We believe that there exist classic anonymity papers which are worth reading regardless of their application domain. Rather than providing overwhelming amount of papers, we would like to provide a curated list of the awesome anonymity papers which are considered as must-reads in certain research domains.
A list of anonymity papers published from 2012 to 2025.
-
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
-
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
-
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- 2025 | xxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
-
- 2025 | MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification,
PDF
- 2024 | NetMamba: Efficient Network Traffic Classification via Pre-training Unidirectional Mamba
PDF
- 2024 | TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation,
PDF
- 2024 | Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning,
PDF
- 2024 | FOCI, Extended Abstract: Traffic Splitting for Pluggable Transports,
PDF
- 2024 | Wireless Networks, Updated exploration of the Tor network: advertising, availability and protocols of onion services,
PDF
- 2024 | N/A, GFWeb: Measuring the Great Firewall’s Web Censorship at Scale,
PDF
- 2024 | ICICS, TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training,
PDF
- 2024 | Communications of the ACM, OpenVPN is Open to VPN Fingerprinting,
PDF
- 2023 | Computers & Security, Detection of Obfuscated Tor Traffic Based on Bidirectional Generative Adversarial Networks and Vision Transform,
PDF
- 2023 | IEEE Transactions on Information Forensics and Security, Exploring Uncharted Waters of Website Fingerprinting,
PDF
- 2021 | ICEA, Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario,
PDF
- 2019 | ICDIS, Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering,
PDF
- 2019 | IEEE Conference on Computer Communications Workshops, FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition,
PDF
- 2018 | IEEE International Conference on Knowledge Innovation and Invention (ICKII), Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network,
PDF
- 2017 | IEEE International Conference on Big Data, Tor traffic analysis and detection via machine learning techniques,
PDF
- 2025 | MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification,
- AAAI, MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification,
PDF
- NDSS, MirageFlow: A New Bandwidth Inflation Attack on Tor,
PDF
- NDSS, Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum,
PDF
- Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning,
PDF
- FOCI, Extended Abstract: Traffic Splitting for Pluggable Transports,
PDF
- Wireless Networks, Updated exploration of the Tor network: advertising, availability and protocols of onion services,
PDF
- N/A, GFWeb: Measuring the Great Firewall’s Web Censorship at Scale,
PDF
- ICICS, TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training,
PDF
- ArXiv, TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation,
PDF
- ICNP, NetMamba: Efficient Network Traffic Classification via Pre-training Unidirectional Mamba
PDF
- Communications of the ACM, OpenVPN is Open to VPN Fingerprinting,
PDF
- IEEE Transactions on Information Forensics and Security, Exploring Uncharted Waters of Website Fingerprinting,
PDF
- Computers & Security, Detection of Obfuscated Tor Traffic Based on Bidirectional Generative Adversarial Networks and Vision Transform,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- NDSS, Detecting Tor Bridge from Sampled Traffic in Backbone Networks,
PDF
- ICEA, Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- IEEE Conference on Computer Communications Workshops, FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition,
PDF
- ICDIS, Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering,
PDF
- IEEE International Conference on Knowledge Innovation and Invention (ICKII), Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network,
PDF
- IEEE International Conference on Big Data, Tor traffic analysis and detection via machine learning techniques,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
- xxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,
PDF
(Thanks to @linwhitehat)
Chinese Academy of Sciences, University of Chinese Academy of Sciences/China
- Gang Xiong (Institute of Information Engineering)
- Kai Chen (Institute of Information Engineering)
- Qixu Liu (Institute of Information Engineering)
- Guozhu Meng (Institute of Information Engineering)
- Qingyun Liu (Institute of Information Engineering)
- Zhigang Lu (Institute of Information Engineering)
- Xiaodong Li (Institute of Computing Technology)
- Zhenyu Li (Institute of Computing Technology)
- Yujun Zhang (Institute of Computing Technology)
- Yuqing Zhang (School of Computer Science and Technology)
Tsinghua University/China
Zhejiang University/China
Harbin Institute of Technology/China
Beijing University of Posts and Telecommunications/China
Beijing Institute of Technology/China
Beihang University/China
Xi'an Jiaotong University/China
Shanghai Jiao Tong University/China
Others
- Guang Cheng (Southeast University/China)
- Fengwei Zhang (Southern University of Science and Technology/China)
- Qian Wang (Wuhan University/China)
- Min Yang (Fudan University/China)
- Shuguang Cui (The Chinese University of Hong Kong/China)
Overseas
- Xuemin (Sherman) Shen (University of Waterloo/Canada)
- Xiaofeng Wang (Indiana University Bloomington/United States)
- Tao Wang (Simon Fraser University/Canada)
- Ivan Martinovic (University of Oxford/United Kingdom)
- Amir Houmansadr (University of Massachusetts Amherst/United States)
- Giuseppe Aceto (Università di Napoli Federico II/Italy)
- Antonio Pescapè (Università di Napoli Federico II/Italy)
- Thorsten Holz (CISPA Helmholtz Center for Information Security/Germany)
- Mohammad Saidur Rahman (University of Texas at El Paso/United States)
- Yue Zhang (Drexel University/United States)
- Xinyu Xing (Northwestern University/United States)
- Yang Liu (Nanyang Technological University/Singapore)
- Alessandro Finamore (Huawei Technologies/France)
- Thijs van Ede (University of Twente/Netherlands)
Special thanks to everyone who contributed to this project.
Name | Bio |
---|---|
Qiang Zhang | PhD Student @SCU |
If you have any suggestions (missing papers, new papers, key researchers or typos), feel free to pull a request. Also you can mail to:
The source-code is licensed under the MIT license. See LICENSE.