{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:01:47Z","timestamp":1773378107820,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834378","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"2862-2867","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks"],"prefix":"10.1109","author":[{"given":"Mahshad","family":"Shariatnasab","sequence":"first","affiliation":[{"name":"North Dakota State University"}]},{"given":"Farhad","family":"Shirani","sequence":"additional","affiliation":[{"name":"North Dakota State University"}]},{"given":"Zahid","family":"Anwar","sequence":"additional","affiliation":[{"name":"North Dakota State University"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321628"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"ref12","article-title":"Verizon might be collecting your browsing history and here&#x2019;s how to stop it","author":"roth","year":"2021","journal-title":"The Verge"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262775"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437739"},{"key":"ref15","article-title":"Fundamental privacy limits in bipartite networks under active attacks","author":"shariatnasab","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/S0021900200013863"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/zamm.19230030407"},{"key":"ref18","first-page":"10","article-title":"Data transmission over a discrete channel with feedback. random transmission time","volume":"12","author":"burnashev","year":"1976","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/79\/28001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885436"},{"key":"ref27","article-title":"Browser history re: visited","author":"smith","year":"2018","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006631"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974669"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/S0021900200012274"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3098593.3098602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100307"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.025102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464514"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548314000364"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.10023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834378"},{"key":"ref23","author":"titchmarsh","year":"1986","journal-title":"The theory of the Riemann Zeta-Function"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOS1144"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834378.pdf?arnumber=9834378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:20Z","timestamp":1773347780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834378","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}