共 56 条
[1]
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]
Agarap A.F, 2018, Deep learning using rectified linear units (relu), P2
[4]
[Anonymous], 2018, TOR DEV TOR METRICS
[5]
[Anonymous], 2000, NIPS
[6]
[Anonymous], 2016, MULTISCALE CONTEXT A
[7]
Bhat Sanjit, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P292, DOI 10.2478/popets-2019-0070
[8]
Bissias GD, 2006, LECT NOTES COMPUT SC, V3856, P1
[9]
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[10]
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:227-238