Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Table 3

Two WF data sets used by our experiments.

Data set nameLabelsTraining flows (K)Testing flows (K)

Sirinam9571
Rimmer90050.8