Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.1016/j.comnet.2021.108298
|View full text |Cite
|
Sign up to set email alerts
|

Few-shot website fingerprinting attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…With the anonymized network traffic data of the single webpage as the input, different WF attacks have been proposed. They can be mainly divided into three categories: traditional ST-WFA [4][5][6][9][10][11], deep learning based ST-WFA [3,7,8,12] and few-shot ST-WFA [13][14][15].…”
Section: Single-tab Wf Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…With the anonymized network traffic data of the single webpage as the input, different WF attacks have been proposed. They can be mainly divided into three categories: traditional ST-WFA [4][5][6][9][10][11], deep learning based ST-WFA [3,7,8,12] and few-shot ST-WFA [13][14][15].…”
Section: Single-tab Wf Attackmentioning
confidence: 99%
“…Deep models often need a large number of training data, which could be difficult to collect in many cases. To overcome this challenge, few-shot learning has been introduced with representative works including TF [13], TLFA [14], and HDA [15]. In particular, TLFA can achieve over 90% accuracy with only one sample per new website through knowledge reuse of seen websites.…”
Section: Single-tab Wf Attackmentioning
confidence: 99%
See 3 more Smart Citations