{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:49:33Z","timestamp":1725954573794},"reference-count":157,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Key Research and Development Plan Project","award":["2021YFB3101400"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276017","U1636211","61672081"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005311","name":"Key Laboratory of Power Grid Automation of China Southern Power Grid Company Ltd.","doi-asserted-by":"publisher","award":["GDDKY2021KF03"],"id":[{"id":"10.13039\/501100005311","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011347","name":"State Key Laboratory of Software Development Environment","doi-asserted-by":"publisher","award":["SKLSDE-2021ZX-18"],"id":[{"id":"10.13039\/501100011347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3253559","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T18:44:00Z","timestamp":1678128240000},"page":"26033-26047","source":"Crossref","is-referenced-by-count":2,"title":["A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8251-7705","authenticated-orcid":false,"given":"Peidong","family":"Liu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Longtao","family":"He","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9603-9713","authenticated-orcid":false,"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref2","first-page":"2705","article-title":"Defeating DNN-based traffic analysis systems in real-time with blind adversarial perturbations","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Nasr"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/9781139061773"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.aiopen.2021.08.002","article-title":"Pre-trained models: Past, present and future","volume":"2","author":"Han","year":"2021","journal-title":"AI Open"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3090866"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3448250"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","article-title":"Learned in translation: Contextualized word vectors","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"McCann","year":"2017"},{"key":"ref11","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics, Hum. Lang. Technol.","volume":"1","author":"Devlin"},{"key":"ref12","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Brown"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052639"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.neucom.2022.04.078","article-title":"Meta-learning approaches for learning-to-learn in deep learning: A survey","volume":"494","author":"Tian","year":"2022","journal-title":"Neurocomputing"},{"key":"ref16","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"Proc. 37th Int. Conf. Mach. Learn. (PMLR)","volume":"119","author":"Chen"},{"key":"ref17","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"issue":"4","key":"ref18","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/3512715","article-title":"Toward a broad AI","volume":"65","author":"Hochreiter","year":"2022","journal-title":"Commun. ACM"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref20","first-page":"1","article-title":"An image is worth 16\u00d716words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Dosovitskiy"},{"key":"ref21","article-title":"Generative adversarial nets","volume-title":"Advances in Neural Information Processing Systems","volume":"27","author":"Goodfellow","year":"2014"},{"key":"ref22","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921180"},{"key":"ref24","article-title":"Website fingerprinting: Attacks and defenses","author":"Wang","year":"2015"},{"key":"ref25","first-page":"15","article-title":"Fingerprinting attack on Tor anonymity using deep learning","volume-title":"Proc. Asia\u2013Pacific Adv. Netw.","author":"Abe"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780755"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0043"},{"key":"ref30","first-page":"639","article-title":"Robust website fingerprinting through the cache occupancy channel","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Shusterman"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219717"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314785"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.108770","article-title":"Dissecting traffic fingerprinting CNNs with filter activations","volume":"206","author":"Dahanayaka","year":"2022","journal-title":"Comput. Netw."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA51271.2020.00020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IST50524.2020.9345817"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0029"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424290"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447835"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521272"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5399816"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533543"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IRI51335.2021.00044"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631528"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2840289"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3117145"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6070451"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108298","article-title":"Few-shot website fingerprinting attack","volume":"198","author":"Chen","year":"2021","journal-title":"Comput. Netw."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3306098"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158086"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3186743"},{"issue":"15","key":"ref55","doi-asserted-by":"crossref","first-page":"7937","DOI":"10.3390\/app12157937","article-title":"SRP: A microscopic look at the composition mechanism of website fingerprinting","volume":"12","author":"Chen","year":"2022","journal-title":"Appl. Sci."},{"key":"ref56","first-page":"753","article-title":"Online website fingerprinting: Evaluating website fingerprinting attacks on Tor in the real world","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Cherubin"},{"key":"ref57","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108739","article-title":"Few-shot website fingerprinting attack with meta-bias learning","volume":"130","author":"Chen","year":"2022","journal-title":"Pattern Recognit."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004359"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866397"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref68","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Wang"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036866"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2014.6846826"},{"key":"ref71","first-page":"287","article-title":"Circuit fingerprinting attacks: Passive deanonymization of Tor hidden services","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Kwon"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.19"},{"key":"ref73","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Hayes"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.019"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-018-9466-z"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139564"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989054"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_4"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762825"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00145"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358650"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1747-7_71"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357993"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8850472"},{"key":"ref88","first-page":"199","article-title":"Scaling website fingerprinting","volume-title":"Proc. IFIP Netw. Conf., Netw.","author":"Ghi\u00ebtte"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488676"},{"key":"ref90","first-page":"1","article-title":"Poster: A pilot study on real-time fingerprinting for Tor onion services","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Kim"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485347"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761167"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450008"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00101"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/APCC49754.2021.9609848"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92708-0_1"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3265300"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/DSC53577.2021.00021"},{"key":"ref100","article-title":"Traffic analysis of SSL encrypted web browsing","author":"Cheng","year":"1998"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_13"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/cscwd.2015.7230964"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274697"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3104869"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329802"},{"key":"ref108","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Gong"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00058"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485891"},{"key":"ref111","article-title":"End-to-end multi-tab website fingerprinting attack: A detection perspective","author":"Chen","year":"2022","journal-title":"arXiv:2203.06376"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.comcom.2019.09.008","article-title":"AdaWFPA: Adaptive online website fingerprinting attack for Tor anonymous network: A stream-wise paradigm","volume":"148","author":"Attarian","year":"2019","journal-title":"Comput. Commun."},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC48546.2019.8985162"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS53392.2021.9754529"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00015"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484790"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322307"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219593"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3074295"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833722"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS55155.2022.9846237"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"key":"ref125","first-page":"1","article-title":"Traffic morphing: An efficient defense against statistical traffic analysis","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Wright"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665950"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref129","first-page":"1375","article-title":"Walkie-talkie: An efficient defense against passive website fingerprinting attacks","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Wang"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0023"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268960"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00174"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00175"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.4108\/eai.29-1-2019.161977"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.12.005"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363249"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155465"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0019"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907240"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278493"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00031"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00111"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00038"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-021-00244-8"},{"key":"ref147","article-title":"A real-time defense against website fingerprinting attacks","author":"Shan","year":"2021","journal-title":"arXiv:2102.04291"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511500"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0049"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7330465"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3146236"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96791-8_19"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796685"},{"key":"ref154","first-page":"771","article-title":"QCSD: A QUIC client-side website-fingerprinting defence framework","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Smith"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10061392.pdf?arnumber=10061392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T10:43:10Z","timestamp":1707820990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10061392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":157,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3253559","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}