Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Tab 2
/
Research Article
Deep Nearest Neighbor Website Fingerprinting Attack Technology
Table 2
In a closed-world environment, the performance (accuracy) of the CUMUL, k-FP, TF, and DNNF models when the number of examples
N
ā=ā[1, 5, 10, 15, 20].
Type of experiment
Number of examples
N
1
5
10
15
20
CUMUL
k-FP
TF
DNNF
41.7
35.7
79.1
78.3
72.3
78.4
92.4
92.7
77.9
84.1
93.9
94.3
81.4
86.2
94.1
95.6
84.9
87.8
94.5
96.2