暂无分享,去创建一个
[1] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Vladlen Koltun,et al. Multi-Scale Context Aggregation by Dilated Convolutions , 2015, ICLR.
[3] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[4] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[5] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[6] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[7] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[8] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[9] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[10] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[11] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[12] Kaiming He,et al. Accurate, Large Minibatch SGD: Training ImageNet in 1 Hour , 2017, ArXiv.
[13] Mun Choon Chan,et al. Website Fingerprinting and Identification Using Ordered Feature Sequences , 2010, ESORICS.
[14] David D. Jensen,et al. Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.
[15] Wouter Joosen,et al. Automated Feature Extraction for Website Fingerprinting through Deep Learning. , 2017 .
[16] H. Cheng,et al. Traffic Analysis of SSL Encrypted Web Browsing , 1998 .
[17] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[18] Heiga Zen,et al. WaveNet: A Generative Model for Raw Audio , 2016, SSW.
[19] Xiang Cai,et al. Glove: A Bespoke Website Fingerprinting Defense , 2014, WPES.
[20] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[21] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[22] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[23] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[24] Mohsen Imani,et al. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.
[25] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[26] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.
[27] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[28] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[29] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[30] Claus Nebauer,et al. Evaluation of convolutional neural networks for visual recognition , 1998, IEEE Trans. Neural Networks.
[31] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[32] Alex Graves,et al. Decoupled Neural Interfaces using Synthetic Gradients , 2016, ICML.
[33] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[34] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[35] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.
[36] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[37] Shigeki Goto,et al. Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .
[38] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[39] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[40] Giovanni Cherubin,et al. Website Fingerprinting Defenses at the Application Layer , 2017, Proc. Priv. Enhancing Technol..
[41] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[43] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.