{"id":"https://openalex.org/W4388858184","doi":"https://doi.org/10.1145/3576915.3616639","title":"Realistic Website Fingerprinting By Augmenting Network Traces","display_name":"Realistic Website Fingerprinting By Augmenting Network Traces","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388858184","doi":"https://doi.org/10.1145/3576915.3616639"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3616639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3616639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051306856","display_name":"Alireza Bahramali","orcid":"https://orcid.org/0000-0003-4127-1168"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alireza Bahramali","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034864929","display_name":"Ardavan Bozorgi","orcid":"https://orcid.org/0000-0003-3056-4758"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ardavan Bozorgi","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018588864","display_name":"Amir Houmansadr","orcid":"https://orcid.org/0000-0002-7553-6657"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Houmansadr","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051306856"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":7.9219,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.98113164,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1035","last_page":"1049"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8345286250114441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8154748678207397},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6319581270217896},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5608394742012024},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5375354886054993},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.497791051864624},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48236554861068726},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.42109960317611694},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3650982975959778},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2968616485595703},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24193373322486877}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8345286250114441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8154748678207397},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6319581270217896},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5608394742012024},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5375354886054993},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.497791051864624},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48236554861068726},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.42109960317611694},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3650982975959778},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2968616485595703},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24193373322486877}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3576915.3616639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3616639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G2996961096","display_name":null,"funder_award_id":"CNS-1953786","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6989095824","display_name":null,"funder_award_id":"DARPA-RA-21-03-09-YFA9-FP-003","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1975165783","https://openalex.org/W1993568446","https://openalex.org/W2079057609","https://openalex.org/W2111316763","https://openalex.org/W2120702739","https://openalex.org/W2135579486","https://openalex.org/W2170085959","https://openalex.org/W2269460187","https://openalex.org/W2272516773","https://openalex.org/W2490879758","https://openalex.org/W2604754095","https://openalex.org/W2783301790","https://openalex.org/W2903379676","https://openalex.org/W2913901113","https://openalex.org/W2963704216","https://openalex.org/W2964123888","https://openalex.org/W2999498625","https://openalex.org/W3015990833","https://openalex.org/W3035160371","https://openalex.org/W3102722348","https://openalex.org/W3103367901","https://openalex.org/W3142405232","https://openalex.org/W4388858184"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2082747743","https://openalex.org/W1993929477","https://openalex.org/W2071573776","https://openalex.org/W2942963309","https://openalex.org/W2033319591","https://openalex.org/W2099812151"],"abstract_inverted_index":{"Website":[0],"Fingerprinting":[1,253],"(WF)":[2],"is":[3,174,241],"considered":[4],"a":[5,87,207,211,233],"major":[6],"threat":[7],"to":[8,50,74,136,170,176,188,222,243],"the":[9,39,46,51,55,75,119,137,171,190,226,237,250,258,266],"anonymity":[10,16],"of":[11,41,59,121,139,179,192,246,261,268,275],"Tor":[12,140,201],"users":[13],"(and":[14],"other":[15,273],"systems).":[17],"While":[18],"state-of-the-art":[19,251],"WF":[20,43,88,122,164,216,238],"techniques":[21],"have":[22,37],"claimed":[23],"high":[24],"attack":[25,217],"accuracies,":[26],"e.g.,":[27,86],"by":[28,236,249],"leveraging":[29],"Deep":[30],"Neural":[31],"Networks":[32],"(DNN),":[33],"several":[34],"recent":[35],"works":[36],"questioned":[38],"practicality":[40],"such":[42,68],"attacks":[44,165],"in":[45,54,78,82,124,195,210,232,272],"real":[47],"world":[48],"due":[49,73,175],"assumptions":[52],"made":[53],"design":[56],"and":[57,147,154],"evaluation":[58,161,229],"these":[60],"attacks.":[61],"In":[62],"this":[63,173],"work,":[64],"we":[65,129],"argue":[66],"that":[67,113,158,257],"impracticality":[69],"issues":[70],"are":[71,230],"mainly":[72],"attacker's":[76],"inability":[77],"collecting":[79],"training":[80],"data":[81],"comprehensive":[83],"network":[84,101,109,115,126,181,269,276],"conditions,":[85],"classifier":[89],"may":[90],"be":[91],"trained":[92],"only":[93],"on":[94,98,105],"high-bandwidth":[95,100],"samples":[96],"collected":[97,231],"specific":[99],"links":[102],"but":[103],"deployed":[104],"connections":[106],"with":[107,206],"different":[108],"conditions.":[110,127],"We":[111,142,255],"show":[112],"augmenting":[114],"traces":[116,182,227],"can":[117,264],"enhance":[118],"performance":[120],"classifiers":[123],"unobserved":[125,196,235],"Specifically,":[128],"introduce":[130],"NetAugment,":[131],"an":[132,244],"augmentation":[133,271],"technique":[134],"tailored":[135],"specifications":[138],"traces.":[141],"instantiate":[143],"NetAugment":[144],"through":[145],"semi-supervised":[146],"self-supervised":[148,215],"learning":[149,209],"techniques.":[150],"Our":[151],"extensive":[152],"open-world":[153],"close-world":[155],"experiments":[156],"demonstrate":[157],"under":[159],"practical":[160],"settings,":[162],"our":[163,214,262],"provide":[166],"superior":[167],"performances":[168],"compared":[169,242],"state-of-the-art;":[172],"their":[177],"use":[178,267],"augmented":[180],"for":[183,228],"training,":[184],"which":[185],"allows":[186],"them":[187],"learn":[189],"features":[191],"target":[193],"traffic":[194,277],"settings":[197],"(e.g.,":[198],"unknown":[199],"bandwidth,":[200],"circuits,":[202],"etc.).":[203],"For":[204],"instance,":[205],"5-shot":[208],"closed-world":[212],"scenario,":[213],"(named":[218],"NetCLR)":[219],"reaches":[220],"up":[221],"80%":[223],"accuracy":[224,245],"when":[225],"setting":[234],"adversary.":[239],"This":[240],"64.4%":[247],"achieved":[248],"Triplet":[252],"[34].":[254],"believe":[256],"promising":[259],"results":[260],"work":[263],"encourage":[265],"trace":[270],"types":[274],"analysis.":[278]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
