Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Table 6

Our system’s time consumption under the limited hardware environment.

Traffic consensusFGSMC&WDeepfoolBIM

Time (s)1205157547382283774858