Computer Science ›› 2025, Vol. 52 ›› Issue (3): 391-399.doi: 10.11896/jsjkx.240100151
• Information Security • Previous Articles Next Articles
SUI Jiaqi1, HU Hongchao1,2, SHI Xin2, ZHOU Dacheng2, CHEN Shangyu2
CLC Number:
| [1]KARUNANAYAKE I,AHMED N,MALANEY R,et al.De-anonymisation Attacks on Tor:A Survey[J].IEEE Communications Surveys & Tutorials,2021,23(4):2324-2350. [2]NASR M,BAHRAMALI A,HOUMANSADR A.Deepcorr:Strong flow correlation attacks on tor using deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1962-1976. [3]KOHLS K,JANSEN K,RUPPRECHT D,et al.On the Challenges of Geographical Avoidance for Tor[C]//NDSS.2019. [4]SUN Y X,EDMUNDSON A,VANBEVER L,et al.RAPTOR:Routing attacks on privacy in Tor[C]//24th USENIX Security Symposium(USENIX Security 15).2015:271-286. [5]RIMMER V,PREUVENEERS D,JUAREZ M,et al.Automated website fingerprinting through deep learning[J].arXiv:1708.06376,2017. [6]SIRINAM P,IMANI M,JUAREZ M,et al.Deep fingerprinting:Undermining website fingerprinting defenses with deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1928-1943. [7]LI S,GUO H J,HOPPER N.Measuring information leakage in website fingerprinting attacks and defenses[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1977-1992. [8]WINTER P,ENSAFI R,LOESING K,et al.Identifying andcharacterizing Sybils in the Tor network[C]//25th USENIX Security Symposium(USENIX Security 16).2016:1169-1185. [9]ZHANG W Y.Research and Implementation of Tor Network path selection strategy against sybil attacks[D].Beijing:Beijing University of Posts and Telecommunications,2020. [10]FENG Q,XIA Y M,YAO W B,et al.Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention[C]//2023 IEEE Symposium on Computers and Communications(ISCC).IEEE,2023:1242-1247. [11]JOHNSON A,JANSEN R,JAGGARD A D,et al.Avoiding the man on the wire:Improving Tor’s security with trust-aware path selection[J].arXiv:1511.05453,2017. [12]LV M,ZHU Y F,LIN W.Dynamic Routing Algorithm Based on Bandwidth of Anonymous Network[J].Journal of Information Engineering University,2019,20(5):591-596. [13]HANLEY H,SUN Y X,WAGH S,et al.DPSelect:A Differential Privacy Based Guard Relay Selection Algorithm for Tor[J].Proceedings on Privacy Enhancing Technologies,2019,2:166-186. [14]ZHAO H,WANG L M,SHEN T H,et al.Survey on Anonymity Metrics in Communication Network[J].Journal of Software,2021,32(1):218-245. [15]EVERS B,HOLS J,KULA E,et al.Thirteen years of Tor attacks[EB/OL].https://github.com/Attacks-on-Tor/Attacks-on-Tor/blob/master/Thirteen%20years%20of%20Tor%20Atta-cks.pdf. [16]YE L,YU X Z,ZHAO J D,et al.Deciding your own anonymity:User-oriented node selection in I2P[J].IEEE Access,2018,6:71350-71359. [17]YANG M,ZHANG Y T,LUO J Z.Randomized bandwidthweighted node selection algorithm for anonymous communication[J].Journal of Southeast University(Natural Science Edition),2010,40(6):1169-1173. [18]JOHNSON A,WACEK C,JANSEN R,et al.Users get routed:Traffic correlation on Tor by realistic adversaries[C]//Procee-dings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.2013:337-348 |
| [1] | LIU Hongjian, ZOU Danping, LI Ping. Pedestrian Trajectory Prediction Method Based on Graph Attention Interaction [J]. Computer Science, 2026, 53(1): 97-103. |
| [2] | CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2026, 53(1): 395-403. |
| [3] | ZHANG Xiaomin, ZHAO Junzhi, HE Hongjie. Screen-shooting Resilient Watermarking Method for Document Image Based on Attention Mechanism [J]. Computer Science, 2026, 53(1): 413-422. |
| [4] | LUO Chi, LU Lingyun, LIU Fei. Partial Differential Equation Solving Method Based on Locally Enhanced Fourier NeuralOperators [J]. Computer Science, 2025, 52(9): 144-151. |
| [5] | HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang. Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [J]. Computer Science, 2025, 52(9): 160-169. |
| [6] | HAN Lin, DING Yongqiang, CUI Pingfei, LIU Haohao, LI Haoran, CHEN Mengyao. SLP Vectorization Across Basic Blocks Based on Region Partitioning [J]. Computer Science, 2025, 52(9): 186-194. |
| [7] | DENG Jiayan, TIAN Shirui, LIU Xiangli, OUYANG Hongwei, JIAO Yunjia, DUAN Mingxing. Trajectory Prediction Method Based on Multi-stage Pedestrian Feature Mining [J]. Computer Science, 2025, 52(9): 241-248. |
| [8] | WANG Yuanlong, ZHANG Ningqian, ZHANG Hu. Visual Storytelling Based on Planning Learning [J]. Computer Science, 2025, 52(9): 269-275. |
| [9] | CHEN Jintao, LIN Bing, LIN Song, CHEN Jing, CHEN Xing. Dynamic Pricing and Energy Scheduling Strategy for Photovoltaic Storage Charging Stations Based on Multi-agent Deep Reinforcement Learning [J]. Computer Science, 2025, 52(9): 337-345. |
| [10] | WANG Limei, HAN Linrui, DU Zuwei, ZHENG Ri, SHI Jianzhong, LIU Yiqun. Privacy Policy Compliance Detection Method for Mobile Application Based on Large LanguageModel [J]. Computer Science, 2025, 52(8): 1-16. |
| [11] | MIAO Zhuqing, HAN Jingyu, LI Caiyun, WANG Yanzhi, MAO Yi, ZHANG Yiting. Douglas-Peuker Algorithm Based Learned Index Structure for Road Network Trajectroy Data [J]. Computer Science, 2025, 52(8): 136-145. |
| [12] | YUAN Youwen, JIN Shuo, ZHAO Xi. IBSNet:A Neural Implicit Field for IBS Prediction in Single-view Scanned Point Cloud [J]. Computer Science, 2025, 52(8): 195-203. |
| [13] | YE Miao, WANG Jue, JIANG Qiuxiang, WANG Yong. SDN-based Integrated Communication and Storage Edge In-network Storage Node Selection Method [J]. Computer Science, 2025, 52(8): 343-353. |
| [14] | WANG Wei, ZHAO Yunlong, PENG Xiaoyu, PAN Xiaodong. TSK Fuzzy System Enhanced by TSVR with Cooperative Parameter Optimization [J]. Computer Science, 2025, 52(7): 75-81. |
| [15] | LIU Yajun, JI Qingge. Pedestrian Trajectory Prediction Based on Motion Patterns and Time-Frequency Domain Fusion [J]. Computer Science, 2025, 52(7): 92-102. |
|
||