{"id":"https://openalex.org/W4407953195","doi":"https://doi.org/10.1145/3701551.3703547","title":"DTPN: A Diffusion-based Traffic Purification Network for Tor Website Fingerprinting","display_name":"DTPN: A Diffusion-based Traffic Purification Network for Tor Website Fingerprinting","publication_year":2025,"publication_date":"2025-02-26","ids":{"openalex":"https://openalex.org/W4407953195","doi":"https://doi.org/10.1145/3701551.3703547"},"language":"en","primary_location":{"id":"doi:10.1145/3701551.3703547","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3701551.3703547","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3701551.3703547","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115589285","display_name":"Chenchen Yang","orcid":"https://orcid.org/0009-0003-6452-6028"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenchen Yang","raw_affiliation_strings":["Shenzhen International Graduate School,Tsinghua University, Shenzhen, China, Key Laboratory of Cyberspace Security, Zhengzhou, China, &amp; Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen International Graduate School,Tsinghua University, Shenzhen, China, Key Laboratory of Cyberspace Security, Zhengzhou, China, &amp; Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101600503","display_name":"Xi Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi Xiao","raw_affiliation_strings":["Shenzhen International Graduate School,Tsinghua University, Shenzhen, China, Key Laboratory of Cyberspace Security, Zhengzhou, China, &amp; Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen International Graduate School,Tsinghua University, Shenzhen, China, Key Laboratory of Cyberspace Security, Zhengzhou, China, &amp; Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085450781","display_name":"Guangwu Hu","orcid":"https://orcid.org/0000-0003-3947-9998"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangwu Hu","raw_affiliation_strings":["Shenzhen Institute of Information Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Information Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044255077","display_name":"Zhen Ling","orcid":"https://orcid.org/0000-0001-9691-8702"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Ling","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100324585","display_name":"Hao Li","orcid":"https://orcid.org/0000-0002-9045-561X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Li","raw_affiliation_strings":["National Key Laboratory of Advanced Communication Network, Shijiazhuang, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Advanced Communication Network, Shijiazhuang, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027076648","display_name":"Bin Zhang","orcid":"https://orcid.org/0009-0005-5012-7151"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Zhang","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5115589285"],"corresponding_institution_ids":["https://openalex.org/I4210136793","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.4849,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88425225,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"642","last_page":"650"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5711091160774231},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.5153340697288513},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38501331210136414},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10339334607124329},{"id":"https://openalex.org/keywords/thermodynamics","display_name":"Thermodynamics","score":0.06595531105995178}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5711091160774231},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.5153340697288513},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38501331210136414},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10339334607124329},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.06595531105995178}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3701551.3703547","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3701551.3703547","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3701551.3703547","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3701551.3703547","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W398859631","https://openalex.org/W1522301498","https://openalex.org/W1993568446","https://openalex.org/W2012210084","https://openalex.org/W2027177092","https://openalex.org/W2088565190","https://openalex.org/W2108217512","https://openalex.org/W2120702739","https://openalex.org/W2129069237","https://openalex.org/W2135579486","https://openalex.org/W2145137020","https://openalex.org/W2149280729","https://openalex.org/W2194775991","https://openalex.org/W2350778671","https://openalex.org/W2485000773","https://openalex.org/W2752949934","https://openalex.org/W2782688857","https://openalex.org/W2783301790","https://openalex.org/W2959300817","https://openalex.org/W2964602598","https://openalex.org/W2989013751","https://openalex.org/W3036167779","https://openalex.org/W3094227091","https://openalex.org/W3103367901","https://openalex.org/W3107803931","https://openalex.org/W3157286348","https://openalex.org/W4283837118","https://openalex.org/W4289950804","https://openalex.org/W4315746341","https://openalex.org/W4321521230","https://openalex.org/W4392384434","https://openalex.org/W4392384596","https://openalex.org/W6779823529","https://openalex.org/W6838695150"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Website":[0,37],"Fingerprinting":[1,38],"attack":[2,59,70],"is":[3,111,123],"a":[4,108,114,128],"type":[5],"of":[6,32,105,175,206],"method":[7,110,164,223],"used":[8],"to":[9,29,47,52,101,126,131,171,228,240],"classify":[10],"network":[11,40,50,95,118,133,167,176,192,198,215],"traffic":[12,41,51,96,119,134,168,177,193,199,216],"generated":[13,156],"by":[14,67,157,226],"users":[15],"on":[16,23,63,137,230,235],"the":[17,24,30,48,54,69,76,103,124,150,161,204,221],"Tor":[18],"(The":[19],"Onion":[20],"Router)":[21],"based":[22,136],"websites":[25],"they":[26],"visit,":[27],"leading":[28],"leakage":[31],"individuals'":[33],"privacy":[34],".":[35],"For":[36],"attack,":[39],"defense":[42,135,194,217],"methods":[43,56,60,170],"involve":[44],"adding":[45],"noise":[46],"original":[49],"render":[53],"attacker's":[55],"ineffective.":[57],"Previous":[58],"primarily":[61],"focused":[62],"improving":[64],"classification":[65,169,174],"accuracy":[66,225],"enhancing":[68],"model,":[71],"with":[72,92,189],"adversarial":[73,81,106,138,158,241],"training":[74,82,151],"being":[75],"most":[77],"common":[78],"approach.":[79],"However,":[80],"requires":[83],"frequent":[84],"updates":[85],"and":[86,233],"exhibits":[87],"poor":[88],"generalization":[89,187],"when":[90],"dealing":[91],"previously":[93,190],"unseen":[94,191],"protection":[97,179],"methods.":[98,195,210],"In":[99],"order":[100],"address":[102],"limitations":[104],"training,":[107],"novel":[109],"proposed":[112,222],"leveraging":[113],"diffusion":[115,129,141],"model":[116,130],"for":[117,146],"purification.":[120],"This":[121],"paper":[122],"first":[125],"use":[127],"resist":[132],"perturbations.":[139],"The":[140,196],"models":[142],"are":[143],"theoretically":[144],"suited":[145],"data":[147,200],"purification":[148],"in":[149],"mode,":[152],"i.e.,":[153],"removing":[154],"noises":[155],"perturbations":[159],"from":[160],"data.":[162],"Our":[163],"enables":[165],"existing":[166,207],"maintain":[172],"effective":[173],"after":[178],"without":[180],"requiring":[181],"retraining,":[182],"while":[183],"also":[184],"achieving":[185],"good":[186],"performance":[188],"purified":[197],"can":[201],"effectively":[202],"improve":[203],"robustness":[205],"website":[208],"fingerprinting":[209],"Experiments":[211],"conducted":[212],"under":[213],"various":[214],"strategies":[218],"demonstrate":[219],"that":[220],"increases":[224],"up":[227],"60.8%":[229],"DF":[231],"dataset":[232],"50.3%":[234],"CW100":[236],"dataset,":[237],"respectively,":[238],"compared":[239],"training.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
