{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:13Z","timestamp":1750309513198,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678910","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"17-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Web Fingerprinting with a Protocol-Centric Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3120-3292","authenticated-orcid":false,"given":"Bogdan","family":"Cebere","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2470-8444","authenticated-orcid":false,"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Selenium. https:\/\/www.selenium.dev\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. CIRA-CIC-DoHBrw-2020. Technical Report. https:\/\/www.unb.ca\/cic\/datasets\/dohbrw-2020.html Available at https:\/\/www.unb.ca\/cic\/datasets\/dohbrw-2020.html."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. TLS ClientHello extension permutation. https:\/\/chromestatus.com\/feature\/5124606246518784 Available at https:\/\/chromestatus.com\/feature\/5124606246518784."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155465"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907240"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"e_1_3_2_1_8_1","volume-title":"Practical traffic analysis attacks on secure messaging applications. arXiv preprint arXiv:2005.00508","author":"Bahramali Alireza","year":"2020","unstructured":"Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, and Don Towsley. 2020. Practical traffic analysis attacks on secure messaging applications. arXiv preprint arXiv:2005.00508 (2020)."},{"key":"e_1_3_2_1_9_1","volume-title":"Random forests. Machine learning 45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning 45 (2001), 5\u201332."},{"key":"e_1_3_2_1_10_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bushart Jonas","year":"2020","unstructured":"Jonas Bushart and Christian Rossow. 2020. Padding ain\u2019t enough: Assessing the privacy guarantees of encrypted { DNS$}$. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_1_14_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Cao Jiahao","year":"2019","unstructured":"Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. 2019. Fingerprinting SDN applications via encrypted control traffic. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 501\u2013515."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"volume-title":"Traffic analysis of SSL encrypted web browsing. Project paper","author":"Cheng Heyning","key":"e_1_3_2_1_16_1","unstructured":"Heyning Cheng and Ron Avnur. 1998. Traffic analysis of SSL encrypted web browsing. Project paper, University of Berkeley (1998)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0023"},{"key":"e_1_3_2_1_18_1","unstructured":"Cloudflare. 2023. JA3 Fingerprint. https:\/\/developers.cloudflare.com\/bots\/concepts\/ja3-fingerprint\/ Available at https:\/\/developers.cloudflare.com\/bots\/concepts\/ja3-fingerprint\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677048"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1958.tb00292.x"},{"key":"e_1_3_2_1_22_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Cui Tianyu","year":"2021","unstructured":"Tianyu Cui, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui, and Chang Liu. 2021. { SiamHAN$}$:${$IPv6$}$ address correlation attacks on ${$TLS$}$ encrypted traffic via siamese heterogeneous graph attention network. In 30th USENIX Security Symposium (USENIX Security 21). 4329\u20134346."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314785"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"e_1_3_2_1_25_1","unstructured":"Utsho Dey. [n. d.]. Kaggle 25k IMDb Movie Dataset. https:\/\/www.kaggle.com\/datasets\/utsh0dey\/25k-movie-dataset"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341478"},{"key":"e_1_3_2_1_27_1","volume-title":"IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic Webpages.. In WEBIST. 102\u2013112.","author":"Di\u00a0Martino Mariano","year":"2018","unstructured":"Mariano Di\u00a0Martino, Pieter Robyns, Peter Quax, and Wim Lamotte. 2018. IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic Webpages.. In WEBIST. 102\u2013112."},{"key":"e_1_3_2_1_28_1","unstructured":"Christian\u00a0J Dietrich Christian Rossow and Norbert Pohlmann. [n. d.]. CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis. ([n. d.])."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_31_1","unstructured":"Wikimedia Foundation. [n. d.]. Wikimedia Downloads. https:\/\/dumps.wikimedia.org"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"e_1_3_2_1_33_1","volume-title":"Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686","author":"Fu Chuanpu","year":"2023","unstructured":"Chuanpu Fu, Qi Li, and Ke Xu. 2023. Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686 (2023)."},{"key":"e_1_3_2_1_34_1","volume-title":"Learning to forget: Continual prediction with LSTM. Neural computation 12, 10","author":"Gers A","year":"2000","unstructured":"Felix\u00a0A Gers, J\u00fcrgen Schmidhuber, and Fred Cummins. 2000. Learning to forget: Continual prediction with LSTM. Neural computation 12, 10 (2000), 2451\u20132471."},{"key":"e_1_3_2_1_35_1","unstructured":"Jiajun Gong and Tao Wang. [n. d.]. Zero-delay Lightweight Defenses against Website Fingerprinting. ([n. d.])."},{"key":"e_1_3_2_1_36_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. 2020. Zero-delay lightweight defenses against website fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20). 717\u2013734."},{"key":"e_1_3_2_1_37_1","unstructured":"Harshita Gupta. [n. d.]. Kaggle 9GAG Hot Posts. https:\/\/www.kaggle.com\/datasets\/harshitagpt\/9gag-hot-posts"},{"key":"e_1_3_2_1_38_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In 25th USENIX Security Symposium (USENIX Security 16). 1187\u20131203."},{"volume-title":"Neural networks: a comprehensive foundation","author":"Haykin Simon","key":"e_1_3_2_1_39_1","unstructured":"Simon Haykin. 1994. Neural networks: a comprehensive foundation. Prentice Hall PTR."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0019"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365429"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0030-7"},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Machine Learning. PMLR, 9916\u20139937","author":"Jarrett Daniel","year":"2022","unstructured":"Daniel Jarrett, Bogdan\u00a0C Cebere, Tennison Liu, Alicia Curth, and Mihaela van\u00a0der Schaar. 2022. Hyperimpute: Generalized iterative imputation with automatic model selection. In International Conference on Machine Learning. PMLR, 9916\u20139937."},{"key":"e_1_3_2_1_44_1","volume-title":"Extensible machine learning for encrypted network traffic application labeling via uncertainty quantification","author":"Jorgensen Steven","year":"2023","unstructured":"Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andr\u00e9s Alejos, and Allan Wollaber. 2023. Extensible machine learning for encrypted network traffic application labeling via uncertainty quantification. IEEE Transactions on Artificial Intelligence (2023)."},{"key":"e_1_3_2_1_45_1","volume-title":"WTF-PAD: toward an efficient website fingerprinting defense for tor. CoRR, abs\/1512.00524","author":"Ju\u00e1rez Marc","year":"2015","unstructured":"Marc Ju\u00e1rez, Mohsen Imani, Mike Perry, Claudia D\u0131az, and Matthew Wright. 2015. WTF-PAD: toward an efficient website fingerprinting defense for tor. CoRR, abs\/1512.00524 (2015)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Marc Juarez Mohsen Imani Mike Perry Claudia Diaz and Matthew Wright. 2016. Toward an Efficient Website Fingerprinting Defense. http:\/\/arxiv.org\/abs\/1512.00524 arXiv:1512.00524 [cs].","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_2_1_48_1","volume-title":"Examples are not enough, learn to criticize! criticism for interpretability. Advances in neural information processing systems 29","author":"Kim Been","year":"2016","unstructured":"Been Kim, Rajiv Khanna, and Oluwasanmi\u00a0O Koyejo. 2016. Examples are not enough, learn to criticize! criticism for interpretability. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_49_1","volume-title":"International conference on machine learning. PMLR","author":"Koh Pang\u00a0Wei","year":"2017","unstructured":"Pang\u00a0Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In International conference on machine learning. PMLR, 1885\u20131894."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537907"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101851"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538732"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268960"},{"key":"e_1_3_2_1_59_1","volume-title":"A unified approach to interpreting model predictions. Advances in neural information processing systems 30","author":"Lundberg M","year":"2017","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_60_1","volume-title":"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.. In NDSS, Vol.\u00a011.","author":"Luo Xiapu","year":"2011","unstructured":"Xiapu Luo, Peng Zhou, Edmond\u00a0WW Chan, Wenke Lee, Rocky\u00a0KC Chang, Roberto Perdisci, 2011. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.. In NDSS, Vol.\u00a011."},{"key":"e_1_3_2_1_61_1","unstructured":"Xiapu Luo Peng Zhou Edmond W\u00a0W Chan Wenke Lee Rocky K\u00a0C Chang and Roberto Perdisci. [n. d.]. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. ([n. d.])."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179289"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Vasilios Mavroudis and Jamie Hayes. 2023. Adaptive Webpage Fingerprinting from TLS Traces. http:\/\/arxiv.org\/abs\/2010.10294","DOI":"10.1109\/DSN58367.2023.00049"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_8"},{"key":"e_1_3_2_1_65_1","unstructured":"Christoph Molnar. 2020. Interpretable machine learning. Lulu. com."},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Machine Learning. PMLR, 7130\u20137140","author":"Muzellec Boris","year":"2020","unstructured":"Boris Muzellec, Julie Josse, Claire Boyer, and Marco Cuturi. 2020. Missing data imputation using optimal transport. In International Conference on Machine Learning. PMLR, 7130\u20137140."},{"key":"e_1_3_2_1_67_1","unstructured":"Milad Nasr Alireza Bahramali and Amir Houmansadr. [n. d.]. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. ([n. d.])."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2018. RFC8439: ChaCha20 and Poly1305 for IETF Protocols. Technical Report RFC 8439. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8439 Available at https:\/\/datatracker.ietf.org\/doc\/html\/rfc8439.","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_74_1","volume-title":"What can data-centric AI learn from data and ML engineering?arXiv preprint arXiv:2112.06439","author":"Polyzotis Neoklis","year":"2021","unstructured":"Neoklis Polyzotis and Matei Zaharia. 2021. What can data-centric AI learn from data and ML engineering?arXiv preprint arXiv:2112.06439 (2021)."},{"key":"e_1_3_2_1_75_1","unstructured":"Tobias Pulls. 2020. Towards Effective and Efficient Padding Machines for Tor. http:\/\/arxiv.org\/abs\/2011.13471 arXiv:2011.13471 [cs]."},{"volume-title":"Dataset shift in machine learning","author":"Quinonero-Candela Joaquin","key":"e_1_3_2_1_76_1","unstructured":"Joaquin Quinonero-Candela, Masashi Sugiyama, Anton Schwaighofer, and Neil\u00a0D Lawrence. 2008. Dataset shift in machine learning. Mit Press."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446 Available at https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_79_1","unstructured":"Eric Rescorla. 2023. TLS Encrypted Client Hello. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-esni\/ Available at https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-esni\/."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_82_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Seedat Nabeel","year":"2022","unstructured":"Nabeel Seedat, Jonathan Crabb\u00e9, and Mihaela van\u00a0der Schaar. 2022. Data-SUITE: Data-centric identification of in-distribution incongruous examples. In International Conference on Machine Learning. PMLR, 19467\u201319496."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521272"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761167"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"e_1_3_2_1_86_1","volume-title":"You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses. arXiv preprint arXiv:2203.07806","author":"Siby Sandra","year":"2022","unstructured":"Sandra Siby, Ludovic Barman, Christopher Wood, Marwan Fayed, Nick Sullivan, and Carmela Troncoso. 2022. You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses. arXiv preprint arXiv:2203.07806 (2022)."},{"key":"e_1_3_2_1_87_1","volume-title":"arXiv preprint arXiv:1906.09682","author":"Siby Sandra","year":"2019","unstructured":"Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, and Carmela Troncoso. 2019. Encrypted DNS\u2013> Privacy? A traffic analysis perspective. arXiv preprint arXiv:1906.09682 (2019)."},{"key":"e_1_3_2_1_88_1","volume-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv","author":"Simonyan Karen","year":"2013","unstructured":"Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2019. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv 2013. arXiv preprint arXiv:1312.6034 (2019)."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_2_1_91_1","unstructured":"Jean-Pierre Smith Luca Dolfi Prateek Mittal and Adrian Perrig. [n. d.]. QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. ([n. d.])."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647128"},{"key":"e_1_3_2_1_93_1","volume-title":"Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic. In Network and distributed system security symposium (NDSS), Vol.\u00a027.","author":"Van\u00a0Ede Thijs","year":"2020","unstructured":"Thijs Van\u00a0Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel\u00a0J Dubois, Martina Lindorfer, David Choffnes, Maarten van Steen, and Andreas Peter. 2020. Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic. In Network and distributed system security symposium (NDSS), Vol.\u00a027."},{"key":"e_1_3_2_1_94_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_95_1","volume-title":"Proceedings of the Web Conference","author":"Wang Kailong","year":"2021","unstructured":"Kailong Wang, Junzhe Zhang, Guangdong Bai, Ryan Ko, and Jin\u00a0Song Dong. 2021. It\u2019s not just the site, it\u2019s the contents: intra-domain fingerprinting social media websites through CDN bursts. In Proceedings of the Web Conference 2021. 2142\u20132153."},{"key":"e_1_3_2_1_96_1","unstructured":"Tao Wang Xiang Cai Rishab Nithyanand Rob Johnson and Ian Goldberg. [n. d.]. Effective Attacks and Provable Defenses for Website Fingerprinting. ([n. d.])."},{"key":"e_1_3_2_1_97_1","unstructured":"Tao Wang and Ian Goldberg. [n. d.]. Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting. ([n. d.])."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.05.018"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-022-00775-9"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607437"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162940"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3179955"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108538"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1080\/07350015.2019.1624293"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '24","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":102,"alternative-id":["10.1145\/3678890.3678910","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678910","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}