{"id":"https://openalex.org/W7152386106","doi":"https://doi.org/10.1145/3774904.3792288","title":"Robust LLM-Based Website Fingerprinting under Dynamic Real-World Conditions","display_name":"Robust LLM-Based Website Fingerprinting under Dynamic Real-World Conditions","publication_year":2026,"publication_date":"2026-04-09","ids":{"openalex":"https://openalex.org/W7152386106","doi":"https://doi.org/10.1145/3774904.3792288"},"language":null,"primary_location":{"id":"doi:10.1145/3774904.3792288","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774904.3792288","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2026","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3774904.3792288","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101072612","display_name":"Xiyuan Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiyuan Zhao","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0005-6347-7011","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xinhao Deng","orcid":"https://orcid.org/0000-0002-4366-4777"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhao Deng","raw_affiliation_strings":["Ant Group, Hangzhou, China and Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4366-4777","affiliations":[{"raw_affiliation_string":"Ant Group, Hangzhou, China and Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076107339","display_name":"Tianyu Cui","orcid":"https://orcid.org/0000-0002-4467-2760"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tianyu Cui","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4467-2760","affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yixiang Zhang","orcid":"https://orcid.org/0009-0006-4501-0167"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixiang Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0006-4501-0167","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ke Xu","orcid":"https://orcid.org/0000-0003-2587-8517"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2587-8517","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133283059","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8776-8730","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101072612"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78077878,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2800","last_page":"2811"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.2840999960899353,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.2840999960899353,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.15379999577999115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.13230000436306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.33719998598098755},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.2687999904155731},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.26660001277923584},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.2605000138282776},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.25850000977516174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5748999714851379},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32409998774528503},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3174999952316284},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2583000063896179},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2484000027179718}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3774904.3792288","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774904.3792288","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2026","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3774904.3792288","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3774904.3792288","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2026","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2012210084","https://openalex.org/W2021949962","https://openalex.org/W2027177092","https://openalex.org/W2272516773","https://openalex.org/W2896133229","https://openalex.org/W2903379676","https://openalex.org/W2956281981","https://openalex.org/W2963341956","https://openalex.org/W2963704216","https://openalex.org/W2964602598","https://openalex.org/W2989013751","https://openalex.org/W3015990833","https://openalex.org/W3106813043","https://openalex.org/W3193903060","https://openalex.org/W4224315052","https://openalex.org/W4225696825","https://openalex.org/W4288057746","https://openalex.org/W4382239858","https://openalex.org/W4384948652","https://openalex.org/W4387298163","https://openalex.org/W4388856908","https://openalex.org/W4388858184","https://openalex.org/W4391590983","https://openalex.org/W4404580180","https://openalex.org/W4405181245","https://openalex.org/W4405183144","https://openalex.org/W4410852842","https://openalex.org/W4411337669"],"related_works":[],"abstract_inverted_index":{"Website":[0],"Fingerprinting":[1],"(WF)":[2],"attacks":[3,24,109],"aim":[4],"to":[5,37,56,105,124],"infer":[6],"the":[7,39,60,87,145],"websites":[8],"visited":[9],"by":[10,13,177,185],"Tor":[11],"users":[12],"analyzing":[14],"patterns":[15],"in":[16,30,133],"encrypted":[17],"network":[18,58],"traffic.":[19,169],"However,":[20],"most":[21],"existing":[22,91],"WF":[23,108],"are":[25],"evaluated":[26],"on":[27,120],"traffic":[28,48,123],"collected":[29],"controlled":[31],"environments":[32],"with":[33,156],"fixed":[34],"configurations,":[35],"failing":[36],"reflect":[38],"complexity":[40],"and":[41,53,68,79,117,127,135,152,163,182],"variability":[42,78],"of":[43,63,71,90,180],"real-world":[44,111],"conditions.":[45,112],"In":[46,93],"practice,":[47],"is":[49],"far":[50],"more":[51],"dynamic":[52,134],"diverse":[54,121],"due":[55],"heterogeneous":[57],"conditions,":[59],"large":[61],"number":[62],"subpages":[64],"within":[65],"individual":[66],"websites,":[67],"continuous":[69],"evolution":[70],"website":[72,150],"content.":[73],"These":[74],"factors":[75],"increase":[76],"intra-class":[77],"induce":[80],"temporal":[81],"feature":[82],"drift,":[83],"which":[84],"ultimately":[85],"degrades":[86],"long-term":[88],"effectiveness":[89],"attacks.":[92],"this":[94],"paper,":[95],"we":[96],"propose":[97],"TraVerse,":[98],"an":[99,178],"LLM-based":[100],"representation":[101],"learning":[102],"framework":[103],"designed":[104],"achieve":[106],"robust":[107],"under":[110],"TraVerse":[113,139,162,174],"applies":[114],"architectural":[115],"adaptation":[116,155],"large-scale":[118],"fine-tuning":[119],"unlabeled":[122],"learn":[125],"generalizable":[126],"resilient":[128],"representations":[129],"that":[130,173],"remain":[131],"effective":[132],"evolving":[136],"environments.":[137],"Furthermore,":[138],"integrates":[140],"a":[141,195],"lightweight":[142],"classifier":[143],"atop":[144],"LLM-derived":[146],"representations,":[147],"enabling":[148],"accurate":[149],"identification":[151],"efficient":[153],"few-shot":[154],"minimal":[157],"model":[158],"updates.":[159],"We":[160],"prototype":[161],"conduct":[164],"comprehensive":[165],"evaluations":[166],"using":[167],"real-user":[168],"Experimental":[170],"results":[171],"show":[172],"improves":[175],"Accuracy@3":[176],"average":[179],"176.3%":[181],"weighted":[183],"F1":[184],"343.3%":[186],"over":[187],"state-of-the-art":[188],"baselines,":[189],"while":[190],"maintaining":[191],"strong":[192],"performance":[193],"throughout":[194],"three-month":[196],"longitudinal":[197],"evaluation.":[198]},"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-04-10T00:00:00"}
