{"id":"https://openalex.org/W4385757655","doi":"https://doi.org/10.1109/tifs.2023.3304528","title":"Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training","display_name":"Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385757655","doi":"https://doi.org/10.1109/tifs.2023.3304528"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3304528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3304528","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085694074","display_name":"Litao Qiao","orcid":"https://orcid.org/0000-0002-5037-1497"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Litao Qiao","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101494796","display_name":"Bang Wu","orcid":"https://orcid.org/0009-0008-2218-3991"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bang Wu","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067172848","display_name":"S.Y. Yin","orcid":"https://orcid.org/0009-0006-8185-0999"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuijun Yin","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027427522","display_name":"Heng Li","orcid":"https://orcid.org/0000-0001-8045-8983"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Li","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101957538","display_name":"Wei Yuan","orcid":"https://orcid.org/0000-0002-5867-5364"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yuan","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085694074"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":2.9579,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.92803622,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"18","issue":null,"first_page":"5375","last_page":"5386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6449397802352905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4993574619293213},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4612520933151245},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32451820373535156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6449397802352905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4993574619293213},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4612520933151245},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32451820373535156}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3304528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3304528","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5400000214576721}],"awards":[{"id":"https://openalex.org/G1540945245","display_name":null,"funder_award_id":"2022YFF0712300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2012210084","https://openalex.org/W2027177092","https://openalex.org/W2088565190","https://openalex.org/W2103647628","https://openalex.org/W2108217512","https://openalex.org/W2109453700","https://openalex.org/W2135579486","https://openalex.org/W2138719936","https://openalex.org/W2149280729","https://openalex.org/W2272516773","https://openalex.org/W2485000773","https://openalex.org/W2543927648","https://openalex.org/W2557890466","https://openalex.org/W2603766943","https://openalex.org/W2604754095","https://openalex.org/W2752949934","https://openalex.org/W2763967737","https://openalex.org/W2783301790","https://openalex.org/W2913901113","https://openalex.org/W2963448658","https://openalex.org/W2963704216","https://openalex.org/W2963857521","https://openalex.org/W2964602598","https://openalex.org/W3031127859","https://openalex.org/W3049399107","https://openalex.org/W3094227091","https://openalex.org/W3102722348","https://openalex.org/W3103367901","https://openalex.org/W3106813043","https://openalex.org/W3107803931","https://openalex.org/W3154894367","https://openalex.org/W3157286348","https://openalex.org/W3190041646","https://openalex.org/W3191453585","https://openalex.org/W3211002588","https://openalex.org/W4283204656","https://openalex.org/W4289950804","https://openalex.org/W4293846201","https://openalex.org/W4294065829","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6682188453","https://openalex.org/W6693724512","https://openalex.org/W6730169306","https://openalex.org/W6739868092","https://openalex.org/W6744119509","https://openalex.org/W6781761031","https://openalex.org/W6794103382"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"network":[2],"(DNN)":[3],"based":[4,25],"website":[5,70,106,126],"fingerprinting":[6],"(WF)":[7],"attacks":[8,53,66,86],"pose":[9],"a":[10,92,234,245],"severe":[11],"threat":[12],"to":[13,32,108,152,219,227],"the":[14,34,41,51,64,75,84,110,123,154,161,165,202,228],"privacy":[15],"of":[16,36,125,157,240,252],"Tor":[17],"users.":[18],"To":[19,82],"overcome":[20],"this":[21],"challenge,":[22],"adversarial":[23],"perturbation":[24,253],"WF":[26,52,65,85,96,173,189,241],"defenses":[27,47,190],"have":[28],"been":[29],"recently":[30],"proposed":[31],"fool":[33],"classifiers":[35],"attackers,":[37],"through":[38,73],"purposefully":[39],"perturbing":[40],"user\u2019s":[42],"traffic":[43,77,111,137,155],"traces.":[44],"Unfortunately,":[45],"these":[46],"significantly":[48],"deteriorate":[49],"once":[50],"are":[54],"enhanced":[55,87,207],"with":[56,67,114,208,221],"<italic":[57,93,103,131,148],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[58,94,104,132,149],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">adversarial":[59],"training</i>":[60],"(AT).":[61],"AT":[62,169],"endows":[63],"more":[68,118,178,246],"powerful":[69],"recognition":[71],"capability,":[72],"learning":[74],"perturbed":[76],"traces":[78,112,156],"generated":[79],"by":[80,88],"attackers.":[81],"resist":[83],"AT,":[89,209],"we":[90],"develop":[91],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">black-box</i>":[95],"defense,":[97],"called":[98],"Acup3.":[99],"First,":[100],"Acup3":[101,129,146,176,184,210,232],"leverages":[102],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">many-to-one":[105],"imitation</i>":[107],"make":[109],"associated":[113],"different":[115,158],"websites":[116],"look":[117],"like":[119],"each":[120],"other,":[121],"increasing":[122],"difficulty":[124],"classification.":[127],"Second,":[128],"generates":[130],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">trace-agnostic</i>":[133],"perturbations":[134],"without":[135],"accessing":[136],"traces,":[138],"making":[139,164],"it":[140],"suitable":[141],"for":[142,172],"practical":[143],"deployment.":[144],"Third,":[145],"employs":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">perturbation":[150],"variation</i>":[151],"diversify":[153],"users":[159],"visiting":[160],"same":[162],"website,":[163],"knowledge":[166],"learnt":[167],"from":[168,217],"less":[170],"helpful":[171],"attacks.":[174],"Therefore,":[175],"is":[177],"robust":[179],"against":[180],"AT.":[181],"Experiments":[182],"demonstrate":[183],"markedly":[185],"surpasses":[186],"four":[187],"representative":[188],"(e.g.,":[191],"Mockingbird":[192],"and":[193,198,243],"AWA)":[194],"in":[195,238],"defense":[196,230],"capability":[197],"bandwidth":[199,224],"overhead.":[200,225],"Facing":[201],"state-of-the-art":[203],"(SOTA)":[204],"attack":[205,213],"Var-CNN":[206],"depresses":[211],"its":[212],"success":[214],"rate":[215],"(ASR)":[216],"98%":[218],"24.29%":[220],"only":[222],"13.95%":[223],"Compared":[226],"SOTA":[229],"AWA,":[231],"causes":[233],"24.5%":[235],"larger":[236],"decrement":[237],"ASR":[239],"attacks,":[242],"achieves":[244],"than":[247],"100":[248],"times":[249],"faster":[250],"speed":[251],"generation.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
