{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:07:28Z","timestamp":1772928448175,"version":"3.50.1"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272181"],"award-info":[{"award-number":["62272181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tr.2024.3355233","type":"journal-article","created":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T18:29:22Z","timestamp":1707503362000},"page":"1516-1528","source":"Crossref","is-referenced-by-count":2,"title":["DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4390-3819","authenticated-orcid":false,"given":"Weizhong","family":"Qiang","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3691-3702","authenticated-orcid":false,"given":"Kunlun","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-3558","authenticated-orcid":false,"given":"Yueming","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"ref3","article-title":"You tossed your cookies but theyre still tracking you; Heres how to hide your browser fingerprint","author":"Rubenking","year":"2024"},{"key":"ref4","article-title":"Mitigating browser fingerprinting in web specifications","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00072"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3373165.3373171"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668043"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"ref16","article-title":"code2seq: Generating sequences from structured representations of code","volume-title":"Proc. 7th Int. Conf. Learn. Representations","author":"Alon","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"ref20","article-title":"esprima","year":"2024"},{"key":"ref21","article-title":"styx","year":"2024"},{"key":"ref22","article-title":"A critical review of recurrent neural networks for sequence learning","author":"Lipton","year":"2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3210-2"},{"key":"ref26","article-title":"Gated graph sequence neural networks","volume-title":"Proc. 4th Int. Conf. Learn. Representations","author":"Li","year":"2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.26.041002.131047"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0271-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29513-4_31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3363574"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref32","article-title":"Openwpm","year":"2024"},{"key":"ref33","article-title":"Detection of browser fingerprinting by static JavaScript code classification","author":"Haanen","year":"2018"},{"key":"ref34","article-title":"Static-JavaScript-fingerprint-classification","year":"2024"},{"key":"ref35","article-title":"Any person... a pamphleteer: Internet anonymity in the age of web 2.0","volume":"85","author":"Mayer","year":"2009"},{"key":"ref36","article-title":"Pixel perfect: Fingerprinting canvas in HTML5","volume-title":"Proc. W2SP","author":"Mowery","year":"2012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23152"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_18"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.33"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.105"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029820"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"ref44","first-page":"679","article-title":"Extension breakdown: Security analysis of browsers extension resources control policies","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Snchez-Rola","year":"2017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268959"},{"key":"ref46","first-page":"2507","article-title":"Fingerprinting in style: Detecting browser extensions via injected style sheets","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Laperdrix","year":"2021"},{"key":"ref47","article-title":"Fingerprinting information in JavaScript implementations","volume-title":"Proc. W2SP","author":"Mowery","year":"2011"},{"key":"ref48","article-title":"Hardware fingerprinting using HTML5","volume-title":"CoRR","volume":"abs\/1503.01408","author":"Nakibly","year":"2015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2016.108"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69811-3_36"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"key":"ref52","article-title":"Canvas api","author":"Docs","year":"2024"},{"key":"ref53","article-title":"Webgl","author":"Docs","year":"2022"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99136-8_26"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0006"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_12"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00005"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487855"},{"key":"ref60","first-page":"2911","article-title":"Khaleesi: Breaker of advertising and tracking request chains","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Iqbal","year":"2022"},{"key":"ref61","article-title":"Machine learning approaches for automatic detection of web fingerprinting","author":"Rizzo","year":"2018"},{"key":"ref62","article-title":"Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection","volume-title":"CoRR","volume":"abs\/2003.04463","author":"Bird","year":"2020"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0004"},{"key":"ref65","article-title":"An iterative technique to identify browser fingerprinting scripts","volume-title":"CoRR","volume":"abs\/2103.00590","author":"Durey","year":"2021"},{"key":"ref66","article-title":"Nowhere to hide: Detecting obfuscated fingerprinting scripts","volume-title":"CoRR","volume":"abs\/2206.13599","author":"Ngan","year":"2022"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330220"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192412"},{"key":"ref69","article-title":"Learning to represent programs with graphs","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Allamanis","year":"2018"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3428301"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2018.2869336"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983985"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/iceccs.2019.00012"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3192419"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10669110\/10431413.pdf?arnumber=10431413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:59:32Z","timestamp":1733878772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10431413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":75,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3355233","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}