共 34 条
[1]
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]
[Anonymous], ALEXA TOP SITES
[3]
[Anonymous], 2018, 6 INT C LEARNING REP
[4]
[Anonymous], TOR PROJECT
[5]
[Anonymous], P INT C LEARN REPR
[6]
[Anonymous], 2009, P 2009 ACM WORKSH CL
[7]
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:227-238
[8]
Cai Xiang, 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[9]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[10]
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:332-346