{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:24:20Z","timestamp":1730269460078,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1109\/ipccc59175.2023.10253846","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T13:44:32Z","timestamp":1697636672000},"page":"297-303","source":"Crossref","is-referenced-by-count":0,"title":["AEWF: Autoencoder-based Website Fingerprinting in Data-limited Scenarios"],"prefix":"10.1109","author":[{"given":"Jianjun","family":"Lin","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Bo","family":"Sun","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC),Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA465464","volume-title":"Tor: The secondgeneration onion router","author":"Dingledine","year":"2004"},{"volume-title":"Tor metrics","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093615"},{"article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"Proceedings of 23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref10","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"25th {USENIX| Security Symposium ({USENIX} Security 16)","author":"Hayes"},{"key":"ref11","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","volume-title":"Proceedings of the Asia-Pacific Advanced Network","volume":"42","author":"Abe"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"ref13","article-title":"p-fp: Extraction, classification, and predication of website fingerprints","volume-title":"Proc. of PETS","volume":"19","author":"Oh"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314785"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.23915\/distill.00003","article-title":"Deconvolution and checkerboard artifacts","author":"Odena","year":"2016","journal-title":"Distill"},{"volume-title":"Kerastuner","year":"2019","author":"O\u2019Malley","key":"ref19"}],"event":{"name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","start":{"date-parts":[[2023,11,17]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2023,11,19]]}},"container-title":["2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10253817\/10253818\/10253846.pdf?arnumber=10253846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:01:18Z","timestamp":1710374478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10253846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ipccc59175.2023.10253846","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]}}}