Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …
X Yang, T Wang, X Ren, W Yu - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The massive generation, extensive sharing, and deep exploitation of data in the big data era have raised unprecedented privacy threats. To address privacy concerns, various privacy …
In the era of big data, anonymity is recognized as an important attribute in privacy-preserving communications. The existing anonymous authentication and routing designs are applied at …
Z Ling, G Xiao, W Wu, X Gu, M Yang… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Website fingerprinting (WF) attacks allow an attacker to eavesdrop on the encrypted network traffic between a victim and an anonymous communication system so as to infer the real …
G He, M Yang, J Luo, X Gu - Concurrency and Computation …, 2015 - Wiley Online Library
Tor is a famous anonymous communication system for preserving users' online privacy. It supports TCP applications and packs upper‐layer application data into encrypted equal …
S Miller, K Curran, T Lunney - International Journal of Wireless …, 2020 - igi-global.com
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or …
M Yang, X Gu, Z Ling, C Yin… - Tsinghua Science and …, 2017 - ieeexplore.ieee.org
Tor is pervasively used to conceal target websites that users are visiting. A de- anonymization technique against Tor, referred to as website fingerprinting attack, aims to …