{"id":"https://openalex.org/W4414988469","doi":"https://doi.org/10.48550/arxiv.2506.20082","title":"Attack Smarter: Attention-Driven Fine-Grained Webpage Fingerprinting Attacks","display_name":"Attack Smarter: Attention-Driven Fine-Grained Webpage Fingerprinting Attacks","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4414988469","doi":"https://doi.org/10.48550/arxiv.2506.20082"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2506.20082","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.20082","pdf_url":"https://arxiv.org/pdf/2506.20082","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2506.20082","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034831625","display_name":"Yali Yuan","orcid":"https://orcid.org/0000-0002-9258-9929"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuan, Yali","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106306634","display_name":"W. Zou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zou, Weiyi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng, Guang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034831625"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.6563000082969666},{"id":"https://openalex.org/keywords/salient","display_name":"Salient","score":0.5967000126838684},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.41440001130104065},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.3422999978065491},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.3082999885082245},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.29499998688697815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8043000102043152},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.6563000082969666},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.5967000126838684},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4578000009059906},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.41440001130104065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39089998602867126},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.3422999978065491},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.29499998688697815},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2833999991416931},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.2648000121116638},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.259799987077713}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2506.20082","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.20082","pdf_url":"https://arxiv.org/pdf/2506.20082","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2506.20082","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2506.20082","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2506.20082","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.20082","pdf_url":"https://arxiv.org/pdf/2506.20082","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Website":[0],"Fingerprinting":[1,66],"(WF)":[2],"attacks":[3],"aim":[4],"to":[5,27,38,43,72,118,161,193,203,213],"infer":[6],"which":[7,107],"websites":[8],"a":[9,108],"user":[10,19],"is":[11],"visiting":[12],"by":[13,75],"analyzing":[14],"traffic":[15,98,120,166,188],"patterns,":[16],"thereby":[17,133],"compromising":[18],"anonymity.":[20],"Although":[21],"this":[22],"technique":[23],"has":[24],"been":[25],"demonstrated":[26],"be":[28],"effective":[29],"in":[30,56,93,97,106,127],"controlled":[31],"experimental":[32],"environments,":[33],"it":[34],"remains":[35],"largely":[36],"limited":[37],"small-scale":[39],"scenarios,":[40,105],"typically":[41],"restricted":[42],"recognizing":[44],"website":[45],"homepages.":[46],"In":[47],"practical":[48],"settings,":[49],"however,":[50],"users":[51],"frequently":[52],"access":[53],"multiple":[54,112],"subpages":[55,77],"rapid":[57],"succession,":[58],"often":[59,87],"before":[60],"previous":[61],"content":[62],"fully":[63],"loads.":[64],"WebPage":[65],"(WPF)":[67],"generalizes":[68],"the":[69,79,131,135,154,165,184,195,200,205,210,228],"WF":[70],"framework":[71],"large-scale":[73],"environments":[74],"modeling":[76],"of":[78,114,137,164,199,217,237],"same":[80],"site":[81],"as":[82],"distinct":[83],"classes.":[84],"These":[85],"pages":[86],"share":[88],"similar":[89,123],"page":[90],"elements,":[91],"resulting":[92],"lower":[94],"inter-class":[95],"variance":[96],"features.":[99],"Furthermore,":[100],"we":[101,143,157,208],"consider":[102],"multi-tab":[103,206],"browsing":[104],"single":[109],"trace":[110],"encompasses":[111],"categories":[113],"webpages.":[115],"This":[116],"leads":[117],"overlapping":[119],"segments,":[121],"and":[122,174,186,189],"features":[124,181],"may":[125],"appear":[126],"different":[128,221,238],"positions":[129],"within":[130],"traffic,":[132],"increasing":[134],"difficulty":[136],"classification.":[138],"To":[139],"address":[140],"these":[141],"challenges,":[142],"propose":[144],"an":[145],"attention-driven":[146],"fine-grained":[147],"WPF":[148],"attack,":[149],"named":[150],"ADWPF.":[151],"Specifically,":[152],"during":[153],"training":[155],"phase,":[156],"apply":[158],"targeted":[159],"augmentation":[160],"salient":[162],"regions":[163],"based":[167],"on":[168],"attention":[169,172,175,212],"maps,":[170],"including":[171],"cropping":[173],"masking.":[176],"ADWPF":[177],"then":[178],"extracts":[179],"low-dimensional":[180],"from":[182],"both":[183],"original":[185],"augmented":[187],"applies":[190],"self-attention":[191],"modules":[192],"capture":[194],"global":[196],"contextual":[197],"patterns":[198],"trace.":[201],"Finally,":[202],"handle":[204],"scenario,":[207],"employ":[209],"residual":[211],"generate":[214],"class-specific":[215],"representations":[216],"webpages":[218],"occurring":[219],"at":[220],"temporal":[222],"positions.":[223],"Extensive":[224],"experiments":[225],"demonstrate":[226],"that":[227],"proposed":[229],"method":[230],"consistently":[231],"surpasses":[232],"state-of-the-art":[233],"baselines":[234],"across":[235],"datasets":[236],"scales.":[239]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-09T00:00:00"}
