{"id":"https://openalex.org/W4289950804","doi":"https://doi.org/10.1109/tifs.2022.3186743","title":"Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches","display_name":"Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4289950804","doi":"https://doi.org/10.1109/tifs.2022.3186743"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3186743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3186743","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101403248","display_name":"Ding Li","orcid":"https://orcid.org/0000-0001-6644-1210"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ding Li","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083796252","display_name":"Yuefei Zhu","orcid":"https://orcid.org/0000-0002-9559-8783"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuefei Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100730802","display_name":"Minghao Chen","orcid":"https://orcid.org/0000-0002-2871-5812"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minghao Chen","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100440604","display_name":"Jue Wang","orcid":"https://orcid.org/0000-0002-3641-3136"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jue Wang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101403248"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.4459,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.95086238,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"2437","last_page":"2451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8388460278511047},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8273882865905762},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6383629441261292},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.620046854019165},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5212507843971252},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5204689502716064},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5199693441390991},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4830949306488037},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47919735312461853},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47181805968284607},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.45807620882987976},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4048226773738861},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3886549770832062},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35337239503860474},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3327178657054901},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10519188642501831}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8388460278511047},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8273882865905762},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6383629441261292},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.620046854019165},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5212507843971252},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5204689502716064},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5199693441390991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4830949306488037},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47919735312461853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47181805968284607},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.45807620882987976},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4048226773738861},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3886549770832062},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35337239503860474},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3327178657054901},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10519188642501831}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3186743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3186743","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G431427349","display_name":null,"funder_award_id":"2019QY1300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1993568446","https://openalex.org/W2003243598","https://openalex.org/W2024060531","https://openalex.org/W2037465995","https://openalex.org/W2096733369","https://openalex.org/W2120702739","https://openalex.org/W2135579486","https://openalex.org/W2145672247","https://openalex.org/W2151363206","https://openalex.org/W2170085959","https://openalex.org/W2243397390","https://openalex.org/W2272516773","https://openalex.org/W2485000773","https://openalex.org/W2543927648","https://openalex.org/W2557890466","https://openalex.org/W2765424254","https://openalex.org/W2774644650","https://openalex.org/W2783301790","https://openalex.org/W2913901113","https://openalex.org/W2960952165","https://openalex.org/W2963178695","https://openalex.org/W2963448658","https://openalex.org/W2963704216","https://openalex.org/W2963857521","https://openalex.org/W2964152294","https://openalex.org/W2964602598","https://openalex.org/W2972986629","https://openalex.org/W2989013751","https://openalex.org/W3007318395","https://openalex.org/W3007384386","https://openalex.org/W3023547461","https://openalex.org/W3093007847","https://openalex.org/W3094227091","https://openalex.org/W3102722348","https://openalex.org/W3103367901","https://openalex.org/W3103557498","https://openalex.org/W3107803931","https://openalex.org/W3108072218","https://openalex.org/W3154894367","https://openalex.org/W3175350659","https://openalex.org/W3211002588","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6682188453","https://openalex.org/W6682262322","https://openalex.org/W6693724512","https://openalex.org/W6730169306","https://openalex.org/W6743795535","https://openalex.org/W6744119509","https://openalex.org/W6751839145","https://openalex.org/W6759424558","https://openalex.org/W6760237559","https://openalex.org/W6765459293","https://openalex.org/W6781761031","https://openalex.org/W6794103382"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W4383221314","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Website":[0],"Fingerprinting":[1],"(WF)":[2],"enables":[3],"a":[4,12,65,140],"local":[5,124],"passive":[6],"attacker":[7],"to":[8,34,44,47,57,98,155,223],"infer":[9],"which":[10],"website":[11,107],"user":[13],"is":[14],"visiting":[15],"over":[16,166],"an":[17],"encrypted":[18],"connection.":[19],"Classifiers":[20],"utilizing":[21],"deep":[22],"neural":[23],"networks":[24],"(DNNs)":[25],"automatically":[26],"extract":[27],"reliable":[28],"features":[29],"and":[30,102,132,204,220],"have":[31,53,88],"achieved":[32],"up":[33],"98&#x0025;":[35],"accuracy":[36],"even":[37],"against":[38],"Tor.":[39],"Since":[40],"DNNs":[41],"are":[42,198,207],"known":[43],"be":[45],"vulnerable":[46],"adversarial":[48,55,114,119,187],"examples,":[49],"several":[50,217],"recent":[51],"studies":[52,84],"exploited":[54],"perturbations":[56,206],"defeat":[58],"WF":[59,86,142],"attacks.":[60],"These":[61],"defenses,":[62],"however,":[63],"require":[64],"high":[66],"bandwidth":[67,175],"overhead":[68,131],"that":[69,121,146,163,185],"typically":[70],"exceeds":[71],"20&#x0025;":[72],"of":[73,118,126],"the":[74,99,105,127,130,157,202],"original":[75],"traffic,":[76],"prohibiting":[77],"them":[78],"from":[79],"real-world":[80],"deployment.":[81,228],"Moreover,":[82,182],"many":[83],"on":[85,104,201],"defense":[87,143],"been":[89],"criticized":[90],"for":[91],"unrealistic":[92],"assumptions":[93],"such":[94],"as":[95],"full":[96],"access":[97],"target":[100],"model":[101],"operating":[103],"entire":[106],"trace.":[108],"In":[109,136],"this":[110],"paper,":[111],"we":[112,138,183,214],"leverage":[113],"patches&#x2014;a":[115],"special":[116],"type":[117],"example":[120],"perturbs":[122],"only":[123,200],"parts":[125],"input&#x2014;to":[128],"control":[129],"enable":[133],"black-box":[134],"perturbation.":[135],"particular,":[137],"propose":[139],"new":[141],"called":[144],"<i>Minipatch</i>":[145,164],"injects":[147],"extremely":[148],"few":[149],"dummy":[150,196],"packets":[151,197],"in":[152,191],"real-time":[153],"traffic":[154],"evade":[156],"attacker&#x2019;s":[158],"classifier.":[159],"Experimental":[160],"results":[161],"demonstrate":[162],"provides":[165],"97&#x0025;":[167],"protection":[168],"success":[169],"rate":[170],"with":[171],"less":[172],"than":[173,179],"5&#x0025;":[174],"overhead,":[176],"much":[177],"lower":[178],"existing":[180],"defenses.":[181],"show":[184],"our":[186],"patches":[188],"remain":[189],"effective":[190],"challenging":[192],"settings,":[193],"e.g.,":[194],"where":[195,205],"injected":[199],"client-side":[203],"applied":[208],"almost":[209],"two":[210],"months":[211],"later.":[212],"Finally,":[213],"also":[215],"analyze":[216],"potential":[218],"countermeasures":[219],"suggest":[221],"ways":[222],"preserve":[224],"perturbation":[225],"effectiveness":[226],"during":[227]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":7}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
