{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T13:42:04Z","timestamp":1777297324549,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"name":"National Key Research and Development Program of China","award":["2023YFC2206402"],"award-info":[{"award-number":["2023YFC2206402"]}]},{"name":"the Strategic Priority Research Program of the Chinese Academy of Sciences","award":["XDA0460100"],"award-info":[{"award-number":["XDA0460100"]}]},{"name":"Open Foundation of Key Laboratory of Cyberspace Security, Ministry of Education of China","award":["KLCS20240206"],"award-info":[{"award-number":["KLCS20240206"]}]},{"name":"the Program of Key Laboratory of Network Assessment Technology, the Chinese Academy of Sciences","award":["N&#x5c;&#x2f;A"],"award-info":[{"award-number":["N&#x5c;&#x2f;A"]}]},{"name":"Program of Beijing Key Laboratory of Network Security and Protection Technology","award":["N&#x5c;&#x2f;A"],"award-info":[{"award-number":["N&#x5c;&#x2f;A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3774904.3792410","type":"proceedings-article","created":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T12:38:33Z","timestamp":1777293513000},"page":"3018-3029","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["<scp>Forge:<\/scp>\n                    A Robust Multi-tab Website Fingerprinting Attack via Blind Source Separation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5987-1481","authenticated-orcid":false,"given":"Yitan","family":"Huang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-9466","authenticated-orcid":false,"given":"Wei","family":"Qiao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9270-5708","authenticated-orcid":false,"given":"Ding","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1867-0972","authenticated-orcid":false,"given":"Meng","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4874-6278","authenticated-orcid":false,"given":"Di","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4456-6261","authenticated-orcid":false,"given":"Linxu","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5249-5699","authenticated-orcid":false,"given":"Susu","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7185-990X","authenticated-orcid":false,"given":"Bo","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2552-6231","authenticated-orcid":false,"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9851-5548","authenticated-orcid":false,"given":"Baoxu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616639"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.720250"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21103514"},{"key":"e_1_3_2_1_7_1","first-page":"753","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world. In 31st USENIX Security Symposium (USENIX Security 22). 753-770."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329802"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670272"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179464"},{"key":"e_1_3_2_1_13_1","volume-title":"Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium (USENIX Security 04)","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/tor-second-generation-onion-router"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560604"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","volume":"33","author":"Gilpin William","year":"2020","unstructured":"William Gilpin. 2020. Deep Reconstruction of Strange Attractors from Time Series. In Advances in Neural Information Processing Systems (NeurIPS), Vol. 33."},{"key":"e_1_3_2_1_16_1","first-page":"717","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. 2020. Zero-delay lightweight defenses against website fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20). 717-734."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833722"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485891"},{"key":"e_1_3_2_1_19_1","volume-title":"Regulator: A straightforward website fingerprinting defense. arXiv preprint arXiv:2012.06609","author":"Holland James K","year":"2020","unstructured":"James K Holland and Nicholas Hopper. 2020. Regulator: A straightforward website fingerprinting defense. arXiv preprint arXiv:2012.06609 (2020)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623107"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_22_1","first-page":"1139","volume-title":"25th USENIX Security Symposium (USENIX Security '16)","author":"Juarez Marc","year":"2016","unstructured":"Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Mario Grattafiori. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security '16). USENIX Association, Austin, TX, USA, 1139-1154."},{"key":"e_1_3_2_1_23_1","volume-title":"WTF-PAD: toward an efficient website fingerprinting defense for tor. CoRR, abs\/1512.00524","author":"Ju\u00e1rez Marc","year":"2015","unstructured":"Marc Ju\u00e1rez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2015. WTF-PAD: toward an efficient website fingerprinting defense for tor. CoRR, abs\/1512.00524 (2015)."},{"key":"e_1_3_2_1_24_1","first-page":"519","article-title":"AUC: a statistically consistent and more discriminating measure than accuracy","volume":"3","author":"Ling Charles X","year":"2003","unstructured":"Charles X Ling, Jin Huang, Harry Zhang, et al., 2003. AUC: a statistically consistent and more discriminating measure than accuracy. In Ijcai, Vol. 3. 519-524.","journal-title":"Ijcai"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080834"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833801"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068819"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Andriy Panchenko Fabian Lanze Andreas Zinnen Martin Henze Jan Pennekamp Klaus Wehrle and Thomas Engel. 2016. Website Fingerprinting at Internet Scale. doi:10.14722\/ndss.2016.23477","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"e_1_3_2_1_31_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2017","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)."},{"key":"e_1_3_2_1_32_1","volume-title":"Subverting website fingerprinting defenses with robust traffic representation (SEC '23)","author":"Shen Meng","unstructured":"Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, and Ke Xu. 2023. Subverting website fingerprinting defenses with robust traffic representation (SEC '23). USENIX Association, USA, Article 35, 18 pages."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00247"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1063\/5.0137223"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0040"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796703"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00015"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In Proceedings of the 23rd USENIX Conference on Security Symposium (San Diego, CA) (SEC'14). USENIX Association, USA, 143\u2013157."},{"key":"e_1_3_2_1_40_1","first-page":"1375","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. : An efficient defense against passive website fingerprinting attacks. In 26th USENIX Security Symposium (USENIX Security 17). 1375-1390."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607437"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420089653.ch3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3104869"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690211"}],"event":{"name":"WWW '26: The ACM Web Conference 2026","location":"Dubai United Arab Emirates","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2026"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3774904.3792410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T12:56:17Z","timestamp":1777294577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774904.3792410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,12]]},"references-count":44,"alternative-id":["10.1145\/3774904.3792410","10.1145\/3774904"],"URL":"https:\/\/doi.org\/10.1145\/3774904.3792410","relation":{},"subject":[],"published":{"date-parts":[[2026,4,12]]},"assertion":[{"value":"2026-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}