Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Figure 3

Compare full-duplex with simplex mode under the same conditions.