{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:21:50Z","timestamp":1775326910073,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1423163 and CNS-1722743"],"award-info":[{"award-number":["CNS-1423163 and CNS-1722743"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243768","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1928-1943","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":491,"title":["Deep Fingerprinting"],"prefix":"10.1145","author":[{"given":"Payap","family":"Sirinam","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Mohsen","family":"Imani","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Marc","family":"Juarez","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"K. Abe and S. Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning in the Asia Pacific Advanced Network (APAN).  K. Abe and S. Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning in the Asia Pacific Advanced Network (APAN)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_2_3_1","volume-title":"Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. \"https:\/\/arxiv.org\/pdf\/1802.10215.pdf\". (2018). (accessed","author":"Bhat Sanjit","year":"2018"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"N. Carlini and D. Wagner. 2017. Towards evaluating the robustness of neural networks 2017 IEEE Symposium on Security and Privacy (SP). 39--57.  N. Carlini and D. Wagner. 2017. Towards evaluating the robustness of neural networks 2017 IEEE Symposium on Security and Privacy (SP). 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_8_1","volume-title":"Traffic analysis of SSL encrypted web browsing. Project paper","author":"Cheng Heyning"},{"key":"e_1_3_2_2_9_1","unstructured":"Djork-Arn\u00e9 Clevert Thomas Unterthiner and Sepp Hochreiter. 2015. Fast and accurate deep networks learning by exponential linear units (ELUs) in the International Conference on Computer Vision (ICCV15)).  Djork-Arn\u00e9 Clevert Thomas Unterthiner and Sepp Hochreiter. 2015. Fast and accurate deep networks learning by exponential linear units (ELUs) in the International Conference on Computer Vision (ICCV15))."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_2_11_1","volume-title":"Generative adversarial nets. Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian"},{"key":"e_1_3_2_2_12_1","volume-title":"k-fingerprinting: A robust scalable website fingerprinting technique USENIX Security Symposium","author":"Hayes Jamie"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_2_15_1","volume-title":"Fingerprinting websites using traffic analysis. Privacy Enhancing Technologies (PETs)","author":"Hintz Andrew"},{"key":"e_1_3_2_2_16_1","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift International Conference on Machine Learning. 448--456.   Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift International Conference on Machine Learning. 448--456."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_18_1","volume-title":"Toward an efficient website fingerprinting defense European Symposium on Research in Computer Security (ESORICS)","author":"Juarez Marc"},{"key":"e_1_3_2_2_19_1","unstructured":"Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. (2015).  Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. (2015)."},{"key":"e_1_3_2_2_20_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Y. Lecun L. Bottou Y. Bengio and P. Haffner. 1998. Gradient-based learning applied to document recognition. Vol. 86 (1998) 2278--2324. Issue 11.  Y. Lecun L. Bottou Y. Bengio and P. Haffner. 1998. Gradient-based learning applied to document recognition. Vol. 86 (1998) 2278--2324. Issue 11.","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_23_1","volume-title":"Systematic evaluation of CNN advances on the ImageNet. CoRR","author":"Mishkin Dmytro","year":"2016"},{"key":"e_1_3_2_2_24_1","volume-title":"textitp-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. \"https:\/\/arxiv.org\/abs\/1711.03656.pdf\". (2018). (accessed","author":"Oh Se Eun","year":"2018"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_2_27_1","volume-title":"A critique of website traffic fingerprinting attacks. Tor Project Blog. https:\/\/blog.torproject.org\/blog\/critique-website-traffic-fingerprinting-attacks. (2013). (accessed","author":"Perry Mike","year":"2015"},{"key":"e_1_3_2_2_28_1","volume-title":"Tor Protocol Specification Proposal. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/254-padding-negotiation.txt. (2015). (accessed","author":"Perry Mike","year":"2017"},{"key":"e_1_3_2_2_29_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2018"},{"key":"e_1_3_2_2_30_1","volume-title":"Beauty and the Burst: Remote identification of encrypted video streams USENIX Security Symposium","author":"Schuster Roei"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"V. Shmatikov and M. Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses European Symposium on Research in Computer Security (ESORIC). Springer 18--33.   V. Shmatikov and M. Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses European Symposium on Research in Computer Security (ESORIC). Springer 18--33.","DOI":"10.1007\/11863908_2"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_2_33_1","volume-title":"Statistical identification of encrypted web browsing traffic IEEE Symposium on Security and Privacy (S&P)","author":"Sun Q"},{"key":"e_1_3_2_2_34_1","volume-title":"Going deeper with convolutions. (June","author":"Szegedy Christian","year":"2015"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953039"},{"key":"e_1_3_2_2_36_1","volume-title":"Effective attacks and provable defenses for website fingerprinting USENIX Security Symposium","author":"Wang Tao"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Tao Wang and Ian Goldberg. 2016. On realistically attacking Tor with website fingerprinting Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open 21--36.  Tao Wang and Ian Goldberg. 2016. On realistically attacking Tor with website fingerprinting Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open 21--36.","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_2_39_1","volume-title":"Walkie-talkie: An efficient defense against passive website fingerprinting attacks USENIX Security Symposium","author":"Wang Tao","year":"2017"},{"key":"e_1_3_2_2_40_1","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems -","volume":"2","author":"Yosinski Jason","year":"2014"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243768","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243768"}},"subtitle":["Undermining Website Fingerprinting Defenses with Deep Learning"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":40,"alternative-id":["10.1145\/3243734.3243768","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243768","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}