{"id":"https://openalex.org/W3202024182","doi":"https://doi.org/10.1155/2021/6070451","title":"Website Fingerprinting Attacks Based on Homology Analysis","display_name":"Website Fingerprinting Attacks Based on Homology Analysis","publication_year":2021,"publication_date":"2021-10-04","ids":{"openalex":"https://openalex.org/W3202024182","doi":"https://doi.org/10.1155/2021/6070451","mag":"3202024182"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6070451","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6070451","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6070451.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/6070451.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033413683","display_name":"Maohua Guo","orcid":"https://orcid.org/0000-0001-7990-4165"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maohua Guo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027205215"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.5439,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72988256,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8519151210784912},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5826582312583923},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5640257596969604},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46636852622032166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4577232301235199},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.380088210105896},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30257558822631836}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8519151210784912},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5826582312583923},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5640257596969604},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46636852622032166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4577232301235199},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.380088210105896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30257558822631836}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6070451","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6070451","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6070451.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:60e57116d9c74b4b91386f642282d0a5","is_oa":true,"landing_page_url":"https://doaj.org/article/60e57116d9c74b4b91386f642282d0a5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6070451","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6070451","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6070451.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.800000011920929,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3202024182.pdf","grobid_xml":"https://content.openalex.org/works/W3202024182.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1836465849","https://openalex.org/W1916902331","https://openalex.org/W1993568446","https://openalex.org/W2135579486","https://openalex.org/W2269460187","https://openalex.org/W2272516773","https://openalex.org/W2485000773","https://openalex.org/W2557890466","https://openalex.org/W2612690371","https://openalex.org/W2752949934","https://openalex.org/W2761495217","https://openalex.org/W2763967737","https://openalex.org/W2768083292","https://openalex.org/W2782688857","https://openalex.org/W2944882402","https://openalex.org/W2964602598","https://openalex.org/W2979689312","https://openalex.org/W2989013751","https://openalex.org/W3012255272","https://openalex.org/W3015305429","https://openalex.org/W3049399107","https://openalex.org/W3091905774","https://openalex.org/W3103367901","https://openalex.org/W3106813043","https://openalex.org/W3107803931","https://openalex.org/W3142405232","https://openalex.org/W4255421341","https://openalex.org/W4294065829","https://openalex.org/W4299319711","https://openalex.org/W6695009093","https://openalex.org/W6735236233","https://openalex.org/W6931904461"],"related_works":["https://openalex.org/W2362737126","https://openalex.org/W3181746755","https://openalex.org/W2521062615","https://openalex.org/W3016958897","https://openalex.org/W4283379348","https://openalex.org/W4312417841","https://openalex.org/W2735477435","https://openalex.org/W3045739591","https://openalex.org/W2807436399","https://openalex.org/W3001728219"],"abstract_inverted_index":{"Website":[0],"fingerprinting":[1,34,53,162],"attacks":[2,35],"allow":[3],"attackers":[4],"to":[5],"determine":[6],"the":[7,16,20,23,30,75,117],"websites":[8],"that":[9,90,116,151],"users":[10,21],"are":[11,111],"linked":[12],"to,":[13],"by":[14],"examining":[15],"encrypted":[17,102],"traffic":[18],"between":[19,70],"and":[22,58,93,99,157],"anonymous":[24,38,101],"network":[25,62],"portals.":[26],"Recent":[27],"research":[28],"demonstrated":[29],"feasibility":[31],"of":[32,138],"website":[33,52,71,161],"on":[36,66,74,134],"Tor":[37],"networks":[39],"with":[40,141],"only":[41,106,142],"a":[42,49,79,135],"few":[43],"samples.":[44],"Thus,":[45],"this":[46],"paper":[47],"proposes":[48],"novel":[50],"small-sample":[51],"attack":[54,87,163],"method":[55],"for":[56,160],"SSH":[57,98],"Shadowsocks":[59,100],"single-agent":[60],"anonymity":[61],"systems,":[63],"which":[64],"focuses":[65],"analyzing":[67],"homology":[68],"relationships":[69],"fingerprinting.":[72],"Based":[73],"latter,":[76],"we":[77],"design":[78],"Convolutional":[80],"Neural":[81],"Network-Bidirectional":[82],"Long":[83],"Short-Term":[84],"Memory":[85],"(CNN-BiLSTM)":[86],"classification":[88],"model":[89,119,159],"achieves":[91],"94.8%":[92],"98.1%":[94],"accuracy":[95,131],"in":[96],"classifying":[97],"traffic,":[103],"respectively,":[104],"when":[105,132],"20":[107],"samples":[108,144],"per":[109,145],"site":[110],"available.":[112],"We":[113],"also":[114],"highlight":[115],"CNN-BiLSTM":[118,152],"has":[120],"significantly":[121],"better":[122],"migration":[123],"capabilities":[124],"than":[125],"traditional":[126],"methods,":[127],"achieving":[128],"over":[129],"90%":[130],"applied":[133],"new":[136],"set":[137],"monitored":[139],"sites":[140],"five":[143],"site.":[146],"Overall,":[147],"our":[148],"experiments":[149],"demonstrate":[150],"is":[153],"an":[154],"efficient,":[155],"flexible,":[156],"robust":[158],"classification.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
