{"id":"https://openalex.org/W2888125116","doi":"https://doi.org/10.1145/3243734.3243824","title":"DeepCorr","display_name":"DeepCorr","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2888125116","doi":"https://doi.org/10.1145/3243734.3243824","mag":"2888125116"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243824","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243824","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243824","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243824","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Milad Nasr","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Milad Nasr","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Alireza Bahramali","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alireza Bahramali","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":null,"display_name":"Amir Houmansadr","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Houmansadr","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":7.1077,"has_fulltext":true,"cited_by_count":153,"citation_normalized_percentile":{"value":0.97550763,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1962","last_page":"1976"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9286999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.6801999807357788},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.5855000019073486},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4230000078678131},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.39329999685287476},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.37439998984336853},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.3652999997138977}],"concepts":[{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.6801999807357788},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6097999811172485},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.5855000019073486},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4230000078678131},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.39329999685287476},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.37439998984336853},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3700000047683716},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.3652999997138977},{"id":"https://openalex.org/C2776502983","wikidata":"https://www.wikidata.org/wiki/Q690182","display_name":"Contrast (vision)","level":2,"score":0.3562000095844269},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C53622274","wikidata":"https://www.wikidata.org/wiki/Q2496679","display_name":"Correlation function (quantum field theory)","level":3,"score":0.3190000057220459},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.3125999867916107},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C2986115478","wikidata":"https://www.wikidata.org/wiki/Q186290","display_name":"Positive correlation","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2808000147342682},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25440001487731934}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3243734.3243824","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243824","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243824","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1808.07285","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.07285","pdf_url":"https://arxiv.org/pdf/1808.07285","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3243734.3243824","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243824","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243824","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G283930402","display_name":null,"funder_award_id":"CNS-1525642","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G592795549","display_name":null,"funder_award_id":"1525642","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G660356245","display_name":null,"funder_award_id":"CNS-1564067","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7054054199","display_name":null,"funder_award_id":"CNS-1525642, CNS-1553301, and CNS-1564067","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8399881708","display_name":"TWC: Medium: Limits and Algorithms for Covert Communications","funder_award_id":"1564067","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2888125116.pdf","grobid_xml":"https://content.openalex.org/works/W2888125116.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W75879620","https://openalex.org/W138886706","https://openalex.org/W1513184267","https://openalex.org/W1579427489","https://openalex.org/W1591967853","https://openalex.org/W1763395909","https://openalex.org/W1869319442","https://openalex.org/W1967376787","https://openalex.org/W1978884755","https://openalex.org/W1985776777","https://openalex.org/W1993568446","https://openalex.org/W2002421583","https://openalex.org/W2011158884","https://openalex.org/W2012574038","https://openalex.org/W2014682428","https://openalex.org/W2031925412","https://openalex.org/W2043681328","https://openalex.org/W2048142551","https://openalex.org/W2076282258","https://openalex.org/W2078813897","https://openalex.org/W2080977773","https://openalex.org/W2092085685","https://openalex.org/W2094522125","https://openalex.org/W2099829430","https://openalex.org/W2107253631","https://openalex.org/W2108217512","https://openalex.org/W2120702739","https://openalex.org/W2125657162","https://openalex.org/W2127295197","https://openalex.org/W2130200004","https://openalex.org/W2135579486","https://openalex.org/W2139978474","https://openalex.org/W2144386326","https://openalex.org/W2146148058","https://openalex.org/W2148275477","https://openalex.org/W2151114655","https://openalex.org/W2169991041","https://openalex.org/W2170085959","https://openalex.org/W2272516773","https://openalex.org/W2484933080","https://openalex.org/W2490879758","https://openalex.org/W2505912742","https://openalex.org/W2766106298","https://openalex.org/W2766282988","https://openalex.org/W2783301790","https://openalex.org/W2793024185","https://openalex.org/W2963890727","https://openalex.org/W2964279257"],"related_works":[],"abstract_inverted_index":{"Flow":[0],"correlation":[1,20,26,76,124,142,201,230],"is":[2,132],"the":[3,16,104,209,215,225,242,249],"core":[4],"technique":[5],"used":[6],"in":[7,35,109,133,237],"a":[8,42,98,122,199],"multitude":[9],"of":[10,18,50,139,176,187,194,203,212,228,245],"deanonymization":[11],"attacks":[12,21,77,231],"on":[13,22,81,232],"Tor.":[14],"Despite":[15],"importance":[17],"flow":[19,25,59,75,123,177,191,200,229],"Tor,":[23],"existing":[24,169],"techniques":[27],"are":[28],"considered":[29],"to":[30,61,64,120,127,135,144,206],"be":[31,62,79],"ineffective":[32],"and":[33,171],"unreliable":[34],"linking":[36],"Tor":[37,82,111,146,157,190,195,233,250],"flows":[38],"when":[39],"applied":[40],"at":[41],"large":[43],"scale,":[44],"i.e.,":[45],"they":[46],"impose":[47],"high":[48],"rates":[49,54],"false":[51],"positive":[52],"error":[53],"or":[55],"require":[56],"impractically":[57],"long":[58],"observations":[60],"able":[63],"make":[65],"reliable":[66],"correlations.":[67],"In":[68],"this":[69,131],"paper,":[70],"we":[71],"show":[72,149],"that,":[73],"unfortunately,":[74],"can":[78,155],"conducted":[80],"traffic":[83],"with":[84,151,164],"drastically":[85],"higher":[86,167],"accuracies":[87,165],"than":[88,168],"before":[89],"by":[90,106,181,208,248],"leveraging":[91],"emerging":[92],"learning":[93,118,238],"mechanisms.":[94],"We":[95,148,219],"particularly":[96],"design":[97],"system,":[99],"called":[100],"DeepCorr,":[101],"that":[102,150,221],"outperforms":[103],"state-of-the-art":[105,210],"significant":[107],"margins":[108],"correlating":[110],"connections.":[112],"DeepCorr":[113,154,197],"leverages":[114],"an":[115],"advanced":[116],"deep":[117],"architecture":[119],"learn":[121],"function":[125],"tailored":[126],"Tor's":[128],"complex":[129],"network-":[130],"contrast":[134],"previous":[136],"works'":[137],"use":[138],"generic":[140],"statistical":[141],"metrics":[143],"correlate":[145,156],"flows.":[147],"moderate":[152],"learning,":[153],"connections":[158],"(and":[159],"therefore":[160],"break":[161],"its":[162],"anonymity)":[163],"significantly":[166],"algorithms,":[170,239],"using":[172,214],"substantially":[173],"shorter":[174],"lengths":[175],"observations.":[178],"For":[179],"instance,":[180],"collecting":[182],"only":[183],"about":[184],"900":[185],"packets":[186],"each":[188],"target":[189],"(roughly":[192],"900KB":[193],"data),":[196],"provides":[198],"accuracy":[202],"96%":[204],"compared":[205],"4%":[207],"system":[211],"RAPTOR":[213],"same":[216],"exact":[217],"setting.":[218],"hope":[220],"our":[222],"work":[223],"demonstrates":[224],"escalating":[226],"threat":[227],"given":[234],"recent":[235],"advances":[236],"calling":[240],"for":[241],"timely":[243],"deployment":[244],"effective":[246],"countermeasures":[247],"community.":[251]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":31},{"year":2022,"cited_by_count":27},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":6}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2018-08-31T00:00:00"}
