{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:12:53Z","timestamp":1769746373495,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10447587","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"4535-4539","source":"Crossref","is-referenced-by-count":2,"title":["Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social Network"],"prefix":"10.1109","author":[{"given":"Yu","family":"Bu","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, HKSAR,Dept. of Computing"}]},{"given":"Yulin","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, HKSAR,Dept. of Computing"}]},{"given":"Longling","family":"Geng","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, HKSAR,Dept. of Computing"}]},{"given":"Kai","family":"Zhou","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, HKSAR,Dept. of Computing"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref2","volume-title":"Social networks and trust","volume":"30","author":"Buskens","year":"2002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484757"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2010.5606460"},{"issue":"3","key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2956185","article-title":"A survey of signed network mining in social media","volume":"49","author":"Tang","year":"2016","journal-title":"ACM Computing Surveys"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25652"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00286"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2424516"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IC3INA.2016.7863031"},{"key":"ref10","article-title":"The bitcoin network as platform for trans-organizational attribute authentication","author":"Cruz","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0033"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6029\/smartcr.2013.06.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"ref14","article-title":"Survey of sybil attacks in social networks","author":"Gunturu","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00173"},{"key":"ref17","article-title":"Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs","author":"Zhu","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref19","article-title":"Adversarial Attacks on Graph Neural Networks via Meta Learning","volume-title":"International Conference on Learning Representations (ICLR)","author":"Z\u00fcgner"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00006"},{"key":"ref21","first-page":"1115","article-title":"Adversarial attack on graph structured data. In International conference on machine learning","author":"Dai","year":"2018","journal-title":"PMLR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icnc59896.2024.10556322"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3201243"},{"key":"ref24","author":"Zhang","year":"2009","journal-title":"Six degrees of separation in online society."}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2024,4,14]]},"end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10447587.pdf?arnumber=10447587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T05:50:46Z","timestamp":1722577846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10447587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10447587","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}