{"id":"https://openalex.org/W2592682377","doi":"https://doi.org/10.1515/popets-2017-0046","title":"Bayes, not Na\u00efve: Security Bounds on Website Fingerprinting Defenses","display_name":"Bayes, not Na\u00efve: Security Bounds on Website Fingerprinting Defenses","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2592682377","doi":"https://doi.org/10.1515/popets-2017-0046","mag":"2592682377"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2017-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0046","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p215.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p215.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Giovanni Cherubin","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Giovanni Cherubin","raw_affiliation_strings":["Royal Holloway University of London , United Kingdom of Great Britain and Northern Ireland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Royal Holloway University of London , United Kingdom of Great Britain and Northern Ireland","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":1.4564,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.86310411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2017","issue":"4","first_page":"215","last_page":"231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.49900001287460327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.49900001287460327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.05590000003576279,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.048900000751018524,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6704999804496765},{"id":"https://openalex.org/keywords/generality","display_name":"Generality","score":0.6225000023841858},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5598999857902527},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5059000253677368},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4325999915599823},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.3822999894618988},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.37869998812675476},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.37059998512268066}],"concepts":[{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6704999804496765},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6488999724388123},{"id":"https://openalex.org/C2780767217","wikidata":"https://www.wikidata.org/wiki/Q5532421","display_name":"Generality","level":2,"score":0.6225000023841858},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5598999857902527},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5059000253677368},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44609999656677246},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4325999915599823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3847000002861023},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3831999897956848},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3822999894618988},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.37869998812675476},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.37059998512268066},{"id":"https://openalex.org/C176248197","wikidata":"https://www.wikidata.org/wiki/Q458526","display_name":"Probably approximately correct learning","level":4,"score":0.35260000824928284},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C207201462","wikidata":"https://www.wikidata.org/wiki/Q182505","display_name":"Bayes' theorem","level":3,"score":0.3019999861717224},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2881999909877777},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.28690001368522644},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2565000057220459}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1515/popets-2017-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0046","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p215.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1702.07707","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1702.07707","pdf_url":"https://arxiv.org/pdf/1702.07707","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:b05e98d4fb2b4b0ba483137de65ec4a4","is_oa":false,"landing_page_url":"https://doaj.org/article/b05e98d4fb2b4b0ba483137de65ec4a4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 4, Pp 215-231 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2017-0046","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0046","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p215.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2592682377.pdf","grobid_xml":"https://content.openalex.org/works/W2592682377.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W252937432","https://openalex.org/W1450140837","https://openalex.org/W1567366855","https://openalex.org/W1569777704","https://openalex.org/W1608222975","https://openalex.org/W1993568446","https://openalex.org/W2012210084","https://openalex.org/W2021949962","https://openalex.org/W2027177092","https://openalex.org/W2059507684","https://openalex.org/W2070410525","https://openalex.org/W2108217512","https://openalex.org/W2120702739","https://openalex.org/W2122111042","https://openalex.org/W2123064848","https://openalex.org/W2135088779","https://openalex.org/W2135579486","https://openalex.org/W2149280729","https://openalex.org/W2167136065","https://openalex.org/W2170085959","https://openalex.org/W2272516773","https://openalex.org/W2396066572","https://openalex.org/W2485000773","https://openalex.org/W2604754095","https://openalex.org/W2737623669"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Website":[1],"Fingerprinting":[2],"(WF)":[3],"attacks":[4,103],"raise":[5],"major":[6],"concerns":[7],"about":[8],"users\u2019":[9],"privacy.":[10],"They":[11],"employ":[12],"Machine":[13],"Learning":[14],"(ML)":[15],"techniques":[16],"to":[17,23,56,80,104,164,180,198],"allow":[18],"a":[19,30,77,93,129,133,159],"local":[20],"passive":[21],"adversary":[22],"uncover":[24],"the":[25,49,89,113,153,165,174,193],"Web":[26],"browsing":[27],"behavior":[28],"of":[29,155,176,187],"user,":[31],"even":[32],"if":[33],"she":[34],"browses":[35],"through":[36],"an":[37,105],"encrypted":[38],"tunnel":[39],"(e.g.":[40],"Tor,":[41],"VPN).":[42],"Numerous":[43],"defenses":[44],"have":[45,57],"been":[46],"proposed":[47],"in":[48,125,158],"past;":[50],"however,":[51],"it":[52,150,171],"is":[53,64,128],"typically":[54],"difficult":[55],"formal":[58],"guarantees":[59],"on":[60,92],"their":[61],"security,":[62],"which":[63],"most":[65],"often":[66],"evaluated":[67],"empirically":[68],"against":[69],"state-of-the-art":[70,166],"attacks.":[71,205],"In":[72],"this":[73,188],"paper,":[74],"we":[75,110],"present":[76],"practical":[78],"method":[79,194],"derive":[81],"security":[82,154,200],"bounds":[83,90,201],"for":[84,132,136,202],"any":[85,137],"WF":[86,102,134,156,178],"defense,":[87],"where":[88,109],"depend":[91],"chosen":[94],"feature":[95,167,183],"set.":[96],"This":[97],"result":[98],"derives":[99],"from":[100],"reducing":[101],"ML":[106],"classification":[107,138],"task,":[108],"can":[111,122],"determine":[112],"smallest":[114],"achievable":[115],"error":[116,121],"(the":[117],"Bayes":[118],"error).":[119],"Such":[120],"be":[123,196],"estimated":[124],"practice,":[126],"and":[127,169],"lower":[130],"bound":[131],"adversary,":[135],"algorithm":[139],"he":[140],"may":[141],"use.":[142],"Our":[143],"work":[144],"has":[145],"two":[146],"main":[147],"consequences:":[148],"i)":[149],"allows":[151],"determining":[152],"defenses,":[157],"black-box":[160],"manner,":[161],"with":[162],"respect":[163],"set":[168],"ii)":[170],"favors":[172],"shifting":[173],"focus":[175],"future":[177],"research":[179],"identifying":[181],"optimal":[182],"sets.":[184],"The":[185],"generality":[186],"approach":[189],"further":[190],"suggests":[191],"that":[192],"could":[195],"used":[197],"define":[199],"other":[203],"ML-based":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2017-03-16T00:00:00"}
