{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:24:23Z","timestamp":1730269463607,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1109\/ipccc59175.2023.10253867","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T17:44:32Z","timestamp":1697651072000},"page":"99-108","source":"Crossref","is-referenced-by-count":1,"title":["TBP: Tree structure Burst-sequence Padding Defense Against Website Fingerprinting"],"prefix":"10.1109","author":[{"given":"Yankun","family":"Wang","sequence":"first","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Jun-Jie","family":"Huang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yongxin","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref3","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","volume-title":"USENIX Security Symposium","author":"Gong"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155465"},{"key":"ref5","article-title":"Towards effective and efficient padding machines for tor","volume":"abs\/2011.13471","author":"Pulls","year":"2020","journal-title":"ArXiv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref7","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"Wang","year":"2014","journal-title":"USENIX Security"},{"key":"ref8","first-page":"1375","article-title":"Walkie-Talkie: An efficient defense against passive website fingerprinting attacks","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833722"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907240"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268960"},{"key":"ref16","article-title":"a critique of website traffic fingerprinting attacks","author":"Perry","year":"2013","journal-title":"Tor Project Blog"},{"journal-title":"Tor Protocol Specification Proposal","article-title":"padding negotiation","year":"2013","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref19","article-title":"k-fingerprinting: a robust scalable website fingerprinting technique","author":"Hayes","year":"2015","journal-title":"Computer Science"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC55026.2022.9894323"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179289"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"volume-title":"Wefde","year":"2019","key":"ref28"}],"event":{"name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","start":{"date-parts":[[2023,11,17]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2023,11,19]]}},"container-title":["2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10253817\/10253818\/10253867.pdf?arnumber=10253867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:35:48Z","timestamp":1709346948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10253867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ipccc59175.2023.10253867","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]}}}