2014","journal-title":"Proc of NOSSDAV"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177123"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531679"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879159"},{"key":"ref18","article-title":"SANTaClass: A Self Adaptive Network Traffic Classification System","author":"tongaonkar","year":"2013","journal-title":"IFIP Networking Conference"},{"journal-title":"Wireshark","year":"0","key":"ref19"},{"journal-title":"By the Numbers 20 Amazing WeChat Statistics","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44816-0_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493225"},{"journal-title":"Dex2jar","year":"0","key":"ref8"},{"key":"ref7","article-title":"Discoverer: Automatic Protocol Reverse Engineering from Network Traces","author":"cui","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.61"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631461"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.149"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848073"}],"event":{"name":"2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2015,6,15]]},"location":"Portland, OR, USA","end":{"date-parts":[[2015,6,16]]}},"container-title":["2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7395993\/7404688\/07404750.pdf?arnumber=7404750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:21:57Z","timestamp":1602670917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7404750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2015.7404750","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}