{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:54:11Z","timestamp":1763193251925,"version":"3.45.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11229248","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["BACKTRACKER: A Novel Background Traffic Identification System For Mobile Apps"],"prefix":"10.1109","author":[{"given":"Yuyi","family":"Liu","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Yitong","family":"Cai","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Shu","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Hongfei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Rong","family":"Yang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"year":"2025","key":"ref1","article-title":"Number of smartphones sold to end users worldwide from 2007 to 2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790107"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815713"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115613"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2017.8095590"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2842793"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref11","first-page":"1579","article-title":"{FOAP}:{Fine-Grained}{Open-World} android app fingerprinting","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SMC54092.2024.10831226"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49660.2025.10889853"},{"article-title":"mitmproxy-an interactive https proxy","year":"2024","author":"Cortesi","key":"ref15"},{"year":"2024","key":"ref16","article-title":"Home\u2014tcpdump & libpcap"},{"year":"2025","key":"ref17","article-title":"Mobile operating system market share worldwide"},{"article-title":"Magiskonemulator: Install magisk on official android emulator","year":"2021","author":"Huang","key":"ref18"},{"article-title":"Magisktrustusercerts: A magisk\/kernelsu module that automatically adds user certificates to the system root ca store","year":"2020","author":"Beckers","key":"ref19"},{"year":"2023","key":"ref20","article-title":"Lsposed: Lsposed framework"},{"year":"2016","key":"ref21","article-title":"Justtrustme: An xposed module that disables ssl certificate checking for the purposes of auditing an app with cert pinning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587342"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1580"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005997"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref27","first-page":"501","article-title":"Fingerprinting {SDN} applications via encrypted control traffic","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Cao"},{"issue":"11","key":"ref28","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"Journal of machine learning research"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11229248.pdf?arnumber=11229248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:51:57Z","timestamp":1763193117000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11229248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11229248","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}