{"id":"https://openalex.org/W4389666638","doi":"https://doi.org/10.1109/tifs.2023.3342607","title":"Exploring Uncharted Waters of Website Fingerprinting","display_name":"Exploring Uncharted Waters of Website Fingerprinting","publication_year":2023,"publication_date":"2023-12-13","ids":{"openalex":"https://openalex.org/W4389666638","doi":"https://doi.org/10.1109/tifs.2023.3342607"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3342607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3342607","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013674024","display_name":"Ishan Karunanayake","orcid":"https://orcid.org/0000-0002-5349-4943"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ishan Karunanayake","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020474429","display_name":"Jiaojiao Jiang","orcid":"https://orcid.org/0000-0001-7307-8114"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiaojiao Jiang","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080202547","display_name":"Nadeem Ahmed","orcid":"https://orcid.org/0000-0001-8169-040X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nadeem Ahmed","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015261020","display_name":"Sanjay Jha","orcid":"https://orcid.org/0000-0002-1844-1520"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sanjay K. Jha","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013674024"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":0.8698,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79837809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"1840","last_page":"1854"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8454906940460205},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8198201060295105},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.592635989189148},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5920374393463135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4183773398399353},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35377371311187744},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3361437916755676},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27377137541770935}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8454906940460205},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8198201060295105},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.592635989189148},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5920374393463135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4183773398399353},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35377371311187744},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3361437916755676},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27377137541770935}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3342607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3342607","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","id":"https://metadata.un.org/sdg/14","score":0.5199999809265137}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2135579486","https://openalex.org/W2170085959","https://openalex.org/W2194775991","https://openalex.org/W2272516773","https://openalex.org/W2485000773","https://openalex.org/W2783301790","https://openalex.org/W2798918712","https://openalex.org/W2913901113","https://openalex.org/W2963704216","https://openalex.org/W2964602598","https://openalex.org/W2999498625","https://openalex.org/W3033915435","https://openalex.org/W3089115757","https://openalex.org/W3106813043","https://openalex.org/W3120227884","https://openalex.org/W3191490876","https://openalex.org/W4299930775","https://openalex.org/W6637080381","https://openalex.org/W6682188453","https://openalex.org/W6693724512","https://openalex.org/W6744119509","https://openalex.org/W6754929296"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2082747743","https://openalex.org/W1993929477","https://openalex.org/W2071573776","https://openalex.org/W2942963309","https://openalex.org/W1555088513"],"abstract_inverted_index":{"Amidst":[0],"the":[1,17,27,44,55,84,91,100,130],"rapid":[2],"technological":[3],"advancements":[4],"of":[5,16,46,54,82,86,93,102,132,161,228],"today,":[6],"privacy":[7],"and":[8,42,90,109],"anonymity":[9,21,45],"are":[10,169],"facing":[11],"increasing":[12],"threats.":[13],"Tor,":[14],"one":[15,53],"most":[18],"widely":[19],"used":[20,159],"networks,":[22],"enables":[23],"users":[24],"to":[25,76,99,172,178,212,220],"browse":[26],"Internet":[28],"without":[29],"their":[30],"activities":[31],"being":[32],"tracked.":[33],"Extensive":[34],"research":[35,192],"has":[36],"been":[37],"conducted":[38],"on":[39,71,96],"both":[40],"attacking":[41],"defending":[43],"Tor":[47,61,211],"users.":[48,62],"Website":[49],"Fingerprinting":[50],"(WF)":[51],"is":[52,139,158],"popular":[56],"de-anonymisation":[57],"techniques":[58,69,128,135,145,196,200],"employed":[59],"against":[60],"This":[63],"paper":[64],"presents":[65],"two":[66,78],"novel":[67],"WF":[68,134,187],"based":[70],"Graph":[72],"Neural":[73],"Networks":[74],"(GNNs)":[75],"explore":[77],"relatively":[79],"understudied":[80],"avenues":[81],"WF:":[83],"fingerprintability":[85],"Decentralised":[87],"Applications":[88],"(DApps)":[89],"impact":[92],"reload":[94,110,137,156],"traffic":[95,108,111,138,157],"WF.":[97],"Due":[98],"lack":[101,230],"publicly":[103,231],"available":[104,232],"datasets":[105,119],"for":[106,113,120,237],"DApp":[107],"suitable":[112],"WF,":[114],"we":[115,165,206,223],"collected":[116],"five":[117],"new":[118],"our":[121,225],"experiments.":[122],"Our":[123],"findings":[124,193],"reveal":[125],"that":[126,167,194,209],"GNN-based":[127,195],"surpass":[129],"performance":[131],"state-of-the-art":[133,144,186],"when":[136,155,201],"used.":[140],"Meanwhile,":[141],"certain":[142],"high-performing":[143],"exhibit":[146],"a":[147,179],"significant":[148],"reduction":[149],"in":[150,182,184],"accuracy,":[151],"more":[152,218],"than":[153,174],"40%,":[154],"instead":[160],"homepage":[162],"traffic.":[163],"Additionally,":[164],"identify":[166],"DApps":[168,203,214],"less":[170],"susceptible":[171],"fingerprinting":[173],"conventional":[175],"websites,":[176],"leading":[177],"25%":[180],"decrease":[181],"accuracy":[183],"some":[185],"techniques.":[188],"While":[189],"confirming":[190],"prior":[191],"can":[197],"outperform":[198],"existing":[199],"accessing":[202],"via":[204],"Chrome,":[205],"further":[207],"demonstrate":[208],"using":[210],"access":[213],"makes":[215],"them":[216],"even":[217],"difficult":[219],"fingerprint.":[221],"Finally,":[222],"expect":[224],"datasets,":[226],"four":[227],"which":[229],"alternatives,":[233],"will":[234],"prove":[235],"invaluable":[236],"future":[238],"research.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
