共 31 条
- [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
- [2] Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
- [3] [Anonymous], 2015, STANDFORD CS224D REP
- [4] Bhat Sanjit, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P292, DOI 10.2478/popets-2019-0070
- [5] Cai X., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES'14, P121
- [6] Cai X., 2012, ACM Conference on Computer and Communications Security (CCS '12), P605
- [7] A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 227 - 238
- [8] Chollet F., 2015, KERAS
- [9] Revisiting Assumptions for Website Fingerprinting Attacks [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 328 - 339
- [10] Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1579 - 1584