{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:13:40Z","timestamp":1753884820992,"version":"3.41.2"},"reference-count":28,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2025,5]]},"abstract":"<jats:p> Website fingerprinting (WF) attacks leverage deep learning to analyze encrypted traffic and identify the websites accessed by Tor users, posing a critical threat to online anonymity. However, existing detection models often suffer from low accuracy and weak robustness in open-world scenarios. To address these issues, we propose a novel spatiotemporal WF framework integrating a lightweight attention mechanism and parallel multi-size feature extraction with dilated convolution. This design significantly enhances detection performance while maintaining high efficiency. Experimental results show that our approach outperforms CNN and LSTM models by 3\u20135% in accuracy and surpasses the DF model by about 1%, while achieving a 50% increase in efficiency. Furthermore, it demonstrates robust performance as the number of website categories grows and remains effective against defenses such as WTF-PAD and Walkie-Talkie. Notably, our framework also mitigates the impact of concept drift, exhibiting minimal performance degradation when traffic distributions evolve over time. These findings not only underscore the unique potential of our model to advance WF attacks, but also highlight the urgent need for stronger privacy-preserving measures to protect Tor users in real-world environments. <\/jats:p>","DOI":"10.1142\/s0218001425590050","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T09:14:35Z","timestamp":1741684475000},"source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Website Fingerprinting Attacks Based on Attention Mechanism and Spatial-Temporal Features"],"prefix":"10.1142","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9590-4014","authenticated-orcid":false,"given":"Chunqian","family":"Guo","sequence":"first","affiliation":[{"name":"Zhengzhou University, Zhengzhou 450001, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-7041","authenticated-orcid":false,"given":"Gang","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhengzhou University, Zhengzhou 450001, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3863-1478","authenticated-orcid":false,"given":"Deliang","family":"Jin","sequence":"additional","affiliation":[{"name":"Zhengzhou University, Zhengzhou 450001, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5497-9018","authenticated-orcid":false,"given":"Zhihan","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhengzhou University, Zhengzhou 450001, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2025,5,7]]},"reference":[{"key":"S0218001425590050BIB001","first-page":"15","volume-title":"Proc. Asia-Pacific Adv. Netw.","volume":"42","author":"Abe K.","year":"2016"},{"key":"S0218001425590050BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103582"},{"key":"S0218001425590050BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09750-3"},{"key":"S0218001425590050BIB005","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"S0218001425590050BIB006","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"S0218001425590050BIB007","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001422520206"},{"key":"S0218001425590050BIB009","first-page":"328","volume-title":"Proc. 2019 ACM Asia Conf. Computer and Communications Security","author":"Cui W.","year":"2019"},{"key":"S0218001425590050BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179464"},{"key":"S0218001425590050BIB011","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"S0218001425590050BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"S0218001425590050BIB013","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001424520116"},{"key":"S0218001425590050BIB014","first-page":"717","volume-title":"29th USENIX Security Symp. (USENIX Security 20)","author":"Gong J.","year":"2020"},{"key":"S0218001425590050BIB015","first-page":"1187","volume-title":"25th USENIX Security Symp. (USENIX Security 16)","author":"Hayes J.","year":"2016"},{"key":"S0218001425590050BIB016","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"S0218001425590050BIB017","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623107"},{"key":"S0218001425590050BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"S0218001425590050BIB019","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-28763-1"},{"key":"S0218001425590050BIB021","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001424550073"},{"key":"S0218001425590050BIB022","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"S0218001425590050BIB023","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"S0218001425590050BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"S0218001425590050BIB027","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"S0218001425590050BIB028","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"S0218001425590050BIB029","doi-asserted-by":"publisher","DOI":"10.3390\/app112411820"},{"key":"S0218001425590050BIB030","first-page":"1375","volume-title":"26th USENIX Security Symp. (USENIX Security 17)","author":"Wang T.","year":"2017"},{"key":"S0218001425590050BIB031","first-page":"143","volume-title":"23rd USENIX Security Symp. (USENIX Security 14)","author":"Wang T.","year":"2014"},{"key":"S0218001425590050BIB032","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"S0218001425590050BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3104869"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001425590050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T02:31:24Z","timestamp":1747276284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001425590050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":28,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10.1142\/S0218001425590050"],"URL":"https:\/\/doi.org\/10.1142\/s0218001425590050","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2025,5]]},"article-number":"2559005"}}