{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:41:45Z","timestamp":1774539705159,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1423163 and CNS-1722743"],"award-info":[{"award-number":["CNS-1423163 and CNS-1722743"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354217","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1131-1148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":201,"title":["Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning"],"prefix":"10.1145","author":[{"given":"Payap","family":"Sirinam","sequence":"first","affiliation":[{"name":"Navaminda Kasatriyadhiraj Royal Air Force Academy, Bangkok, Thailand"}]},{"given":"Nate","family":"Mathews","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Mohammad Saidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"K. Abe and S. Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning. In in the Asia Pacific Advanced Network (APAN) .  K. Abe and S. Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning. In in the Asia Pacific Advanced Network (APAN) ."},{"key":"e_1_3_2_2_2_1","volume-title":"Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting . \"https:\/\/arxiv.org\/pdf\/1802.10215.pdf\". (2018). (accessed","author":"Bhat Sanjit","year":"2018","unstructured":"Sanjit Bhat , David Lu , Albert Kwon , and Srinivas Devadas . 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting . \"https:\/\/arxiv.org\/pdf\/1802.10215.pdf\". (2018). (accessed : August , 2018 ). Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting . \"https:\/\/arxiv.org\/pdf\/1802.10215.pdf\". (2018). (accessed: August, 2018)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_2_2_4_1","volume-title":"Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800--1807","author":"Chollet F.","year":"2017","unstructured":"F. Chollet . 2017 . Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800--1807 . https:\/\/doi.org\/10.1109\/CVPR.2017.195 10.1109\/CVPR.2017.195 F. Chollet. 2017. Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800--1807. https:\/\/doi.org\/10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TPAMI.2006.79","article-title":"One-shot learning of object categories","volume":"28","author":"Fei-Fei Li","year":"2006","unstructured":"Li Fei-Fei , R. Fergus , and P. Perona . 2006 . One-shot learning of object categories . IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol. 28 , 4 (April 2006), 594--611. https:\/\/doi.org\/10.1109\/TPAMI.2006.79 10.1109\/TPAMI.2006.79 Li Fei-Fei, R. Fergus, and P. Perona. 2006. One-shot learning of object categories. IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol. 28, 4 (April 2006), 594--611. https:\/\/doi.org\/10.1109\/TPAMI.2006.79","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.307"},{"key":"e_1_3_2_2_7_1","volume-title":"USENIX Security Symposium. USENIX Association , 1--17","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . k-fingerprinting: A robust scalable website fingerprinting technique . In USENIX Security Symposium. USENIX Association , 1--17 . Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In USENIX Security Symposium. USENIX Association , 1--17."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_2_2_12_1","unstructured":"Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. (2015).  Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. (2015)."},{"key":"e_1_3_2_2_13_1","volume-title":"ICML Deep Learning Workshop","volume":"2","author":"Koch Gregory","year":"2015","unstructured":"Gregory Koch , Richard Zemel , and Ruslan Salakhutdinov . 2015 . Siamese neural networks for one-shot image recognition . In ICML Deep Learning Workshop , Vol. 2 . Gregory Koch, Richard Zemel, and Ruslan Salakhutdinov. 2015. Siamese neural networks for one-shot image recognition. In ICML Deep Learning Workshop , Vol. 2."},{"key":"e_1_3_2_2_14_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E . Hinton . 2012 . ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems. Curran Associates, Inc ., 1097--1105. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems. Curran Associates, Inc., 1097--1105."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"e_1_3_2_2_16_1","volume-title":"Using Deep Learning. In ACM Conference on Computer and Communications Security (CCS). ACM","author":"Milad Nasr Alireza Bahramali","year":"2018","unstructured":"Alireza Bahramali Milad Nasr and Amir Houmansadr . 2018 . DeepCorr: Strong Flow Correlation Attacks on Tor , Using Deep Learning. In ACM Conference on Computer and Communications Security (CCS). ACM , 1962--1976. https:\/\/doi.org\/10.1145\/3243734.3243824 10.1145\/3243734.3243824 Alireza Bahramali Milad Nasr and Amir Houmansadr. 2018. DeepCorr: Strong Flow Correlation Attacks on Tor, Using Deep Learning. In ACM Conference on Computer and Communications Security (CCS). ACM, 1962--1976. https:\/\/doi.org\/10.1145\/3243734.3243824"},{"key":"e_1_3_2_2_17_1","volume-title":"p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning . \"https:\/\/arxiv.org\/abs\/1711.03656.pdf\". (2018). (accessed","author":"Oh Se Eun","year":"2018","unstructured":"Se Eun Oh , Saikrishna Sunkam , and Nicholas Hopper . 2018. p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning . \"https:\/\/arxiv.org\/abs\/1711.03656.pdf\". (2018). (accessed : August , 2018 ). Se Eun Oh, Saikrishna Sunkam, and Nicholas Hopper. 2018. p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning . \"https:\/\/arxiv.org\/abs\/1711.03656.pdf\". (2018). (accessed: August, 2018)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0043"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_20_1","first-page":"6","article-title":"Deep face recognition","volume":"1","author":"Parkhi Omkar M","year":"2015","unstructured":"Omkar M Parkhi , Andrea Vedaldi , Andrew Zisserman , 2015 . Deep face recognition .. In BMVC , Vol. 1. 6 . Omkar M Parkhi, Andrea Vedaldi, Andrew Zisserman, et almbox. 2015. Deep face recognition.. In BMVC, Vol. 1. 6.","journal-title":"BMVC"},{"key":"e_1_3_2_2_21_1","volume-title":"Tor Protocol Specification Proposal. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/254-padding-negotiation.txt . (2015). (accessed","author":"Perry Mike","year":"2017","unstructured":"Mike Perry . 2015. Padding Negotiation . Tor Protocol Specification Proposal. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/254-padding-negotiation.txt . (2015). (accessed : October 1, 2017 ). Mike Perry. 2015. Padding Negotiation. Tor Protocol Specification Proposal. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/254-padding-negotiation.txt . (2015). (accessed: October 1, 2017)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_2_23_1","volume-title":"FaceNet: A Unified Embedding for Face Recognition and Clustering. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) .","author":"Schroff Florian","year":"2015","unstructured":"Florian Schroff , Dmitry Kalenichenko , and James Philbin . 2015 . FaceNet: A Unified Embedding for Face Recognition and Clustering. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) . Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) ."},{"key":"e_1_3_2_2_24_1","volume-title":"USENIX Security Symposium. USENIX Association , 1357--1374","author":"Schuster Roei","year":"2017","unstructured":"Roei Schuster , Vitaly Shmatikov , and Eran Tromer . 2017 . Beauty and the Burst: Remote identification of encrypted video streams . In USENIX Security Symposium. USENIX Association , 1357--1374 . Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the Burst: Remote identification of encrypted video streams. In USENIX Security Symposium. USENIX Association , 1357--1374."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_2_26_1","volume-title":"USENIX Security Symposium . 271--286","author":"Sun Yixin","year":"2015","unstructured":"Yixin Sun , Anne Edmundson , Laurent Vanbever , Oscar Li , Jennifer Rexford , Mung Chiang , and Prateek Mittal . 2015 . RAPTOR: Routing Attacks on Privacy in Tor .. In USENIX Security Symposium . 271--286 . Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal. 2015. RAPTOR: Routing Attacks on Privacy in Tor.. In USENIX Security Symposium . 271--286."},{"key":"e_1_3_2_2_27_1","volume-title":"Going deeper with convolutions. (June","author":"Szegedy Christian","year":"2015","unstructured":"Christian Szegedy , Wei Liu , Yangqing Jia , Pierre Sermanet , Scott Reed , Dragomir Anguelov , Dumitru Erhan , Vincent Vanhoucke , and Andrew Rabinovich . 2015. Going deeper with convolutions. (June 2015 ). Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. (June 2015)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.8"},{"key":"e_1_3_2_2_30_1","volume-title":"et almbox","author":"Vinyals Oriol","year":"2016","unstructured":"Oriol Vinyals , Charles Blundell , Tim Lillicrap , Daan Wierstra , et almbox . 2016 . Matching networks for one shot learning. In Advances in Neural Information Processing Systems . 3630--3638. Oriol Vinyals, Charles Blundell, Tim Lillicrap, Daan Wierstra, et almbox. 2016. Matching networks for one shot learning. In Advances in Neural Information Processing Systems . 3630--3638."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX Security Symposium. USENIX Association , 143--157","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective attacks and provable defenses for website fingerprinting . In USENIX Security Symposium. USENIX Association , 143--157 . Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In USENIX Security Symposium. USENIX Association , 143--157."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274697"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0039"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems -","volume":"2","author":"Yosinski Jason","year":"2014","unstructured":"Jason Yosinski , Jeff Clune , Yoshua Bengio , and Hod Lipson . 2014 . How Transferable Are Features in Deep Neural Networks? . In Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'14). MIT Press, Cambridge, MA, USA, 3320--3328. http:\/\/dl.acm.org\/citation.cfm?id=2969033.2969197 Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How Transferable Are Features in Deep Neural Networks?. In Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'14). MIT Press, Cambridge, MA, USA, 3320--3328. http:\/\/dl.acm.org\/citation.cfm?id=2969033.2969197"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.146"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354217","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354217","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":36,"alternative-id":["10.1145\/3319535.3354217","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354217","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}