Posts by Collection

publications

Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification

Published in TrustCom2024, 2024

We propose a segment-based method for identifying video titles from VPN-encapsulated traffic, achieving accurate recognition despite encryption and tunneling obfuscation.

Recommended citation: Z. Xu, X. Ren, Y. Zhang, G. Cheng and H. Wu, "Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification," 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sanya, China, 2024, pp. 1500-1505, doi: 10.1109/TrustCom63139.2024.00207.
Download Paper

SCEP-TI: A side-channel attack on encrypted proxy video streams for video title identification

Published in Computer Networks, 2025

This work presents SCEP-TI, a novel method that leverages side-channel features in encrypted proxy video streams to accurately identify video titles. The approach demonstrates that even encrypted traffic can leak sensitive information through traffic patterns, posing new privacy and security risks.

Recommended citation: Yi Zhang, Zhenyu Xu, Xurui Ren, Hua Wu, Guang Cheng, SCEP-TI: A side-channel attack on encrypted proxy video streams for video title identification, Computer Networks, Volume 271,2025,111630, ISSN 1389-1286,https://doi.org/10.1016/j.comnet.2025.111630
Download Paper

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.