共 39 条
[12]
Dai SF, 2013, IEEE INFOCOM SER, P809
[13]
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[14]
DINGLEDINE R., 2004, TECH REP DTIC DOCUME
[15]
Dougherty J., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P194
[16]
Dudorov Dmitry, 2013, 2013 European Intelligence and Security Informatics Conference (EISIC), P38, DOI 10.1109/EISIC.2013.13
[17]
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:332-346
[18]
Gu XD, 2015, INT C COMP SUPP COOP, P234, DOI 10.1109/CSCWD.2015.7230964
[19]
Haque A, 2016, AAAI CONF ARTIF INTE, P1652
[20]
Haque A, 2016, PROC INT CONF DATA, P481, DOI 10.1109/ICDE.2016.7498264