{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:56:12Z","timestamp":1776099372278,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1525642, CNS-1553301, and CNS-1564067"],"award-info":[{"award-number":["CNS-1525642, CNS-1553301, and CNS-1564067"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243824","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1962-1976","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":137,"title":["DeepCorr"],"prefix":"10.1145","author":[{"given":"Milad","family":"Nasr","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Alireza","family":"Bahramali","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"265","volume-title":"OSDI","volume":"16","author":"Abadi M.","year":"2016"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_2_3_1","first-page":"317","article-title":"Loopholes for Circumventing the Constitution: Unrestricted Bulk Surveillance on Americans by Collecting Network Traffic Abroad","volume":"21","author":"Arnbak A.","year":"2014","journal-title":"Mich. Telecomm. & Tech. L. Rev."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731866"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0044"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_14"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_2_11_1","unstructured":"The CAIDA UCSD Anonymized Internet Traces 2016 - {2016}. http:\/\/www.caida.org\/data\/passive\/passive_2016_dataset.xml.  The CAIDA UCSD Anonymized Internet Traces 2016 - {2016}. http:\/\/www.caida.org\/data\/passive\/passive_2016_dataset.xml."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_24"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.19"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_3"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754704"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754704"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381973"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"key":"e_1_3_2_2_24_1","first-page":"1187","volume-title":"USENIX Security Symposium","author":"Hayes J.","year":"2016"},{"key":"e_1_3_2_2_25_1","first-page":"112","volume-title":"Proceedings of the 2014 IEEE 18th International Conference on","author":"He G.","year":"2014"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890881"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"e_1_3_2_2_29_1","volume-title":"NDSS","author":"Houmansadr A.","year":"2011"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946866"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_11"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959879"},{"key":"e_1_3_2_2_33_1","volume-title":"RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. In Network and Distributed System Security Symposium (NDSS)","author":"Houmansadr A.","year":"2009"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2272740"},{"key":"e_1_3_2_2_35_1","volume-title":"NDSS","author":"Houmansadr A.","year":"2013"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23261"},{"key":"e_1_3_2_2_37_1","volume-title":"October","author":"Jelic F.","year":"2016"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0021"},{"key":"e_1_3_2_2_43_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma D. P.","year":"2014"},{"key":"e_1_3_2_2_44_1","volume-title":"Multi-Flow Attacks Against Network Flow Watermarking Schemes. In USENIX Security Symposium","author":"Kiyavash N.","year":"2008"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888898"},{"key":"e_1_3_2_2_48_1","unstructured":"meek Pluggable Transport. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek.  meek Pluggable Transport. https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/meek."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046732"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134074"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23322"},{"key":"e_1_3_2_2_55_1","volume-title":"https:\/\/lists.torproject.org\/pipermail\/tor-project\/2016-November\/000776.html","author":"Turning","year":"2016"},{"key":"e_1_3_2_2_56_1","unstructured":"A Simple Obfuscating Proxy. https:\/\/www.torproject.org\/projects\/obfsproxy.html.en.  A Simple Obfuscating Proxy. https:\/\/www.torproject.org\/projects\/obfsproxy.html.en."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"e_1_3_2_2_60_1","volume-title":"Feb.","author":"Perry M.","year":"2017"},{"key":"e_1_3_2_2_61_1","unstructured":"Tor: Pluggable Transports. https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en.  Tor: Pluggable Transports. https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.80"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433012"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0050"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163275"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884246"},{"key":"e_1_3_2_2_70_1","volume-title":"NDSS","author":"Starov O.","year":"2016"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.34"},{"key":"e_1_3_2_2_72_1","first-page":"271","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Sun Y.","year":"2015"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0040"},{"key":"e_1_3_2_2_74_1","unstructured":"Tor Metrics. https:\/\/metrics.torproject.org.  Tor Metrics. https:\/\/metrics.torproject.org."},{"key":"e_1_3_2_2_75_1","first-page":"143","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang T.","year":"2014"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/646649.699363"},{"key":"e_1_3_2_2_82_1","volume-title":"NDSS","author":"Wright C.","year":"2009"},{"key":"e_1_3_2_2_83_1","first-page":"39","volume-title":"An Analysis of the Degradation of Anonymous Protocols. In NDSS","volume":"2","author":"Wright M. K.","year":"2002"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/646648.699353"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.14"},{"key":"e_1_3_2_2_86_1","first-page":"184","volume-title":"Detecting Stepping Stones. In USENIX Security Symposium","volume":"171","author":"Zhang Y.","year":"2000"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_8"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_13"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243824","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:19Z","timestamp":1750212499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243824"}},"subtitle":["Strong Flow Correlation Attacks on Tor Using Deep Learning"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":87,"alternative-id":["10.1145\/3243734.3243824","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243824","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}