Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Figure 1

The main process of flow correlation attack on Tor. The adversary intercepts Tor flows either by running malicious Tor relays or eavesdropping on Internet ASes and IXPs.