{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:49:50Z","timestamp":1764960590934,"version":"3.46.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20275"],"award-info":[{"award-number":["U23A20275"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project Program of Guangxi Key Laboratory of Digital Infrastructure","award":["GXDIOP2024001"],"award-info":[{"award-number":["GXDIOP2024001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tnsm.2025.3602964","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:21:58Z","timestamp":1756236118000},"page":"6066-6082","source":"Crossref","is-referenced-by-count":0,"title":["RLpatch: A Robust Low-Overhead Website Fingerprinting Defense Method Based on Reinforcement Learning Within Sensitive Regions"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2817-9738","authenticated-orcid":false,"given":"Shuangwu","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8628-4601","authenticated-orcid":false,"given":"Siyang","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"given":"Yuxing","family":"Wei","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Digital Infrastructure, Guangxi Zhuang Autonomous Region Information Center, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4026-8338","authenticated-orcid":false,"given":"Dong","family":"Jin","sequence":"additional","affiliation":[{"name":"Hefei Comprehensive National Science Center, Institute of Artificial Intelligence, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7489-2839","authenticated-orcid":false,"given":"Xiaobin","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"given":"Xiaofeng","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7329-4738","authenticated-orcid":false,"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.2478\/popets-2020-0020"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SP61157.2025.00154"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-031-28486-1_2"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TNSM.2023.3318508"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2024.3520014"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref7","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Gong"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP.2012.28"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIFS.2025.3565994"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIFS.2024.3436818"},{"key":"ref11","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Wang"},{"key":"ref12","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Hayes"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.14722\/ndss.2016.23477"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1655008.1655013"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.14722\/ndss.2018.23105"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3243734.3243768"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.2478\/popets-2019-0070"},{"key":"ref18","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Shen"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TNSM.2025.3538895"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/tdsc.2025.3563389"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3696410.3714811"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2665943.2665949"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2660267.2660362"},{"key":"ref24","first-page":"1375","article-title":"Walkie-talkie: An efficient defense against passive website fingerprinting attacks","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Wang"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SP54263.2024.00247"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"ref27","first-page":"2705","article-title":"Defeating DNN-based traffic analysis systems in real-time with blind adversarial perturbations","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Nasr"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3474369.3486875"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TIFS.2021.3074295"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TIFS.2022.3186743"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TIFS.2023.3304528"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TNSM.2024.3360082"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ISCC50000.2020.9219593"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/s11227-018-2268-y"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/CVPR.2016.319"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/CVPR.2018.00957"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-319-24574-4_28"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/CBASE60015.2023.10439107"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TIFS.2023.3318966"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11278396\/11142367.pdf?arnumber=11142367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:38:17Z","timestamp":1764959897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11142367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":39,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3602964","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}