{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T21:01:13Z","timestamp":1770325273082,"version":"3.49.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/noms59830.2024.10575874","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:23:51Z","timestamp":1719941031000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning"],"prefix":"10.1109","author":[{"given":"Shangdong","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University,Institute for Network Sciences and Cyberspace, BNRist"}]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Institute for Network Sciences and Cyberspace, BNRist"}]},{"given":"Chenglong","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,Institute for Network Sciences and Cyberspace, BNRist"}]},{"given":"Dongqi","family":"Han","sequence":"additional","affiliation":[{"name":"Tsinghua University,Institute for Network Sciences and Cyberspace, BNRist"}]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Institute for Network Sciences and Cyberspace, BNRist"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Quan Cheng Laboratory"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref2","article-title":"Servers - Tor Metrics","year":"2023"},{"key":"ref3","article-title":"Users - Tor Metrics","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref6","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref8","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref13","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shen"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"ref15","first-page":"753","article-title":"Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin"},{"key":"ref16","article-title":"Deep learning: A critical appraisal","author":"Marcus","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref19","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","volume-title":"Proceedings of the Asia-Pacific Advanced Network","volume":"42","author":"Abe"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.79"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"ref22","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"International conference on machine learning","author":"Finn"},{"issue":"3","key":"ref23","first-page":"4","article-title":"Reptile: a scalable meta-learning algorithm","volume":"2","author":"Nichol","year":"2018"},{"key":"ref24","article-title":"Optimization as a model for few-shot learning","volume-title":"International conference on learning representations","author":"Ravi"},{"issue":"7","key":"ref25","first-page":"23","article-title":"Meta-learning with temporal convolutions","volume":"2","author":"Mishra","year":"2017"},{"key":"ref26","article-title":"Meta-learning with warped gradient descent","volume-title":"International Conference on Learning Representations","author":"Flennerhag"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412416"},{"key":"ref28","first-page":"4171","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proceedings of NAACL-HLT","author":"Kenton"},{"key":"ref29","article-title":"Improving language understanding by generative pre-training","author":"Radford","year":"2018"},{"key":"ref30","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref31","article-title":"A closer look at few-shot classification","volume-title":"International Conference on Learning Representations","author":"Chen"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58583-9_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_16"},{"key":"ref34","article-title":"Neural turing machines","author":"Graves","year":"2014"},{"key":"ref35","article-title":"Memory networks","volume-title":"3rd International Conference on Learning Representations, ICLR 2015","author":"Weston"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19800-7_43"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref39","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"International conference on machine learning","author":"Chen"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19800-7_43"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.89"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"}],"event":{"name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,10]]}},"container-title":["NOMS 2024-2024 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574855\/10574897\/10575874.pdf?arnumber=10575874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T04:51:57Z","timestamp":1720241517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/noms59830.2024.10575874","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}