{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:24Z","timestamp":1763499024537,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU and state Brandenburg EFRE StaF","award":["ILB 85036716"],"award-info":[{"award-number":["ILB 85036716"]}]},{"name":"German Federal Ministry of Education and Research","award":["16KIS1206"],"award-info":[{"award-number":["16KIS1206"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485347","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2411-2413","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages"],"prefix":"10.1145","author":[{"given":"Asya","family":"Mitseva","sequence":"first","affiliation":[{"name":"Brandenburg Technical University, Cottbus, Germany"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Johannes","family":"Lohm\u00f6ller","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Torsten","family":"Ziemann","sequence":"additional","affiliation":[{"name":"Brandenburg Technical University, Cottbus, Germany"}]},{"given":"Carl","family":"Hoerchner","sequence":"additional","affiliation":[{"name":"Brandenburg Technical University, Cottbus, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"Brandenburg Technical University, Cottbus, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Xiang Cai et al. 2012. Touching from a distance: website fingerprinting attacks and defenses. In ACM CCS .","DOI":"10.1145\/2382196.2382260"},{"volume-title":"Tor: The Second-Generation Onion Router. In USENIX Security Symposium .","author":"Roger","key":"e_1_3_2_2_2_1","unstructured":"Roger Dingledine et al. 2004. Tor: The Second-Generation Onion Router. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_3_1","unstructured":"Martin Ester et al. 1996. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In KDD ."},{"key":"e_1_3_2_2_4_1","volume-title":"USENIX Security Symposium .","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX Security Symposium ."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772748"},{"key":"e_1_3_2_2_6_1","volume-title":"Clinic: Risks and Realization of HTTPS Traffic Analysis. PETS .","author":"Brad Miller","year":"2014","unstructured":"Brad Miller et al. 2014. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. PETS ."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Se Eun Oh et al. 2021. GANDaLF: GAN for Data-LimitedFingerprinting. PETS .","DOI":"10.2478\/popets-2021-0029"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko et al. 2016. Website Fingerprinting at Internet Scale. In NDSS .","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485347","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:46:02Z","timestamp":1763498762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":9,"alternative-id":["10.1145\/3460120.3485347","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485347","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}