{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T05:08:33Z","timestamp":1777871313369,"version":"3.51.4"},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172042"],"award-info":[{"award-number":["62172042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.knosys.2026.115849","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T01:05:09Z","timestamp":1774487109000},"page":"115849","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Trackfficer: A few-shot website fingerprinting attack framework with robust traffic representation and quintuplet contrastive learning"],"prefix":"10.1016","volume":"342","author":[{"given":"Wenbiao","family":"Du","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3087-9701","authenticated-orcid":false,"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiuqi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zeyang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7597-1184","authenticated-orcid":false,"given":"Junbao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2026.115849_bib0001","series-title":"USENIX security symposium","first-page":"303","article-title":"Tor: the second-generation onion router","author":"Dingledine","year":"2004"},{"key":"10.1016\/j.knosys.2026.115849_bib0002","series-title":"Proceedings of the Internet Measurement Conference 2018","first-page":"175","article-title":"Understanding tor usage with privacy-preserving measurement","author":"Mani","year":"2018"},{"key":"10.1016\/j.knosys.2026.115849_bib0003","series-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","first-page":"127","article-title":"A tune-up for tor: improving security and performance in the tor network","author":"Snader","year":"2008"},{"key":"10.1016\/j.knosys.2026.115849_bib0004","series-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security","first-page":"31","article-title":"Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier","author":"Herrmann","year":"2009"},{"key":"10.1016\/j.knosys.2026.115849_bib0005","series-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1035","article-title":"Realistic website fingerprinting by augmenting network traces","author":"Bahramali","year":"2023"},{"key":"10.1016\/j.knosys.2026.115849_bib0006","series-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1050","article-title":"Transformer-based model for multi- tab website fingerprinting attack","author":"Jin","year":"2023"},{"key":"10.1016\/j.knosys.2026.115849_bib0007","doi-asserted-by":"crossref","first-page":"4022","DOI":"10.1002\/dac.4022","article-title":"Performance analysis of secure communications over correlated slow-fading additive white gaussian noise channels","volume":"32","author":"Khodadoust","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.knosys.2026.115849_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2024.102319","article-title":"Security analysis in generalized shotgun cellular systems over generalized composite fading channels","volume":"64","author":"Khodadoust","year":"2024","journal-title":"Phys. Commun."},{"key":"10.1016\/j.knosys.2026.115849_bib0009","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JIOT.2023.3275161","article-title":"Practical feature inference attack in vertical federated learning during prediction in artificial internet of things","volume":"11","author":"Yang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.knosys.2026.115849_bib0010","series-title":"2023 International Conference on Sustainable Communication Networks and Application (ICSCNA)","first-page":"104","article-title":"A logical cyber security enabled methodology design for identifying distributed denial of service attacks using enhanced learning princi- ples","author":"Karthiga","year":"2023"},{"key":"10.1016\/j.knosys.2026.115849_bib0011","series-title":"23rd USENIX Security Symposium (USENIX Security 14)","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"Wang","year":"2014"},{"key":"10.1016\/j.knosys.2026.115849_bib0012","series-title":"25th USENIX Security Symposium (USENIX Security 16)","first-page":"1187","article-title":"k-fingerprinting: a robust scalable website fingerprinting technique","author":"Hayes","year":"2016"},{"key":"10.1016\/j.knosys.2026.115849_bib0013","series-title":"Proceedings of the Network and Distributed System Security Symposium","article-title":"Website fingerprinting at internet scale","author":"Panchenko","year":"2016"},{"key":"10.1016\/j.knosys.2026.115849_bib0014","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"1005","article-title":"Robust multi-tab website fingerprinting attacks in the wild","author":"Deng","year":"2023"},{"key":"10.1016\/j.knosys.2026.115849_bib0015","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","author":"Shen","year":"2023"},{"key":"10.1016\/j.knosys.2026.115849_bib0016","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1928","article-title":"Deep fingerprinting: undermining website fingerprinting defenses with deep learning","author":"Sirinam","year":"2018"},{"key":"10.1016\/j.knosys.2026.115849_bib0017","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-3-319-45744-4_2","article-title":"Toward an efficient website fingerprinting defense","author":"Juarez","year":"2016"},{"key":"10.1016\/j.knosys.2026.115849_bib0018","series-title":"29th USENIX Security Symposium (USENIX Se- 20)","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","author":"Gong","year":"2020"},{"key":"10.1016\/j.knosys.2026.115849_bib0019","series-title":"26th USENIX Security Symposium (USENIX Security 17)","first-page":"1375","article-title":"Walkie-Talkie: an efficient defense against passive website fingerprinting attacks","author":"Wang","year":"2017"},{"key":"10.1016\/j.knosys.2026.115849_bib0020","series-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1971","article-title":"TrafficSliver: fighting website fingerprinting attacks with traffic splitting","author":"De la Cadena","year":"2020"},{"key":"10.1016\/j.knosys.2026.115849_bib0021","series-title":"30th USENIX Security Symposium (USENIX Security 21)","first-page":"2705","article-title":"Defeating DNN-based traffic analysis systems in real-time with blind adversarial perturbations","author":"Nasr","year":"2021"},{"key":"10.1016\/j.knosys.2026.115849_bib0022","series-title":"Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society","first-page":"103","article-title":"Website fingerprinting in onion routing based anonymization networks","author":"Panchenko","year":"2011"},{"key":"10.1016\/j.knosys.2026.115849_bib0023","series-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security","first-page":"605","article-title":"Touching from a distance: website fingerprinting attacks and defenses","author":"Cai","year":"2012"},{"key":"10.1016\/j.knosys.2026.115849_bib0024","first-page":"1","article-title":"Privacy intelligence: a survey on image privacy in online social networks","volume":"55","author":"Liu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.knosys.2026.115849_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2023.103825","article-title":"Disentangling different levels of GAN fingerprints for task-specific forensics","volume":"89","author":"Liu","year":"2024","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.knosys.2026.115849_bib0026","series-title":"Proceedings of the Asia-Pacific Advanced Network","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","author":"Abe","year":"2016"},{"key":"10.1016\/j.knosys.2026.115849_bib0027","series-title":"arXiv preprint","article-title":"Automated website fingerprinting through deep learning","author":"Rimmer","year":"2017"},{"key":"10.1016\/j.knosys.2026.115849_bib0028","series-title":"Proceedings on Privacy Enhancing Technologies","first-page":"5","article-title":"Tik-Tok: the utility of packet timing in website finger- printing attacks","author":"Rahman","year":"2020"},{"key":"10.1016\/j.knosys.2026.115849_bib0029","series-title":"arXiv preprint","article-title":"Causal fingerprints of AI generative models","author":"Xu","year":"2025"},{"key":"10.1016\/j.knosys.2026.115849_bib0030","series-title":"Proceedings on Privacy Enhancing Technologies","first-page":"305","article-title":"GANDaLF: GAN for data-limited fingerprinting","author":"Oh","year":"2021"},{"key":"10.1016\/j.knosys.2026.115849_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104125","article-title":"MW3F: improved multi-tab website fingerprinting attacks with transformer-based feature fusion","volume":"236","author":"Yuan","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.knosys.2026.115849_bib0032","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TIFS.2022.3158086","article-title":"SnWF: website fingerprinting attack by ensembling the snapshot of deep learning","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.knosys.2026.115849_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123236","article-title":"Relation-CNN: enhancing website fingerprinting attack with relation features and NFS-CNN","volume":"247","author":"Zou","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.knosys.2026.115849_bib0034","series-title":"Proceedings on Privacy Enhancing Technologies","first-page":"292","article-title":"Var-CNN: a data-efficient website fingerprinting attack based on deep learning","author":"Bhat","year":"2019"},{"key":"10.1016\/j.knosys.2026.115849_bib0035","series-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.knosys.2026.115849_bib0036","first-page":"1","article-title":"Few-shot website fingerprinting attack with data augmentation","volume":"2021","author":"Chen","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.knosys.2026.115849_bib0037","series-title":"2021 IEEE Symposium on Computers and Communications (ISCC)","first-page":"1","article-title":"Tripod: use data augmentation to enhance website fingerprinting","author":"Zhang","year":"2021"},{"key":"10.1016\/j.knosys.2026.115849_bib0038","series-title":"2022 IEEE International Performance, Computing, and Communications Conference (IPCCC)","first-page":"169","article-title":"TForm-RF: an efficient data augmentation for website fingerprinting attack","author":"Chen","year":"2022"},{"key":"10.1016\/j.knosys.2026.115849_bib0039","series-title":"Proceedings of the ACM Web Conference 2024","first-page":"1203","article-title":"Contrastive fingerprinting: a novel website fingerprinting attack over few-shot traces","author":"Xie","year":"2024"},{"key":"10.1016\/j.knosys.2026.115849_bib0040","series-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1131","article-title":"Triplet fingerprinting: more practical and portable website fingerprinting with N-shot learning","author":"Sirinam","year":"2019"},{"key":"10.1016\/j.knosys.2026.115849_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103796","article-title":"WF3A: a N-shot website fingerprinting with effective fusion feature attention","volume":"140","author":"Wang","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.knosys.2026.115849_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108298","article-title":"Few-shot website fingerprinting attack","volume":"198","author":"Chen","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.knosys.2026.115849_bib43","doi-asserted-by":"crossref","first-page":"8220","DOI":"10.1109\/TIFS.2024.3433586","article-title":"An adaptability-enhanced few-shot website fingerprinting attack based on collusion","volume":"19","author":"Tan","year":"2024","journal-title":"IEEE Trans. Inform. Forens. Sec."},{"key":"10.1016\/j.knosys.2026.115849_bib44","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109461","article-title":"An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance","volume":"219","author":"Zou","year":"2022","journal-title":"Comp. Netw."},{"key":"10.1016\/j.knosys.2026.115849_bib45","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109780","article-title":"Few-shot website fingerprinting attack with cluster adaptation","volume":"229","author":"Zhou","year":"2023","journal-title":"Comp. Netw."},{"issue":"6","key":"10.1016\/j.knosys.2026.115849_bib46","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1093\/comjnl\/bxae009","article-title":"Joint alignment networks for few-shot website fingerprinting attack","volume":"67","author":"Zhou","year":"2024","journal-title":"Comput. J."},{"key":"10.1016\/j.knosys.2026.115849_bib47","doi-asserted-by":"crossref","first-page":"108739","DOI":"10.1016\/j.patcog.2022.108739","article-title":"Few-shot website fingerprinting attack with meta-bias learning","volume":"130","author":"Chen","year":"2022","journal-title":"Patt. Recogn."},{"issue":"1","key":"10.1016\/j.knosys.2026.115849_bib48","first-page":"5399816","article-title":"Deep nearest neighbor website fingerprinting attack technology","volume":"2021","author":"Guo","year":"2021","journal-title":"Sec. Comm. Netw."},{"key":"10.1016\/j.knosys.2026.115849_bib49","article-title":"Toward an effective few-shot website fingerprinting attack with quadruplet networks and deep local fingerprinting features","author":"Zou","year":"2025","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"10.1016\/j.knosys.2026.115849_bib50","first-page":"9929","article-title":"Understanding contrastive representation learning through alignment and uniformity on the hypersphere","author":"Wang","year":"2020","journal-title":"Int. Conf. Machine Learn. PMLR"},{"key":"10.1016\/j.knosys.2026.115849_bib51","unstructured":"Holland J K, Hopper N. Regulator: A powerful website fingerprinting defense. arXiv preprint arXiv:2012.06609, 2020."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126005757?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126005757?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T17:12:48Z","timestamp":1777569168000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705126005757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":51,"alternative-id":["S0950705126005757"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115849","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trackfficer: A few-shot website fingerprinting attack framework with robust traffic representation and quintuplet contrastive learning","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115849","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115849"}}