{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:48Z","timestamp":1775815488337,"version":"3.50.1"},"reference-count":73,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100005153","name":"China National Funds for Distinguished Young Scientists","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005153","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179464","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1005-1022","source":"Crossref","is-referenced-by-count":55,"title":["Robust Multi-tab Website Fingerprinting Attacks in the Wild"],"prefix":"10.1109","author":[{"given":"Xinhao","family":"Deng","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Qilei","family":"Yin","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory,Beijing,China"}]},{"given":"Zhuotao","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Xiyuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"key":"ref3","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"23rd USENIX Security Symposium","author":"Wang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref5","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"25th USENIX Security Symposium","author":"Hayes"},{"key":"ref6","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","volume-title":"Proceedings of the Asia-Pacific Advanced Network","volume":"42","author":"Abe"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274697"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378789"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329802"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3104869"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485891"},{"key":"ref16","article-title":"Wtf-pad: toward an efficient website fingerprinting defense for tor","author":"Ju\u00e1rez","year":"2015","journal-title":"CoRR, abs\/1512.00524"},{"key":"ref17","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","volume-title":"29th USENIX Security Symposium","author":"Gong"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref20","article-title":"Defeating dnn-based traffic analysis systems in real-time with blind adversarial perturbations","volume-title":"30th USENIX Security Symposium","author":"Nasr"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"issue":"Aug","key":"ref24","first-page":"975","article-title":"Probability estimates for multi-class classification by pairwise coupling","volume":"5","author":"Wu","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA440081"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2007070101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01428"},{"key":"ref32","article-title":"Transformer in transformer","author":"Han","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_17"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_39"},{"key":"ref37","article-title":"Wfdefproxy: Modularly implementing and empirically evaluating website fingerprinting defenses","author":"Gong","year":"2021"},{"key":"ref38","first-page":"519","article-title":"Auc: a statistically consistent and more discriminating measure than accuracy","volume":"3","author":"Ling","year":"2003","journal-title":"Ijcai"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080834"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"issue":"2","key":"ref41","first-page":"58","article-title":"The problem of concept drift: definitions and related work","volume":"106","author":"Tsymbal","year":"2004","journal-title":"Computer Science Department, Trinity College Dublin"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.122"},{"key":"ref43","article-title":"Exploring concept representations for concept drift detection","volume-title":"SEMANTiCS Workshops","author":"Becher"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_53"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3119334"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2581161"},{"key":"ref47","article-title":"Attentionxml: Label tree-based attention-aware deep model for high-performance extreme multi-label text classification","author":"You","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3437801.3441578"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-industry.15"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219593"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0043"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"ref56","first-page":"1375","article-title":"Walkie-talkie: An efficient defense against passive website fingerprinting attacks","volume-title":"26th USENIX Security Symposium","author":"Wang"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2015.7230964"},{"issue":"2","key":"ref59","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra","year":"2012","journal-title":"Journal of machine learning research"},{"key":"ref60","article-title":"Selenium: a browser automation framework and ecosystem","year":"2021"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref62","article-title":"Tor metrics","year":"2021"},{"key":"ref63","article-title":"Support tech for freedom and human rights","year":"2019"},{"key":"ref64","article-title":"Release of tor 0.4.5.6","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10769"},{"key":"ref66","first-page":"1","article-title":"Deep correlation structure preserved label space embedding for multi-label classification","volume-title":"Asian Conference on Machine Learning","author":"Wang"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013304"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6271"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00082"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44851-9_28"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICBME51989.2020.9319440"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_10"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00015"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179464.pdf?arnumber=10179464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:12:05Z","timestamp":1721452325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179464","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}