{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:55:26Z","timestamp":1775004926619,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000143","name":"NSF CISE","doi-asserted-by":"publisher","award":["CCF-1422278"],"award-info":[{"award-number":["CCF-1422278"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"NSF CISE","doi-asserted-by":"publisher","award":["CCF-1553452"],"award-info":[{"award-number":["CCF-1553452"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"NSF CISE","doi-asserted-by":"publisher","award":["CCF-1409135"],"award-info":[{"award-number":["CCF-1409135"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"SaTC","doi-asserted-by":"publisher","award":["CNS-1527754"],"award-info":[{"award-number":["CNS-1527754"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"ARO","doi-asserted-by":"publisher","award":["W911NF-14-1-0220"],"award-info":[{"award-number":["W911NF-14-1-0220"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"publisher","award":["556016"],"award-info":[{"award-number":["556016"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1705007"],"award-info":[{"award-number":["CCF-1705007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1718270"],"award-info":[{"award-number":["CCF-1718270"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Maryland Procurement Office","award":["H98230-14-C-C0141"],"award-info":[{"award-number":["H98230-14-C-C0141"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/tit.2017.2696960","type":"journal-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:11:35Z","timestamp":1493068295000},"page":"6679-6713","source":"Crossref","is-referenced-by-count":24,"title":["Hiding the Rumor Source"],"prefix":"10.1109","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7671-2624","authenticated-orcid":false,"given":"Giulia","family":"Fanti","sequence":"first","affiliation":[]},{"given":"Peter","family":"Kairouz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8975-8306","authenticated-orcid":false,"given":"Sewoong","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Kannan","family":"Ramchandran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3171-8667","authenticated-orcid":false,"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"singel","year":"2007","journal-title":"Point Click $\\ldots$ Eavesdrop How the FBI Wiretap Net Operates"},{"key":"ref38","article-title":"How the Great Firewall of China is blocking Tor","author":"winter","year":"0"},{"key":"ref33","author":"meirom","year":"2014","journal-title":"Localized epidemic detection in networks with overwhelming noise"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491294"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254784"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0435-9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03715-3_8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"ref35","first-page":"10","article-title":"Detection theory for graphs","volume":"20","author":"miller","year":"2013","journal-title":"Lincoln Lab J"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483315"},{"key":"ref28","author":"khim","year":"2015","journal-title":"Confidence sets for the source of a diffusion in regular trees"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254782"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.012801"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197506"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"ref23","article-title":"Herbivore: A scalable and efficient protocol for anonymous communication","author":"goel","year":"2003"},{"key":"ref26","author":"corrigan-gibbs","year":"2014","journal-title":"Riposte An anonymous messaging system handling millions of users"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948128"},{"key":"ref50","author":"bubeck","year":"2014","journal-title":"Finding adam in random growing trees"},{"key":"ref51","author":"gwynne","year":"2015","journal-title":"Asymptotic behavior of the eden model with positively homogeneous edge weights"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1941-0003498-3"},{"key":"ref57","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref56","author":"harris","year":"2002","journal-title":"The Theory of Branching Processes"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2012.6489274"},{"key":"ref54","author":"luo","year":"2015","journal-title":"Infection spreading and source identification A hide and seek game"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2016.2622923"},{"key":"ref52","author":"jog","year":"2015","journal-title":"Persistence of centrality in random growing trees"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.136"},{"key":"ref11","author":"fioriti","year":"2012","journal-title":"Predicting the Sources of An Outbreak with A Spectral Technique"},{"key":"ref40","author":"shadbolt","year":"2014","journal-title":"FireChat in Hong Kong How an app tapped its way into the protests"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2315533"},{"key":"ref13","first-page":"1","article-title":"Sybilinfer: Detecting sybil nodes using social networks","author":"danezis","year":"2009","journal-title":"Proc NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2016.2605761"},{"key":"ref15","author":"shah","year":"2011","journal-title":"Finding rumor sources on random trees"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-014-0003-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44702-4_5","article-title":"The free haven project: Distributed anonymous storage service","author":"dingledine","year":"2001","journal-title":"In Designing Privacy Enhancing Technologies"},{"key":"ref4","year":"2014","journal-title":"WhisperTech"},{"key":"ref3","author":"cole","year":"2013","journal-title":"We Kill People Based on Metadata"},{"key":"ref6","year":"12","journal-title":"Secrets of"},{"key":"ref5","year":"2014","journal-title":"Yik Yak"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.068702"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2825236.2825262"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591993"},{"key":"ref46","author":"ugander","year":"2011","journal-title":"The Anatomy of the Facebook Social Graph"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2796314.2745866"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/978-3-662-48653-5_32","article-title":"Privacy-conscious information diffusion in social networks","author":"giakkoupis","year":"2015","journal-title":"Proc Intl Symp on Distributed Computing"},{"key":"ref47","author":"johnson","year":"1977","journal-title":"Urn Models and Their Application"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/18\/8036324\/7907223-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/8036324\/07907223.pdf?arnumber=7907223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:52:59Z","timestamp":1649443979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7907223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":58,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2696960","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}