Research Article
Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples
Figure 1
The main process of flow correlation attack on Tor. The adversary intercepts Tor flows either by running malicious Tor relays or eavesdropping on Internet ASes and IXPs.