I haven’t seen any Tor security research papers making that argument.
In active end-to-end correlation attacks by a global adversary, traffic, timing is measures and manipulated at both ends. The crude way to imagine this (which is not how it needs to be done) is to completely block all internet connections at one or multiple user’s side and then looking at remote server side if the download/communication stops. If so, then that’s a confirmation.
So no, I don’t think bridges help here.
See:
Configure (Private) (Obfuscated) Tor Bridges chapter Intended User Groups in Whonix wiki
My answer here also applies:
Unspecific to Whonix.