{"id":"https://openalex.org/W4413120547","doi":"https://doi.org/10.1109/tnsm.2025.3597075","title":"STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses","display_name":"STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses","publication_year":2025,"publication_date":"2025-08-08","ids":{"openalex":"https://openalex.org/W4413120547","doi":"https://doi.org/10.1109/tnsm.2025.3597075"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3597075","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3597075","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004590339","display_name":"Jianan Huang","orcid":"https://orcid.org/0009-0005-8216-5478"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jia-Nan Huang","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359503","display_name":"Weiwei Liu","orcid":"https://orcid.org/0000-0001-7353-9136"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Liu","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062243742","display_name":"Guangjie Liu","orcid":"https://orcid.org/0000-0003-4729-7406"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangjie Liu","raw_affiliation_strings":["School of Electronics and Information Engineering and the Key Laboratory of Intelligent Support Technology for Complex Environments, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering and the Key Laboratory of Intelligent Support Technology for Complex Environments, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102994219","display_name":"Bo Gao","orcid":"https://orcid.org/0000-0002-1787-6194"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Gao","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093837330","display_name":"Fengyuan Nie","orcid":"https://orcid.org/0009-0003-8085-7011"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyuan Nie","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060087704","display_name":"Marco Mellia","orcid":"https://orcid.org/0000-0003-1859-6693"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mellia","raw_affiliation_strings":["Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004590339"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11541866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"6","first_page":"6200","last_page":"6214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9678000211715698,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7211956977844238},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.671966016292572},{"id":"https://openalex.org/keywords/transition","display_name":"Transition (genetics)","score":0.5331752896308899},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4870803654193878},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4657275080680847},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3512704372406006},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1821792721748352},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15810424089431763}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7211956977844238},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.671966016292572},{"id":"https://openalex.org/C194232998","wikidata":"https://www.wikidata.org/wiki/Q1606712","display_name":"Transition (genetics)","level":3,"score":0.5331752896308899},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4870803654193878},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4657275080680847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3512704372406006},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1821792721748352},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15810424089431763},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3597075","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3597075","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.800000011920929}],"awards":[{"id":"https://openalex.org/G2631150135","display_name":null,"funder_award_id":"U21B2003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4899784454","display_name":null,"funder_award_id":"62072250","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5172411173","display_name":null,"funder_award_id":"2021QY0700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6347247583","display_name":null,"funder_award_id":"U2436601","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8297849707","display_name":null,"funder_award_id":"61602247","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1982682305","https://openalex.org/W2012210084","https://openalex.org/W2015896281","https://openalex.org/W2021949962","https://openalex.org/W2027177092","https://openalex.org/W2048702750","https://openalex.org/W2272516773","https://openalex.org/W2273944394","https://openalex.org/W2485000773","https://openalex.org/W2569902445","https://openalex.org/W2604754095","https://openalex.org/W2888125116","https://openalex.org/W2892381525","https://openalex.org/W2915004662","https://openalex.org/W2919493784","https://openalex.org/W2963065250","https://openalex.org/W3007562398","https://openalex.org/W3035950449","https://openalex.org/W3106813043","https://openalex.org/W3107803931","https://openalex.org/W3169619208","https://openalex.org/W3178319053","https://openalex.org/W3211002588","https://openalex.org/W4224315052","https://openalex.org/W4285819445","https://openalex.org/W4288057746","https://openalex.org/W4289950804","https://openalex.org/W4296473472","https://openalex.org/W4308650955","https://openalex.org/W4323338334","https://openalex.org/W4366147360","https://openalex.org/W4367046757","https://openalex.org/W4385757655","https://openalex.org/W4388262486","https://openalex.org/W4402264442"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Web":[0,43,48,68],"services,":[1,9],"as":[2],"the":[3,39,92,96,104,126,160,167],"most":[4],"ubiquitous":[5],"form":[6],"of":[7,42,99,128],"online":[8,29],"have":[10],"consistently":[11],"attracted":[12],"research":[13],"attention":[14],"due":[15],"to":[16,46,189,198],"privacy":[17,108],"concerns.":[18],"Although":[19],"VPNs":[20],"and":[21,77,86,103,152,191],"anonymous":[22],"communication":[23],"methods":[24],"can":[25,70,163],"partially":[26],"protect":[27],"users\u2019":[28],"privacy,":[30],"advancements":[31],"in":[32,53,136,182,193],"website":[33],"fingerprinting":[34],"(WF)":[35],"attacks":[36,57],"still":[37],"exploit":[38],"spatio-temporal":[40],"characteristics":[41],"resource":[44,137],"transmission":[45],"identify":[47],"services.":[49],"The":[50],"challenge":[51],"lies":[52],"defending":[54],"against":[55],"WF":[56,64,116],"efficiently,":[58],"with":[59,101,154],"limited":[60],"bandwidth":[61,85,194],"costs.":[62],"Server-side":[63],"defenses,":[65],"deployed":[66],"on":[67,91],"servers,":[69],"achieve":[71],"end-to-end":[72],"obfuscation":[73],"across":[74],"both":[75],"clients":[76],"servers.":[78],"However,":[79],"existing":[80],"defenses":[81],"often":[82],"consume":[83],"significant":[84],"require":[87],"additional":[88],"removal":[89],"operations":[90],"client":[93],"side.":[94],"Given":[95],"growing":[97],"use":[98],"QUIC":[100],"HTTP/3":[102],"need":[105],"for":[106,169],"robust":[107],"protections,":[109],"this":[110],"paper":[111],"introduces":[112,125],"an":[113],"asymmetric":[114],"server-side":[115],"defense":[117],"scheme":[118],"using":[119],"State-Transition":[120],"Adversarial":[121],"Perturbations":[122],"(STAP).":[123],"STAP":[124,145,162,176],"concept":[127],"latent":[129],"resource-state":[130],"transitions,":[131,144],"which":[132],"represent":[133],"hidden":[134],"patterns":[135],"transmission.":[138],"Utilizing":[139],"perturbation":[140],"models":[141],"containing":[142],"these":[143],"subtly":[146],"alters":[147],"traffic":[148],"through":[149],"packet":[150],"padding":[151],"insertion,":[153],"inherent":[155],"transport":[156],"layer":[157],"encryption":[158],"enhancing":[159],"concealment.":[161],"operate":[164],"independently,":[165],"removing":[166],"necessity":[168],"user":[170],"involvement.":[171],"Experimental":[172],"results":[173],"demonstrate":[174],"that":[175],"outperforms":[177],"other":[178],"schemes,":[179],"achieving":[180],"reductions":[181,192],"True":[183],"Positive":[184],"Rate":[185],"(TPR)":[186],"by":[187,196],"up":[188,197],"22%":[190],"overhead":[195],"30%.":[199]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
