supported partially by the National Natural Science Foundation of China(Nos.62172378,61572448,and 61827810);by the National Key Research and Development Program of China(No.2020YFB1707701).
Recent advancements in deep learning(DL)have introduced new security challenges in the form of side-channel attacks.A prime example is the website fingerprinting attack(WFA),which targets anonymity networks like Tor,e...
supported by the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026);the funding of Key Laboratory of Mobile Application Innovation and Governance Technology,Ministry of Industry and Information Technology(2023IFS080601-K).
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea...
the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...
Sentiment analysis is a method to identify and understand the emotion in the text through NLP and text analysis. In the era of information technology, there is often a certain error between the comments on the movie w...
supported by the National Social Science Fund of China(23BGL272)。
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...
This work was supported in part by the National Natural Science Foundation of China(Nos.62102084 and 62072103);Jiangsu Provincial Natural Science Foundation of China(No.BK20190340);Jiangsu Provincial Key R&D Program(Nos.BE2021729,BE2022680,and BE2022065-4);Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201);Key Laboratory of Computer Network and Information Integration of Ministry of Education of China(No.93K-9).
Website Fingerprinting(WF)attacks can extract side channel information from encrypted traffic to form a fingerprint that identifies the victim’s destination website,even if traffic is sophisticatedly anonymized by To...
Phishing is the easiest method for gathering sensitive information from unwary people.Phishers seek to get private data including passwords,login information,and bank account details.Cyber security experts are activel...
Shifting to negativity is more and more prevalent in online communities and may play a key role in group polarization.While current research indicates a close relationship between group polarization and negative senti...
This work was supported by the 2021 High Quality Curriculum Construction and Innovation and Entrepreneurship Education Reform Project for Undergraduate Education at the School Level:Web Design and Website Construction(Project number:5071700304C8).
In this article,the shortcomings of the existing assessment method used in Web Design and Website Construction course are analyzed,and the assessment method is optimized based on the practice of project-based teaching...
supported by Zhejiang Provincial Natural Science Foundation of China(Grant No.LGF20G030001);Ministry of Public Security Science and Technology Plan Project(2022LL16);Key scientific research projects of agricultural and social development in Hangzhou in 2020(202004A06).
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi...