{"id":"https://openalex.org/W2989013751","doi":"https://doi.org/10.1145/3319535.3354217","title":"Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning","display_name":"Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2989013751","doi":"https://doi.org/10.1145/3319535.3354217","mag":"2989013751"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3354217","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354217","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354217","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046710978","display_name":"Payap Sirinam","orcid":null},"institutions":[{"id":"https://openalex.org/I279583474","display_name":"Navamindradhiraj University","ror":"https://ror.org/01qkghv97","country_code":"TH","type":"education","lineage":["https://openalex.org/I279583474"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Payap Sirinam","raw_affiliation_strings":["Navaminda Kasatriyadhiraj Royal Air Force Academy, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Navaminda Kasatriyadhiraj Royal Air Force Academy, Bangkok, Thailand","institution_ids":["https://openalex.org/I279583474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038615730","display_name":"Nate Mathews","orcid":"https://orcid.org/0000-0001-6186-7001"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nate Mathews","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101896350","display_name":"Mohammad Saidur Rahman","orcid":"https://orcid.org/0000-0001-6673-171X"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Saidur Rahman","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Wright","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046710978"],"corresponding_institution_ids":["https://openalex.org/I279583474"],"apc_list":null,"apc_paid":null,"fwci":9.9834,"has_fulltext":true,"cited_by_count":216,"citation_normalized_percentile":{"value":0.98458675,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1131","last_page":"1148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7793217897415161},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6793704628944397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6082803010940552},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.546883225440979},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.49174192547798157},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4727945029735565},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4673600196838379},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.45066630840301514},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.44776517152786255}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7793217897415161},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6793704628944397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6082803010940552},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.546883225440979},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.49174192547798157},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4727945029735565},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4673600196838379},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.45066630840301514},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.44776517152786255}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3354217","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354217","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3319535.3354217","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354217","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G1011909532","display_name":null,"funder_award_id":"1433736","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1596376646","display_name":null,"funder_award_id":"CNS-1423163 and CNS-1722743","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G365561784","display_name":null,"funder_award_id":"1722743","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G541942238","display_name":null,"funder_award_id":"1423163","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2989013751.pdf","grobid_xml":"https://content.openalex.org/works/W2989013751.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2075442675","https://openalex.org/W2097117768","https://openalex.org/W2108217512","https://openalex.org/W2115733720","https://openalex.org/W2120702739","https://openalex.org/W2145287260","https://openalex.org/W2149280729","https://openalex.org/W2163605009","https://openalex.org/W2167969546","https://openalex.org/W2194775991","https://openalex.org/W2269460187","https://openalex.org/W2272516773","https://openalex.org/W2325939864","https://openalex.org/W2350778671","https://openalex.org/W2432717477","https://openalex.org/W2485000773","https://openalex.org/W2490879758","https://openalex.org/W2531409750","https://openalex.org/W2606611007","https://openalex.org/W2750601856","https://openalex.org/W2783301790","https://openalex.org/W2788520907","https://openalex.org/W2796063674","https://openalex.org/W2889182794","https://openalex.org/W2891651011","https://openalex.org/W2903379676","https://openalex.org/W2912500072","https://openalex.org/W2949667497","https://openalex.org/W2962835968","https://openalex.org/W2963270948","https://openalex.org/W2963704216","https://openalex.org/W2964123888","https://openalex.org/W2964602598","https://openalex.org/W3091905774","https://openalex.org/W3099206234","https://openalex.org/W3103367901","https://openalex.org/W3104102522","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W4206398305","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2982648111","https://openalex.org/W2082747743","https://openalex.org/W1993929477","https://openalex.org/W2071573776"],"abstract_inverted_index":{"Website":[0],"Fingerprinting":[1,31,178],"(WF)":[2],"attacks":[3,28,72,92],"pose":[4],"a":[5,134,140,151,172,258,264,274],"serious":[6],"threat":[7],"to":[8,36,51,138,256],"users'":[9],"online":[10],"privacy,":[11],"including":[12],"for":[13,59,76,184],"users":[14],"of":[15,46,110,146,162,248,267],"the":[16,60,95,107,114,144,159,197,214,231,238,250],"Tor":[17],"anonymity":[18],"system.":[19],"By":[20],"exploiting":[21],"recent":[22],"advances":[23],"in":[24,66,191,219,237,263],"deep":[25],"learning,":[26],"WF":[27,71,91,153,174],"like":[29],"Deep":[30],"(DF)":[32],"have":[33,100],"reached":[34],"up":[35],"98%":[37],"accuracy.":[38],"The":[39],"DF":[40],"attack,":[41],"however,":[42],"requires":[43,252],"large":[44,152],"amounts":[45],"training":[47,98,136,149,198,272],"data":[48,99,201],"that":[49,94,180,213,230],"needs":[50],"be":[52,278],"updated":[53],"regularly,":[54],"making":[55,260],"it":[56,261],"less":[57],"practical":[58],"weaker":[61],"attacker":[62,124],"model":[63],"typically":[64],"assumed":[65],"WF.":[67],"Moreover,":[68],"research":[69,89],"on":[70,90,207,273],"has":[73],"been":[74],"criticized":[75],"not":[77],"demonstrating":[78],"attack":[79,175,190,216,233,251],"effectiveness":[80],"under":[81],"more":[82,85],"realistic":[83],"and":[84,97,103,148,199,210,241,271],"challenging":[86,192],"scenarios.":[87],"Most":[88],"assumes":[93],"testing":[96,200],"similar":[101],"distributions":[102],"are":[104,202],"collected":[105,203],"from":[106],"same":[108,115],"type":[109],"network":[111,166],"at":[112],"about":[113],"time.":[116],"In":[117,168],"this":[118,189],"paper,":[119],"we":[120,170,211],"examine":[121],"how":[122],"an":[123],"could":[125],"leverage":[126],"N-shot":[127,185],"learning---a":[128],"machine":[129],"learning":[130],"technique":[131],"requiring":[132],"just":[133],"few":[135],"samples":[137],"identify":[139],"given":[141],"class---to":[142],"reduce":[143],"effort":[145],"gathering":[147,270],"with":[150,164,222],"dataset":[154,276],"as":[155,157,195],"well":[156],"mitigate":[158],"adverse":[160],"effects":[161],"dealing":[163],"different":[165,208],"conditions.":[167],"particular,":[169],"propose":[171],"new":[173],"called":[176],"Triplet":[177],"(TF)":[179],"uses":[181],"triplet":[182],"networks":[183],"learning.":[186,245],"We":[187,227],"evaluate":[188],"settings":[193,221],"such":[194,220],"where":[196,269],"multiple":[204],"years":[205],"apart":[206],"networks,":[209],"find":[212],"TF":[215,232],"remains":[217],"effective":[218,236],"85%":[223],"accuracy":[224],"or":[225],"better.":[226],"also":[228,235],"show":[229],"is":[234],"open":[239],"world":[240],"outperforms":[242],"traditional":[243],"transfer":[244],"On":[246],"top":[247],"that,":[249],"only":[253],"five":[254],"examples":[255],"recognize":[257],"website,":[259],"dangerous":[262],"wide":[265],"variety":[266],"scenarios":[268],"complete":[275],"would":[277],"impractical.":[279]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":48},{"year":2024,"cited_by_count":51},{"year":2023,"cited_by_count":42},{"year":2022,"cited_by_count":31},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":9}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
