Research Article
Few-Shot Website Fingerprinting Attack with Data Augmentation
Algorithm 1
Data augmentation optimization.
| Input: A training , and validation set. | | Output: Data augmentation with optimal parameters . | | 1: Setting = (empty set); | | 2: Sequencing data augmentation operations randomly; | | 3: while Enumerating augmentation operations do | | 4: Get the search space of current augmentation ; | | 5: Using TPE on to obtain the optimal parameter , with the model trained by and ; | | 6: | | 7: end while | | 8: return |
|