Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Figure 2

The overview of our system and the entire process of protecting users to request websites from flow correlation attacks.