Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Figure 4

The protection success rate of FGSM as bandwidth overhead changes.