{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:00:51Z","timestamp":1757628051137,"version":"3.44.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,2]]},"DOI":"10.1109\/iwqos65803.2025.11143275","type":"proceedings-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:29:52Z","timestamp":1757438992000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Sedative: Pacify the Online Social Networks Under Hijacking-Based Troll Attacks"],"prefix":"10.1109","author":[{"given":"Wen","family":"Ma","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]},{"given":"Zhiyi","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]},{"given":"Haohua","family":"Du","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]},{"given":"Xiaoyu","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-76799-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-021-00818-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326034"},{"key":"ref4","volume-title":"Hammering hirak: Exposing a multiyear effort to manipulate algeria\u2019s online political discourse and suppress dissident voices","author":"Ira","year":"2021"},{"key":"ref5","volume-title":"Disclosing networks of state-linked information operations","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3131416"},{"key":"ref7","volume-title":"Twitter ceo jack dorsey account hacked","author":"Wong","year":"2019"},{"key":"ref8","volume-title":"New york post hacked with offensive headlines targeting politicians","author":"Gatlan","year":"2022"},{"key":"ref9","volume-title":"Over 15,000 hacked roku accounts sold for 50 \u03d5 each to buy hardware","author":"Toulas","year":"2024"},{"key":"ref10","volume-title":"The propaganda pipeline: The isis fuouaris upload network on facebook","author":"Ayad","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3391403.3399490"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2009.2105"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms2939"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1990.9990069"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-023-00676-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"issue":"290-297","key":"ref17","first-page":"18","article-title":"On random graphs i","volume":"6","author":"Erd\u00f6s","year":"1959","journal-title":"Publ. math. debrecen"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662064"},{"key":"ref19","volume-title":"SNAP Datasets: Stanford large network dataset collection","author":"Leskovec","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2009.68"}],"event":{"name":"2025 IEEE\/ACM International Symposium on Quality of Service (IWQoS)","location":"Gold Coast, Australia","start":{"date-parts":[[2025,7,2]]},"end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE\/ACM 33rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11143240\/11143247\/11143275.pdf?arnumber=11143275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:30:29Z","timestamp":1757482229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwqos65803.2025.11143275","relation":{},"subject":[],"published":{"date-parts":[[2025,7,2]]}}}