Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

publications

Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification

Published in TrustCom2024, 2024

We propose a segment-based method for identifying video titles from VPN-encapsulated traffic, achieving accurate recognition despite encryption and tunneling obfuscation.

Recommended citation: Z. Xu, X. Ren, Y. Zhang, G. Cheng and H. Wu, "Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification," 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sanya, China, 2024, pp. 1500-1505, doi: 10.1109/TrustCom63139.2024.00207.
Download Paper

SCEP-TI: A side-channel attack on encrypted proxy video streams for video title identification

Published in Computer Networks, 2025

This work presents SCEP-TI, a novel method that leverages side-channel features in encrypted proxy video streams to accurately identify video titles. The approach demonstrates that even encrypted traffic can leak sensitive information through traffic patterns, posing new privacy and security risks.

Recommended citation: Yi Zhang, Zhenyu Xu, Xurui Ren, Hua Wu, Guang Cheng, SCEP-TI: A side-channel attack on encrypted proxy video streams for video title identification, Computer Networks, Volume 271,2025,111630, ISSN 1389-1286,https://doi.org/10.1016/j.comnet.2025.111630
Download Paper

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.