{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:31:53Z","timestamp":1773804713090,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1953786"],"award-info":[{"award-number":["CNS-1953786"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["DARPA-RA-21-03-09-YFA9-FP-003"],"award-info":[{"award-number":["DARPA-RA-21-03-09-YFA9-FP-003"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616639","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"1035-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Realistic Website Fingerprinting By Augmenting Network Traces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4127-1168","authenticated-orcid":false,"given":"Alireza","family":"Bahramali","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-4758","authenticated-orcid":false,"given":"Ardavan","family":"Bozorgi","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7553-6657","authenticated-orcid":false,"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Bachman O. Alsharif and D. Precup. 2014. Learning with pseudo-ensembles. In NIPS."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Bahramali A. Bozorgi and A. Houmansadr. 2023. Realistic Website Finger-printing By Augmenting Network Traces. https:\/\/github.com\/SPIN-UMass\/Re alistic-Website-Fingerprinting-By-Augmenting-Network-Traces.","DOI":"10.1145\/3576915.3616639"},{"key":"e_1_3_2_1_3_1","unstructured":"D. Berthelot N. Carlini E Cubuk. K. Kurakin A. Sohn H. Zhang and C. Raffel. 2020. ReMixMatch: Semi-Supervised Learning with Distribution Matching and Augmentation Anchoring. In ICLR."},{"key":"e_1_3_2_1_4_1","unstructured":"S. Bhat D. Lu A. Kwon and S. Devadas. 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. arXiv preprint arXiv:1802.10215."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"X. Cai X. Zhang B. Joshi and R. Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses. In ACM CCS.","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_6_1","unstructured":"T. Chen S. Kornblith M. Norouzi and G. Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"G. Cherubin J. Hayes and M. Juarez. 2017. Website fingerprinting defenses at the application layer. In PETS.","DOI":"10.1515\/popets-2017-0023"},{"key":"e_1_3_2_1_8_1","unstructured":"G. Cherubin R. Jansen and C. Troncoso. 2022. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. In USENIX Security."},{"key":"e_1_3_2_1_9_1","unstructured":"M. Perry. 2013. A Critique of Website Fingerprinting Attacks. Tor project Blog. https:\/\/blog.torproject.org\/blog\/critique-website-traffic-fingerprinting-attac ks."},{"key":"e_1_3_2_1_10_1","volume-title":"Autoaugment: Learning augmentation strategies from data. In CVPR.","author":"Cubuk E.","year":"2019","unstructured":"E. Cubuk, B. Zoph, D. Mane, V. Vasudevan, and Q. Le. 2019. Autoaugment: Learning augmentation strategies from data. In CVPR."},{"key":"e_1_3_2_1_11_1","volume-title":"Randaugment: Practical automated data augmentation with a reduced search space. In CVPR.","author":"Cubuk E.","year":"2020","unstructured":"E. Cubuk, B. Zoph, J. Shlens, and Q. Le. 2020. Randaugment: Practical automated data augmentation with a reduced search space. In CVPR."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_13_1","unstructured":"J. Hayes and G. Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In USENIX Security."},{"key":"e_1_3_2_1_14_1","unstructured":"S. Ioffe and C. Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML."},{"key":"e_1_3_2_1_15_1","volume-title":"Inside Job: Applying Traffic Analysis to Measure Tor from Within. In NDSS.","author":"Jansen R.","year":"2018","unstructured":"R. Jansen, M. Juarez, R. Galvez, T. Elahi, and C. Diaz. 2018. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"M. Juarez S. Afroz G. Acar C. Diaz and R. Greenstadt. 2014. A critical evalua-tion of website fingerprinting attacks. In ACM CCS.","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_17_1","unstructured":"S. Laine and T. Aila. 2016. Temporal ensembling for semi-supervised learning. arXiv preprint arXiv:1610.02242."},{"key":"e_1_3_2_1_18_1","volume-title":"ICML 2013 Workshop: Challenges in Representation Learning (WREPL).","author":"Lee D","year":"2013","unstructured":"D Lee. 2013. Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks. In ICML 2013 Workshop: Challenges in Representation Learning (WREPL)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479874"},{"key":"e_1_3_2_1_20_1","unstructured":"M. Nasr A. Bahramali and A. Houmansadr. 2021. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In USENIX Security."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"S. Oh N. Mathews M. Rahman M. Wright and N. Hopper. 2021. GANDaLF: GAN for Data-Limited Fingerprinting. In PETS.","DOI":"10.2478\/popets-2021-0029"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Oh S. Sunkam and N. Hopper. 2019. p1-FP: Extraction Classification and Prediction of Website Fingerprints with Deep Learning. In PETS.","DOI":"10.2478\/popets-2019-0043"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"A. Panchenko F. Lanze J. Pennekamp T. Engel A. Zinnen M. Henze and K. Wehrle. 2016. Website Fingerprinting at Internet Scale. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A. Panchenko L. Niessen A. Zinnen and T. Engel. 2011. Website fingerprinting in onion routing based anonymization networks. In WPES.","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"T. Pulls and R. Dahlberg. 2020. Website Fingerprinting with Website Oracles. In PETS.","DOI":"10.2478\/popets-2020-0013"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M. Rahman P. Sirinam N. Mathews K. Gangadhara and M. Wright. 2020. Tik-Tok: The utility of packet timing in website fingerprinting attacks. In PETS.","DOI":"10.2478\/popets-2020-0043"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"V. Rimmer D. Preuveneers M. Juarez T. Van and W. Joosen. 2018. Automated website fingerprinting through deep learning. In NDSS.","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACVMOT.2005.107"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Sajjadi M. Javanmardi and T. Tasdizen. 2016. Regularization with stochastic transformations and perturbations for deep semi-supervised learning. Advances in neural information processing systems."},{"key":"e_1_3_2_1_30_1","volume-title":"Facenet: A unified embedding for face recognition and clustering. In CVPR.","author":"Schroff F.","year":"2015","unstructured":"F. Schroff, D. Kalenichenko, and J. Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In CVPR."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1965.1053799"},{"key":"e_1_3_2_1_32_1","unstructured":"2020. Python Language Bindings for Selenium WebDriver. https:\/\/pypi.org\/pr oject\/selenium\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"P. Sirinam M. Imani M. Juarez and M. Wright. 2018. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In ACM CCS.","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_34_1","volume-title":"Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. In ACM CCS.","author":"Sirinam P.","year":"2019","unstructured":"P. Sirinam, N. Mathews, M. Rahman, and M. Wright. 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. In ACM CCS."},{"key":"e_1_3_2_1_35_1","volume-title":"Fixmatch: Simplifying semi-supervised learning with consistency and confidence. In NIPS.","author":"Sohn K.","year":"2020","unstructured":"K. Sohn, D. Berthelot, NN Carlini, Z. Zhang, H. Zhang, C. Raffel, E. Cubuk, A. Kurakin, and C. Li. 2020. Fixmatch: Simplifying semi-supervised learning with consistency and confidence. In NIPS."},{"key":"e_1_3_2_1_36_1","unstructured":"2022. Stem. https:\/\/pypi.org\/project\/stem\/1.8.1\/."},{"key":"e_1_3_2_1_37_1","unstructured":"2022. Tor-browser-selenium. https:\/\/pypi.org\/project\/tbselenium\/0.6.3\/."},{"key":"e_1_3_2_1_38_1","unstructured":"2023. Tor Metrics Portal. https:\/\/metrics.torproject.org\/."},{"key":"e_1_3_2_1_39_1","unstructured":"2022. Tshark(1) Manual Page. https:\/\/wireshark.org\/docs\/man-pages\/tshark.ht ml."},{"key":"e_1_3_2_1_40_1","volume-title":"Dobbs: Towards a comprehensive dataset to study the browsing behavior of online users. In WI-IAT.","author":"von der Weth C.","year":"2013","unstructured":"C. von der Weth and M. Hauswirth. 2013. Dobbs: Towards a comprehensive dataset to study the browsing behavior of online users. In WI-IAT."},{"key":"e_1_3_2_1_41_1","volume-title":"High Precision Open-World Website Fingerprinting","author":"Wang T.","unstructured":"T. Wang. 2020. High Precision Open-World Website Fingerprinting. In IEEE S&P."},{"key":"e_1_3_2_1_42_1","unstructured":"T. Wang. 2016. Website fingerprinting: Attacks and defenses. Ph.D. Dissertation."},{"key":"e_1_3_2_1_43_1","unstructured":"T. Wang X. Cai R. Nithyanand R. Johnson and I. Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"T. Wang and I. Goldberg. 2013. Improved website fingerprinting on tor. In WPES.","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"T. Wang and I. Goldberg. 2016. On realistically attacking tor with website fingerprinting. In PETS.","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Q. Xie M. Luong E. Hovy and Q. Le. 2020. Self-training with noisy student improves imagenet classification. In CVPR.","DOI":"10.1109\/CVPR42600.2020.01070"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Y. Xu T Wang Q. Li Q. Gong Y. Chen and Y. Jiang. 2018. A multi-tab website fingerprinting attack. In ACSAC.","DOI":"10.1145\/3274694.3274697"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616639","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:47:37Z","timestamp":1755740857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":47,"alternative-id":["10.1145\/3576915.3616639","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616639","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}