{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:10:01Z","timestamp":1773414601212,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No.2020YFB1006100,No.2020YFE0200500,No.2018YFB1800200"],"award-info":[{"award-number":["No.2020YFB1006100,No.2020YFE0200500,No.2018YFB1800200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Priority Research Program of Chinese Academy of Sciences","award":["No. XDC02040400"],"award-info":[{"award-number":["No. XDC02040400"]}]},{"name":"Key Research and Development Program for Guangdong Province","award":["No. 2019B010137003"],"award-info":[{"award-number":["No. 2019B010137003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3485891","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"248-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor"],"prefix":"10.1145","author":[{"given":"Zhong","family":"Guan","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences"}]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences"}]},{"given":"Mingxin","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Tor 2021. https:\/\/www.torproject.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the APAN \u2013 Research Workshop.","author":"Abe Kota","year":"2016","unstructured":"Kota Abe and Shigeki Goto. 2016. Fingerprinting Attack on Tor Anonymity using Deep Learning. In Proceedings of the APAN \u2013 Research Workshop."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329802"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2015.7230964"},{"key":"e_1_3_2_1_9_1","volume-title":"25th USENIX Security Symposium, USENIX Security","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium, USENIX Security, Austin, TX, USA. 1187\u20131203. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/hayes"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_17_1","unstructured":"Aida Ramezani Amirhossein Khajehpour and Mahdi\u00a0Jafari Siavoshani. 2020. On Multi-Session Website Fingerprinting over TLS Handshake. CoRR abs\/2009.09284(2020). arxiv:2009.09284https:\/\/arxiv.org\/abs\/2009.09284"},{"key":"e_1_3_2_1_18_1","volume-title":"Network and Distributed System Security Symposium.","author":"Rimmer Vera","year":"2017","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom\u00a0Van Goethem, and Wouter Joosen. 2017. Automated Website Fingerprinting through Deep Learning. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_2_1_21_1","volume-title":"Annual Conference on Neural Information Processing Systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Annual Conference on Neural Information Processing Systems, Long Beach, CA, USA. 5998\u20136008. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219717"},{"key":"e_1_3_2_1_24_1","volume-title":"Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium. San Diego, CA, 143\u2013157. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/wang_tao"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_27_1","volume-title":"Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In 26th USENIX Security Symposium","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In 26th USENIX Security Symposium, Vancouver, BC. 1375\u20131390. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/wang-tao"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning, ICML","author":"Xu Kelvin","year":"2015","unstructured":"Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron\u00a0C. Courville, Ruslan Salakhutdinov, Richard\u00a0S. Zemel, and Yoshua Bengio. 2015. Show, Attend and Tell: Neural Image Caption Generation with Visual Attention. In Proceedings of the 32nd International Conference on Machine Learning, ICML, Lille, France, Vol.\u00a037. 2048\u20132057. http:\/\/proceedings.mlr.press\/v37\/xuc15.html"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274697"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762825"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","location":"Virtual Event USA","acronym":"ACSAC '21"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3485891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:13:31Z","timestamp":1755890011000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3485891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":30,"alternative-id":["10.1145\/3485832.3485891","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3485891","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}