{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:30:00Z","timestamp":1770226200258,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1947913"],"award-info":[{"award-number":["CNS-1947913"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447835","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Adaptive Fingerprinting"],"prefix":"10.1145","author":[{"given":"Chenggang","family":"Wang","sequence":"first","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Jimmy","family":"Dani","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Xiaodong","family":"Jia","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. WTF-PAD. https:\/\/github.com\/wtfpad\/wtfpad  2016. WTF-PAD. https:\/\/github.com\/wtfpad\/wtfpad"},{"key":"e_1_3_2_2_2_1","unstructured":"2018. tor-browser-crawler. https:\/\/github.com\/onionpop\/tor-browser-crawler  2018. tor-browser-crawler. https:\/\/github.com\/onionpop\/tor-browser-crawler"},{"key":"e_1_3_2_2_3_1","unstructured":"2021. AdaptiveFingerprinting. https:\/\/github.com\/SmartHomePrivacyProject\/ AdaptiveFingerprinting  2021. AdaptiveFingerprinting. https:\/\/github.com\/SmartHomePrivacyProject\/ AdaptiveFingerprinting"},{"key":"e_1_3_2_2_4_1","volume-title":"Proc. of Aisa Pacific Advanced Network (APAN).","author":"Abe K.","unstructured":"K. Abe and S. Goto . 2016. Fingerprinting Attack on Tor Anonymity Using Deep Learning . In Proc. of Aisa Pacific Advanced Network (APAN). K. Abe and S. Goto. 2016. Fingerprinting Attack on Tor Anonymity Using Deep Learning. In Proc. of Aisa Pacific Advanced Network (APAN)."},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. of PETS'19","author":"Bhat S.","unstructured":"S. Bhat , D. Lu , A. Kwon , and S. Devadas . 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning . In Proc. of PETS'19 . S. Bhat, D. Lu, A. Kwon, and S. Devadas. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. In Proc. of PETS'19."},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. of ACM CCS'20","author":"Cadena W. D.","unstructured":"W. D. Cadena , A. Mitseva , J. Hiller , J. Penekamp , S. Reuter , J. Filter , T. Engel , K. Wehrle , and A. Panchenko . 2020. TrafficSliver: Finghting Website Fingerprinting Attacks with Tra\"c Splitting . In Proc. of ACM CCS'20 . W. D. Cadena, A. Mitseva, J. Hiller, J. Penekamp, S. Reuter, J. Filter, T. Engel, K. Wehrle, and A. Panchenko. 2020. TrafficSliver: Finghting Website Fingerprinting Attacks with Tra\"c Splitting. In Proc. of ACM CCS'20."},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. of 13th ACM Workshop on Privacy in Electronic Society.","author":"Cai X.","unstructured":"X. Cai , R. Nithyanand , and R. Johnson . 2014. CS-BuFLO: A Congrestion Sensitive Website Fingerprinting Defense . In Proc. of 13th ACM Workshop on Privacy in Electronic Society. X. Cai, R. Nithyanand, and R. Johnson. 2014. CS-BuFLO: A Congrestion Sensitive Website Fingerprinting Defense. In Proc. of 13th ACM Workshop on Privacy in Electronic Society."},{"key":"e_1_3_2_2_8_1","volume-title":"Proc. of ACM ASIACCS'19","author":"Cui W.","unstructured":"W. Cui , T. Chen , C. Fields , J. Chen , A. Sierra , and E. Chan-Tin . 2019. Revisting Assumtions for Website Fingerprinting Attacks . In Proc. of ACM ASIACCS'19 . W. Cui, T. Chen, C. Fields, J. Chen, A. Sierra, and E. Chan-Tin. 2019. Revisting Assumtions for Website Fingerprinting Attacks. In Proc. of ACM ASIACCS'19."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Y. Ganin E. Ustinova H. Ajakan P. Germain H. Larochelle F. Laviolette M. Marchand and V. Lempitsky. 2016. Domain-Adversarial Tranining of Neural Networks. Journal of Machine Learning Research (2016).  Y. Ganin E. Ustinova H. Ajakan P. Germain H. Larochelle F. Laviolette M. Marchand and V. Lempitsky. 2016. Domain-Adversarial Tranining of Neural Networks. Journal of Machine Learning Research (2016).","DOI":"10.1007\/978-3-319-58347-1_10"},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. of USENIX Security'20","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang . 2020 . Zero-delay Lightweight Defenses against Website Fingerprinting . In Proc. of USENIX Security'20 . Jiajun Gong and Tao Wang. 2020. Zero-delay Lightweight Defenses against Website Fingerprinting. In Proc. of USENIX Security'20."},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. of the International Conference on Nerual Information Processing Systems (NIPS","author":"Goodfellow I.","year":"2014","unstructured":"I. Goodfellow , J. Pouget-Abadie , M. Mirza , B. Xu , D. Warde-Farley , S. Ozair , A. Courville , and Y. Bengio . 2014. Generative Adversarial Nets . In Proc. of the International Conference on Nerual Information Processing Systems (NIPS 2014 ). I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. 2014. Generative Adversarial Nets. In Proc. of the International Conference on Nerual Information Processing Systems (NIPS 2014)."},{"key":"e_1_3_2_2_13_1","volume-title":"Proc. of USENIX Security'16","author":"Hayes J.","unstructured":"J. Hayes and G. Danezis . 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique . In Proc. of USENIX Security'16 . J. Hayes and G. Danezis. 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proc. of USENIX Security'16."},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. of PETS'20","author":"Henri S.","unstructured":"S. Henri , G. Garcia-Aviles , P. Serrano , A. Banchs , and P. Thiran . 2020. Protecting against Website Fingerprinting with Multihoming . In Proc. of PETS'20 . S. Henri, G. Garcia-Aviles, P. Serrano, A. Banchs, and P. Thiran. 2020. Protecting against Website Fingerprinting with Multihoming. In Proc. of PETS'20."},{"key":"e_1_3_2_2_15_1","volume-title":"Proc. of ACM Workshop on Cloud Computing Security.","author":"Hermann Dominik","year":"2009","unstructured":"Dominik Hermann , Rolf Wendolsky , and Hannes Federrath . 2009 . Website Fingertinging: Attacking Popular Privacy Enhancing Tehnologies with the Multinomial Naive-Bayes Classifier . In Proc. of ACM Workshop on Cloud Computing Security. Dominik Hermann, Rolf Wendolsky, and Hannes Federrath. 2009. Website Fingertinging: Attacking Popular Privacy Enhancing Tehnologies with the Multinomial Naive-Bayes Classifier. In Proc. of ACM Workshop on Cloud Computing Security."},{"key":"e_1_3_2_2_16_1","volume-title":"Proc. of ICML'19","author":"Ho D.","unstructured":"D. Ho , E. Liang , I. Stoica , P. Abbeel , and X. Chen . 2019. Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules . In Proc. of ICML'19 . D. Ho, E. Liang, I. Stoica, P. Abbeel, and X. Chen. 2019. Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules. In Proc. of ICML'19."},{"key":"e_1_3_2_2_17_1","volume-title":"Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces.","author":"Imani M.","year":"2019","unstructured":"M. Imani , M. S. Rahman , N. Mathews , and M. Wright . 2019 . Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. (2019). https:\/\/arxiv.org\/pdf\/1902.06626.pdf. M. Imani, M. S. Rahman, N. Mathews, and M. Wright. 2019. Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. (2019). https:\/\/arxiv.org\/pdf\/1902.06626.pdf."},{"key":"e_1_3_2_2_18_1","volume-title":"Proc. of NDSS'18","author":"Jansen R.","unstructured":"R. Jansen , M. Juarez , R. Galvez , T. Elahi , and C. Diaz . 2018. Inside Job: Applying Traffic Analysis to Measure Tor from Within . In Proc. of NDSS'18 . R. Jansen, M. Juarez, R. Galvez, T. Elahi, and C. Diaz. 2018. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In Proc. of NDSS'18."},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. of ACM CCS'14","author":"Juarez M.","unstructured":"M. Juarez , S. Afroz , G. Acar , C. Diaz , and R. Greenstadt . 2014. A Criticial Evaluation of Website Fingerprinting Attacks . In Proc. of ACM CCS'14 . M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt. 2014. A Criticial Evaluation of Website Fingerprinting Attacks. In Proc. of ACM CCS'14."},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. of ESORICS'16","author":"Juarez M.","unstructured":"M. Juarez , M. Imani , M. Perry , C. Diaz , and M. Wright . 2016. Toward an Efficient Website Fingerprinting Defense . In Proc. of ESORICS'16 . M. Juarez, M. Imani, M. Perry, C. Diaz, and M. Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In Proc. of ESORICS'16."},{"key":"e_1_3_2_2_21_1","volume-title":"Proc. of the 32th International Conference on Machine Learning (ICML'15)","author":"Koch G.","unstructured":"G. Koch , R. Zemel , and R. Salakhutdinov . 2015. Siamese Neural Networks for One-shot Image Recognition . In Proc. of the 32th International Conference on Machine Learning (ICML'15) . G. Koch, R. Zemel, and R. Salakhutdinov. 2015. Siamese Neural Networks for One-shot Image Recognition. In Proc. of the 32th International Conference on Machine Learning (ICML'15)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_2_24_1","volume":"201","author":"Long M.","unstructured":"M. Long and J. Wang. 201 5. Learning transferable features with deep adaptation networks. In Proc. of ICML'15. M. Long and J. Wang. 2015. Learning transferable features with deep adaptation networks. In Proc. of ICML'15.","journal-title":"J. Wang."},{"key":"e_1_3_2_2_25_1","volume-title":"Nov","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geo#rey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9 , Nov ( 2008 ), 2579--2605. Laurens van der Maaten and Geo#rey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, Nov (2008), 2579--2605."},{"key":"e_1_3_2_2_26_1","unstructured":"M. Nasr A. Bahramali and A. Houmansadr. 2020. Blind Adversarial Network Perturbations. (2020). https:\/\/arxiv.org\/pdf\/2002.06495.pdf.  M. Nasr A. Bahramali and A. Houmansadr. 2020. Blind Adversarial Network Perturbations. (2020). https:\/\/arxiv.org\/pdf\/2002.06495.pdf."},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. of PETS'19","author":"Oh Se Eun","unstructured":"Se Eun Oh , S. Sunkam , and N. Hopper . 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints . In Proc. of PETS'19 . Se Eun Oh, S. Sunkam, and N. Hopper. 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints. In Proc. of PETS'19."},{"key":"e_1_3_2_2_28_1","unstructured":"S. J. Pan and Q. Yang. 2009. A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering (2009).  S. J. Pan and Q. Yang. 2009. A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering (2009)."},{"key":"e_1_3_2_2_29_1","volume-title":"Proc. of NDSS'16","author":"Panchenko A.","unstructured":"A. Panchenko , F. Lanze , A. Zinnen , M. Henze , J. Penekamp , K. Wehrle , and T. Engel . 2016. Website Fingerprinting at Internet Scale . In Proc. of NDSS'16 . A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Penekamp, K. Wehrle, and T. Engel. 2016. Website Fingerprinting at Internet Scale. In Proc. of NDSS'16."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"O. M. Parki A. Vedaldi and A. Zisserman. 2015. Deep Face Recognition. In British Machine Vision Association.  O. M. Parki A. Vedaldi and A. Zisserman. 2015. Deep Face Recognition. In British Machine Vision Association.","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. of NDSS'18","author":"Rimmer V.","unstructured":"V. Rimmer , D. Preuveneers , M. Juarez , T. V. Goethem , and W. Joosen . 2018. Automated Website Fingerprinting through Deep Learning . In Proc. of NDSS'18 . V. Rimmer, D. Preuveneers, M. Juarez, T. V. Goethem, and W. Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In Proc. of NDSS'18."},{"key":"e_1_3_2_2_32_1","volume":"201","author":"Schroff F.","unstructured":"F. Schroff , D. Kalenichenko , and J. Philbin. 201 5. FaceNet: A Unified Embedding for Face Recognition and Clustering. In Proc. of IEEE Conference on Computer Vision and Pattern Recognition (CVPR). F. Schroff, D. Kalenichenko, and J. Philbin. 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering. In Proc. of IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","journal-title":"J. Philbin."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"C. Shorten and T. M. Khoshgoftaar. 2019. A Survey on Image Data Augmentation for Deep Learning. Journal of Big Data 6 60 (2019).  C. Shorten and T. M. Khoshgoftaar. 2019. A Survey on Image Data Augmentation for Deep Learning. Journal of Big Data 6 60 (2019).","DOI":"10.1186\/s40537-019-0197-0"},{"key":"e_1_3_2_2_34_1","volume-title":"Proc. of USENIX Security'19","author":"Shusterman A.","unstructured":"A. Shusterman , L. Kang , Y. Haskal , Y. Meltser , P. Mittal , Y. Oren , and Y. Yarom . 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel . In Proc. of USENIX Security'19 . A. Shusterman, L. Kang, Y. Haskal, Y. Meltser, P. Mittal, Y. Oren, and Y. Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In Proc. of USENIX Security'19."},{"key":"e_1_3_2_2_35_1","volume-title":"Proc. of ACM CCS'18","author":"Sirinam P.","unstructured":"P. Sirinam , M. Imani , M. Juarez , and M. Wright . 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning . In Proc. of ACM CCS'18 . P. Sirinam, M. Imani, M. Juarez, and M. Wright. 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning. In Proc. of ACM CCS'18."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_2_2_37_1","volume-title":"Proc. of AAAI Conference on Artificial Intelligence.","author":"Sun B.","unstructured":"B. Sun , J. Feng , and K. Saenko . 2016. Return of Frustratingly Easy Domain Adaption . In Proc. of AAAI Conference on Artificial Intelligence. B. Sun, J. Feng, and K. Saenko. 2016. Return of Frustratingly Easy Domain Adaption. In Proc. of AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. of IEEE CVPR'14","author":"Taigman Y.","unstructured":"Y. Taigman , M. Yang , M. A. Ranzato , and L. Wolf . 2014. Deepface: Closing the gap to human-level performance in face verification . In Proc. of IEEE CVPR'14 . Y. Taigman, M. Yang, M. A. Ranzato, and L. Wolf. 2014. Deepface: Closing the gap to human-level performance in face verification. In Proc. of IEEE CVPR'14."},{"key":"e_1_3_2_2_39_1","volume-title":"Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Tzeng E.","unstructured":"E. Tzeng , J. Hoffman , K. Saenko , and T. Darrell . 2017. Adversarial Discriminative Domain Adaptation . In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). E. Tzeng, J. Hoffman, K. Saenko, and T. Darrell. 2017. Adversarial Discriminative Domain Adaptation. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_2_40_1","unstructured":"E. Tzeng J. Hoffman N. Zhang K. Saenko and T. Darrell. 2014. Deep domain confusion: Maximizing for domain invariance. (2014). https:\/\/arxiv.org\/pdf\/1412.3474.pdf.  E. Tzeng J. Hoffman N. Zhang K. Saenko and T. Darrell. 2014. Deep domain confusion: Maximizing for domain invariance. (2014). https:\/\/arxiv.org\/pdf\/1412.3474.pdf."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00015"},{"key":"e_1_3_2_2_42_1","volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 143--157.","author":"Wang Tao","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014. Effective attacks and provable defenses for website fingerprinting . In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 143--157. Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 143--157."},{"key":"e_1_3_2_2_43_1","volume-title":"Proc. of 23rd USENIX Security Symposium.","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cui , Rishab Nithyannand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks on Provable Denfenses for Website Fingerprinting . In Proc. of 23rd USENIX Security Symposium. Tao Wang, Xiang Cui, Rishab Nithyannand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks on Provable Denfenses for Website Fingerprinting. In Proc. of 23rd USENIX Security Symposium."},{"key":"e_1_3_2_2_44_1","volume-title":"Proc. of PETS'16","author":"Wang T.","unstructured":"T. Wang and I. Goldberg . 2016. On Realistically Attacking Tor with Website Fingerprinting . In Proc. of PETS'16 . T. Wang and I. Goldberg. 2016. On Realistically Attacking Tor with Website Fingerprinting. In Proc. of PETS'16."},{"key":"e_1_3_2_2_45_1","volume-title":"Proc. of USENIX Security'17","author":"Wang T.","unstructured":"T. Wang and I. Goldberg . 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks . In Proc. of USENIX Security'17 . T. Wang and I. Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proc. of USENIX Security'17."},{"key":"e_1_3_2_2_46_1","volume-title":"Proc. of ACSAC'18","author":"Xu Y.","unstructured":"Y. Xu , T. Wang , Q. Li , Q. Gong , Y. Chen , and Y. Jiang . 2018. A Multi-Tab Website Fingerprinting Attack . In Proc. of ACSAC'18 . Y. Xu, T. Wang, Q. Li, Q. Gong, Y. Chen, and Y. Jiang. 2018. A Multi-Tab Website Fingerprinting Attack. In Proc. of ACSAC'18."},{"key":"e_1_3_2_2_47_1","unstructured":"Jason Yosinski Jeff Clune Yoshua Bengio and Hod Lipson. 2014. How transferable are features in deep neural networks?. In Advances in neural information processing systems. 3320--3328.  Jason Yosinski Jeff Clune Yoshua Bengio and Hod Lipson. 2014. How transferable are features in deep neural networks?. In Advances in neural information processing systems. 3320--3328."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172386"},{"key":"e_1_3_2_2_49_1","volume-title":"A comprehensive survey on transfer learning. Proc","author":"Zhuang Fuzhen","year":"2020","unstructured":"Fuzhen Zhuang , Zhiyuan Qi , Keyu Duan , Dongbo Xi , Yongchun Zhu , Hengshu Zhu , Hui Xiong , and Qing He. 2020. A comprehensive survey on transfer learning. Proc . IEEE ( 2020 ). Fuzhen Zhuang, Zhiyuan Qi, Keyu Duan, Dongbo Xi, Yongchun Zhu, Hengshu Zhu, Hui Xiong, and Qing He. 2020. A comprehensive survey on transfer learning. Proc. IEEE (2020)."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447835","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447835","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447835"}},"subtitle":["Website Fingerprinting over Few Encrypted Traffic"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":49,"alternative-id":["10.1145\/3422337.3447835","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447835","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}