{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:28Z","timestamp":1772164048583,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T00:00:00Z","timestamp":1377561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,27]]},"DOI":"10.1145\/2486001.2491719","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T08:31:21Z","timestamp":1376382681000},"page":"537-538","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Characterizing and detecting malicious crowdsourcing"],"prefix":"10.1145","author":[{"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Xing","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of USENIX Security (Washington, D.C.","author":"Wang G.","year":"2013","unstructured":"Wang , G. , Konolige , T. , Wilson , C. , Wang , X. , Zheng , H. , and Zhao , B. Y . You are how you click: Clickstream analysis for sybil detection . In Proc. of USENIX Security (Washington, D.C. , August 2013 ). Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., and Zhao, B. Y. You are how you click: Clickstream analysis for sybil detection. In Proc. of USENIX Security (Washington, D.C., August 2013)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of NDSS","author":"Wang G.","year":"2013","unstructured":"Wang , G. , Mohanlal , M. , Wilson , C. , Wang , X. , Metzger , M. , Zheng , H. , and Zhao , B. Y . Social turing tests: Crowdsourcing sybil detection . In Proc. of NDSS ( San Diego, CA , February 2013 ). Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., and Zhao, B. Y. Social turing tests: Crowdsourcing sybil detection. In Proc. of NDSS (San Diego, CA, February 2013)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187928"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2491719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2486001.2491719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:48:40Z","timestamp":1750222120000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2491719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,27]]},"references-count":5,"alternative-id":["10.1145\/2486001.2491719","10.1145\/2486001"],"URL":"https:\/\/doi.org\/10.1145\/2486001.2491719","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2534169.2491719","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,8,27]]},"assertion":[{"value":"2013-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}