{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:31Z","timestamp":1759335631114,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,13]]},"DOI":"10.1109\/cdc49753.2023.10383774","type":"proceedings-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T13:38:36Z","timestamp":1705671516000},"page":"7546-7553","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Cavorsi","sequence":"first","affiliation":[{"name":"School of Engineering and Applied Sciences, Harvard University,Cambridge,MA,USA"}]},{"given":"Frederik","family":"Mallmann-Trenn","sequence":"additional","affiliation":[{"name":"King&#x0027;s College,Department of Informatics,London,UK"}]},{"given":"David","family":"Salda\u00f1a","sequence":"additional","affiliation":[{"name":"Lehigh University,Autonomous and Intelligent Robotics Laboratory -AIRLab-,Bethlehem,PA,USA"}]},{"given":"Stephanie","family":"Gil","sequence":"additional","affiliation":[{"name":"School of Engineering and Applied Sciences, Harvard University,Cambridge,MA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5772\/57313"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3303848"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2921513"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3178294"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2017.2720800"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15607\/rss.2022.xviii.053"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-017-9621-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2014.6906590"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28872-7_10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992744"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2021.3089033"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2021.3088054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9993343"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2024997"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2017.2705044"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-010-0004-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10160385"},{"issue":"1\u201346","key":"ref19","first-page":"4","article-title":"Random walks on graphs","volume":"2","author":"Lovasz","year":"1993","journal-title":"Combinatorics, Paul erdos is eighty"},{"volume-title":"Reversible markov chains and random walks on graphs","year":"2002","author":"Aldous","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2013.05.020"},{"key":"ref22","article-title":"The meeting time of multiple random walks","volume-title":"arXiv preprint","author":"George","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511701337"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511813603"},{"key":"ref26","article-title":"On coalescence time in graphs-when is coalescing as fast as meeting?","volume":"abs\/1611.02460","author":"Kanade","year":"2016","journal-title":"CoRR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1090\/mbk\/058"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975505.13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90214-i"},{"key":"ref30","article-title":"Dynamic crowd vetting: Collaborative detection of malicious robots in dynamic communication networks","author":"Cavorsi","year":"2023","journal-title":"ArXiv"}],"event":{"name":"2023 62nd IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2023,12,13]]},"location":"Singapore, Singapore","end":{"date-parts":[[2023,12,15]]}},"container-title":["2023 62nd IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10383192\/10383193\/10383774.pdf?arnumber=10383774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T11:47:21Z","timestamp":1706010441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10383774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cdc49753.2023.10383774","relation":{},"subject":[],"published":{"date-parts":[[2023,12,13]]}}}