Research Article

Deep Nearest Neighbor Website Fingerprinting Attack Technology

Figure 2

The model pretraining and attack process.