{"id":"https://openalex.org/W7131128789","doi":"https://doi.org/10.1109/ton.2026.3666721","title":"Toward Robust Multi-Tab Website Fingerprinting","display_name":"Toward Robust Multi-Tab Website Fingerprinting","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7131128789","doi":"https://doi.org/10.1109/ton.2026.3666721"},"language":null,"primary_location":{"id":"doi:10.1109/ton.2026.3666721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3666721","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126602748","display_name":"Xinhao Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinhao Deng","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4366-4777","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiyuan Zhao","orcid":"https://orcid.org/0009-0005-6347-7011"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiyuan Zhao","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0005-6347-7011","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126605354","display_name":"Qilei Yin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qilei Yin","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0148-2772","affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206037","display_name":"Zhuotao Liu","orcid":"https://orcid.org/0000-0002-7532-0434"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuotao Liu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-7532-0434","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126629732","display_name":"Qi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8776-8730","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108124733","display_name":"M. Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwei Xu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4847-4585","affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126634186","display_name":"Ke Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2587-8517","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126630389","display_name":"Jianping Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping Wu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5126602748"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35269989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"3656","last_page":"3671"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.2791000008583069,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.2791000008583069,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.2728999853134155,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.10050000250339508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5072000026702881},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46700000762939453},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4122999906539917},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.3528999984264374},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.30399999022483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7095999717712402},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5072000026702881},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46700000762939453},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4221999943256378},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.31779998540878296},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.29420000314712524},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.28600001335144043}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2026.3666721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3666721","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2486160221","display_name":null,"funder_award_id":"62502473","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3562635767","display_name":null,"funder_award_id":"62472247","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5252299824","display_name":null,"funder_award_id":"62425201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7155321176","display_name":null,"funder_award_id":"62132011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7488493096","display_name":null,"funder_award_id":"62221003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7876833161","display_name":null,"funder_award_id":"25JJJJC0003","funder_id":"https://openalex.org/F4320334977","funder_display_name":"Beijing Municipal Natural Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334977","display_name":"Beijing Municipal Natural Science Foundation","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Website":[0],"fingerprinting":[1,19],"enables":[2],"an":[3,14],"eavesdropper":[4],"to":[5,120],"determine":[6],"which":[7],"websites":[8,40,51],"a":[9,63,67,75,91,133],"user":[10],"is":[11,52,65],"visiting":[12],"over":[13,147],"encrypted":[15],"connection.":[16],"State-of-the-art":[17],"website":[18],"(WF)":[20],"attacks":[21,33],"have":[22,34],"demonstrated":[23],"effectiveness":[24,141],"even":[25,167],"against":[26,168],"Tor-protected":[27],"network":[28],"traffic.":[29],"However,":[30],"existing":[31],"WF":[32,77,83,170],"critical":[35],"limitations":[36],"on":[37,109],"accurately":[38],"identifying":[39,129],"in":[41,159],"multi-tab":[42,82,88],"browsing":[43],"sessions,":[44],"where":[45],"the":[46,57,87,99,116,122],"holistic":[47],"pattern":[48],"of":[49,59,135],"individual":[50],"no":[53],"longer":[54],"preserved,":[55],"and":[56,95,114,137],"number":[58],"tabs":[60],"opened":[61],"by":[62],"client":[64],"unknown":[66],"priori.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72],"propose":[73],"ARES,":[74],"novel":[76,100],"framework":[78],"natively":[79],"designed":[80],"for":[81],"attacks.":[84],"ARES":[85,104,136,155,164],"formulates":[86],"attack":[89],"as":[90],"multi-label":[92],"classification":[93],"problem":[94],"solves":[96],"it":[97],"using":[98,142],"Transformer-based":[101],"models.":[102],"Specifically,":[103],"extracts":[105],"local":[106,126],"patterns":[107],"based":[108],"multi-level":[110],"traffic":[111],"aggregation":[112],"features":[113],"utilizes":[115],"improved":[117],"self-attention":[118],"mechanism":[119],"analyze":[121],"correlations":[123],"between":[124],"these":[125],"patterns,":[127],"effectively":[128],"websites.":[130],"We":[131],"implement":[132],"prototype":[134],"extensively":[138],"evaluate":[139],"its":[140],"our":[143],"large-scale":[144],"datasets":[145],"collected":[146],"multiple":[148],"months.":[149],"The":[150],"experimental":[151],"results":[152],"illustrate":[153],"that":[154],"achieves":[156],"optimal":[157],"performance":[158],"several":[160],"realistic":[161],"scenarios.":[162],"Further,":[163],"remains":[165],"robust":[166],"various":[169],"defenses.":[171]},"counts_by_year":[],"updated_date":"2026-03-04T07:04:00.330322","created_date":"2026-02-24T00:00:00"}
