DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
暂无分享,去创建一个
Aminollah Khormali | DaeHun Nyang | Rhongho Jang | Ahmed Abusnaina | Ahmed A. Abusnaina | David A. Mohaisen | Rhongho Jang | Daehun Nyang | Aminollah Khormali
[1] Noorbakhsh Amiri Golilarz,et al. Control chart pattern recognition using RBF neural network with new training algorithm and practical features. , 2018, ISA transactions.
[2] Aziz Mohaisen,et al. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).
[3] Aziz Mohaisen,et al. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[4] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[5] Ke Liu,et al. On Improving TCP Performance over Mobile Data Networks , 2016, IEEE Transactions on Mobile Computing.
[6] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[8] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[9] Aziz Mohaisen,et al. Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems , 2019, CSoNet.
[10] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[11] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[12] Wouter Joosen,et al. Automated Website Fingerprinting through Deep Learning , 2017, NDSS.
[13] Mohsen Imani,et al. Adversarial Traces for Website Fingerprinting Defense , 2018, CCS.
[14] Mohsen Guizani,et al. Deep CNN-Based Real-Time Traffic Light Detector for Self-Driving Vehicles , 2020, IEEE Transactions on Mobile Computing.
[15] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[16] Mark Allman,et al. On the generation and use of TCP acknowledgments , 1998, CCRV.
[17] Mohsen Imani,et al. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.
[18] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.
[19] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[20] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[21] Srinivas Devadas,et al. DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows , 2018, WPES@CCS.
[22] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[23] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[24] Aziz Mohaisen,et al. AMAL: High-fidelity, behavior-based automated malware analysis and classification , 2014, Comput. Secur..
[25] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[26] Shigeki Goto,et al. Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .
[27] Aziz Mohaisen,et al. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach , 2019, IEEE Internet of Things Journal.
[28] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[29] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[30] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[31] Sanggil Kang,et al. Code authorship identification using convolutional neural networks , 2019, Future Gener. Comput. Syst..
[32] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[33] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[34] Aziz Mohaisen,et al. Large-Scale and Language-Oblivious Code Authorship Identification , 2018, CCS.