{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:32Z","timestamp":1750306232698,"version":"3.41.0"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T00:00:00Z","timestamp":1481587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"iSocial EU Marie Curie ITN project","award":["FP7-PEOPLE-2012-ITN"],"award-info":[{"award-number":["FP7-PEOPLE-2012-ITN"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2016,12,27]]},"abstract":"<jats:p>Identity validation of Online Social Networks\u2019 (OSNs\u2019) peers is a critical concern to the insurance of safe and secure online socializing environments. Starting from the vision of empowering users to determine the validity of OSN identities, we suggest a framework to estimate the trustworthiness of online social profiles based only on the information they contain. Our framework is based on learning identity correlations between profile attributes in an OSN community and on collecting ratings from OSN community members to evaluate the trustworthiness of target profiles. Our system guarantees utility, user anonymity, impartiality in rating, and operability within the dynamics and continuous evolution of OSNs. In this article, we detail the system design, and we prove its correctness against these claimed quality properties. Moreover, we test its effectiveness, feasibility, and efficiency through experimentation on real-world datasets from Facebook and Google+, in addition to using the Adults UCI dataset.<\/jats:p>","DOI":"10.1145\/3014338","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T14:34:05Z","timestamp":1481639645000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["COIP\u2014Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles"],"prefix":"10.1145","volume":"10","author":[{"given":"Leila","family":"Bahri","sequence":"first","affiliation":[{"name":"University of Insubria, Varese, Italy"}]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[{"name":"University of Insubria, Varese, Italy"}]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[{"name":"University of Insubria, Varese, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,12,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2011.6009562"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.33"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/e13111945"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.11"},{"issue":"3","key":"e_1_2_1_5_1","first-page":"667","article-title":"Privacy versus security","volume":"103","author":"Bambauer Derek E.","year":"2013","unstructured":"Derek E. Bambauer . 2013 . Privacy versus security . J. Criminal Law Criminol. 103 . 3 : 667 -- 683 (2013). Derek E. Bambauer. 2013. Privacy versus security. J. Criminal Law Criminol. 103.3: 667--683 (2013).","journal-title":"J. Criminal Law Criminol."},{"key":"e_1_2_1_6_1","volume-title":"Scams and Other Social Media Threats. Retrieved Augsut 20","author":"Boquiron Valerie Ria","year":"2011","unstructured":"Valerie Ria Boquiron . 2011 . Spam , Scams and Other Social Media Threats. Retrieved Augsut 20 , 2015 from http:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/web-attack\/75\/spam-scams-and-other-social-media-threats. (2011). Valerie Ria Boquiron. 2011. Spam, Scams and Other Social Media Threats. Retrieved Augsut 20, 2015 from http:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/web-attack\/75\/spam-scams-and-other-social-media-threats. (2011)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"e_1_2_1_9_1","volume-title":"Paul Compton, and Ashesh Mahidadia.","author":"Cai Xiongcai","year":"2011","unstructured":"Xiongcai Cai , Michael Bain , Alfred Krzywicki , Wayne Wobcke , Yang Sok Kim , Paul Compton, and Ashesh Mahidadia. 2011 . Collaborative filtering for people to people recommendation in social networks. In AI 2010: Advances in Artificial Intelligence. Springer , 476--485. Xiongcai Cai, Michael Bain, Alfred Krzywicki, Wayne Wobcke, Yang Sok Kim, Paul Compton, and Ashesh Mahidadia. 2011. Collaborative filtering for people to people recommendation in social networks. In AI 2010: Advances in Artificial Intelligence. Springer, 476--485."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497561"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350255"},{"volume-title":"Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197--210.","author":"Cao Qiang","key":"e_1_2_1_12_1","unstructured":"Qiang Cao , Michael Sirivianos , Xiaowei Yang , and Tiago Pregueiro . 2012. Aiding the detection of fake accounts in large scale social online services . In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197--210. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197--210."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_2_1_14_1","volume-title":"Santa Fe","author":"Carter Tom","year":"2007","unstructured":"Tom Carter and Santa Fe. 2007. An introduction to information theory and entropy. Complex Systems Summer School , Santa Fe ( 2007 ). Tom Carter and Santa Fe. 2007. An introduction to information theory and entropy. Complex Systems Summer School, Santa Fe (2007)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"e_1_2_1_16_1","volume-title":"Thomas","author":"Cover Thomas M.","year":"2012","unstructured":"Thomas M. Cover and Joy A . Thomas . 2012 . Elements of Information Theory. John Wiley 8 Sons, New York, NY. Thomas M. Cover and Joy A. Thomas. 2012. Elements of Information Theory. John Wiley 8 Sons, New York, NY."},{"volume-title":"NDSS.","author":"Danezis George","key":"e_1_2_1_17_1","unstructured":"George Danezis and Prateek Mittal . 2009. SybilInfer: Detecting Sybil nodes using social networks . In NDSS. San Diego, CA . George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil nodes using social networks. In NDSS. San Diego, CA."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"volume-title":"The Human-Computer Interaction Handbook","author":"Dumas Joseph S.","key":"e_1_2_1_19_1","unstructured":"Joseph S. Dumas . 2002. User-based evaluations . In The Human-Computer Interaction Handbook . L. Erlbaum Associates Inc ., 1093--1117. Joseph S. Dumas. 2002. User-based evaluations. In The Human-Computer Interaction Handbook. L. Erlbaum Associates Inc., 1093--1117."},{"volume-title":"Theory and Applications of Models of Computation","author":"Dwork Cynthia","key":"e_1_2_1_20_1","unstructured":"Cynthia Dwork . 2008. Differential privacy: A survey of results . In Theory and Applications of Models of Computation . Springer , 1--19. Cynthia Dwork. 2008. Differential privacy: A survey of results. In Theory and Applications of Models of Computation. Springer, 1--19."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_2_1_22_1","volume-title":"Retrieved","author":"Finger Lutz","year":"2015","unstructured":"Lutz Finger . 2015 . How To Spot Social Media Bots\u2014They Are Often Lonely. (2015) . Retrieved September 15, 2015 from http:\/\/www.forbes.com\/sites\/lutzfinger\/2015\/02\/24\/how-to-spot-social-media-bots-they-are-often-lonely\/. Lutz Finger. 2015. How To Spot Social Media Bots\u2014They Are Often Lonely. (2015). Retrieved September 15, 2015 from http:\/\/www.forbes.com\/sites\/lutzfinger\/2015\/02\/24\/how-to-spot-social-media-bots-they-are-often-lonely\/."},{"key":"e_1_2_1_23_1","volume-title":"Number of Facebook Users","author":"Foster Ben","year":"2014","unstructured":"Ben Foster . 2014 . How Many Users on Facebook ? Number of Facebook Users , January 2014. (March 2014). Retrieved August, 2014 from http:\/\/www.benphoster.com\/facebook-user-growth-chart-2004-2010\/ Ben Foster. 2014. How Many Users on Facebook? Number of Facebook Users, January 2014. (March 2014). Retrieved August, 2014 from http:\/\/www.benphoster.com\/facebook-user-growth-chart-2004-2010\/"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_2_1_26_1","volume-title":"Emil Stefanov, Dawn Song, and others.","author":"Gong Neil Zhenqiang","year":"2011","unstructured":"Neil Zhenqiang Gong , Ameet Talwalkar , Lester Mackey , Ling Huang , Eui Chul Richard Shin , Emil Stefanov, Dawn Song, and others. 2011 . Jointly predicting links and inferring attributes using a social-attribute network (san). arXiv preprint arXiv:1112.3265 (2011). Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Dawn Song, and others. 2011. Jointly predicting links and inferring attributes using a social-attribute network (san). arXiv preprint arXiv:1112.3265 (2011)."},{"key":"e_1_2_1_27_1","volume-title":"Egu\u00edluz","author":"Grabowicz Przemyslaw A.","year":"2013","unstructured":"Przemyslaw A. Grabowicz , Jos\u00e9 J. Ramasco , and V\u00edctor M . Egu\u00edluz . 2013 . Dynamics in online social networks. In Dynamics On and Of Complex Networks, Volume 2 . Springer , 3--17. Przemyslaw A. Grabowicz, Jos\u00e9 J. Ramasco, and V\u00edctor M. Egu\u00edluz. 2013. Dynamics in online social networks. In Dynamics On and Of Complex Networks, Volume 2. Springer, 3--17."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.03.007"},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"Hope Christopher","year":"2013","unstructured":"Christopher Hope . 2013 . Facebook is a \u2018major location for online child sexual grooming \u2019, head of child protection agency says. (Oct. 2013). Retrieved June, 2014 from http:\/\/www.telegraph.co.uk\/technology\/facebook\/10380631\/Facebook-is-a-major-location-for-online-child-sexual-grooming-head-of-child-protection-agency-says.html. Christopher Hope. 2013. Facebook is a \u2018major location for online child sexual grooming\u2019, head of child protection agency says. (Oct. 2013). Retrieved June, 2014 from http:\/\/www.telegraph.co.uk\/technology\/facebook\/10380631\/Facebook-is-a-major-location-for-online-child-sexual-grooming-head-of-child-protection-agency-says.html."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1602-6"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/iNIS.2015.46"},{"key":"e_1_2_1_34_1","volume-title":"Trade-off between virality and mass media influence in the topological evolution of online social networks. arXiv preprint arXiv:1403.1437","author":"Kleineberg Kaj-Kolja","year":"2014","unstructured":"Kaj-Kolja Kleineberg and Marian Boguna . 2014. Trade-off between virality and mass media influence in the topological evolution of online social networks. arXiv preprint arXiv:1403.1437 ( 2014 ). Kaj-Kolja Kleineberg and Marian Boguna. 2014. Trade-off between virality and mass media influence in the topological evolution of online social networks. arXiv preprint arXiv:1403.1437 (2014)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.124"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352793.1352837"},{"key":"e_1_2_1_37_1","volume-title":"How Social Media Networks Facilitate Identity Theft and Fraud. (2012). Retrieved","author":"Lewis K.","year":"2014","unstructured":"K. Lewis . 2012. How Social Media Networks Facilitate Identity Theft and Fraud. (2012). Retrieved February , 2014 from http:\/\/www.eonetwork.org\/octane-magazine\/special-features\/social-media-networks-facilitate-identity-theft-fraud EO Entrepreneurs Organization . K. Lewis. 2012. How Social Media Networks Facilitate Identity Theft and Fraud. (2012). Retrieved February, 2014 from http:\/\/www.eonetwork.org\/octane-magazine\/special-features\/social-media-networks-facilitate-identity-theft-fraud EO Entrepreneurs Organization."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568033"},{"key":"e_1_2_1_39_1","first-page":"106","article-title":"t-closeness: Privacy beyond k-anonymity and l-diversity","volume":"7","author":"Li Ninghui","year":"2007","unstructured":"Ninghui Li , Tiancheng Li , and Suresh Venkatasubramanian . 2007 . t-closeness: Privacy beyond k-anonymity and l-diversity . In ICDE , Vol. 7. 106 -- 115 . Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, Vol. 7. 106--115.","journal-title":"ICDE"},{"key":"e_1_2_1_40_1","volume-title":"Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs\/1101.2604 49","author":"Li Ninghui","year":"2011","unstructured":"Ninghui Li , Wahbeh H. Qardaji , and Dong Su. 2011. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs\/1101.2604 49 ( 2011 ), 55. Ninghui Li, Wahbeh H. Qardaji, and Dong Su. 2011. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs\/1101.2604 49 (2011), 55."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882972"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.09.005"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2336664.2336676"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_2_1_45_1","volume-title":"social media, and privacy","author":"Madden Mary","year":"2013","unstructured":"Mary Madden , Amanda Lenhart , Sandra Cortesi , Urs Gasser , Maeve Duggan , Aaron Smith , and Meredith Beaton . 2013. Teens , social media, and privacy . Pew Res. Center 21 ( 2013 ). Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. 2013. Teens, social media, and privacy. Pew Res. Center 21 (2013)."},{"key":"e_1_2_1_46_1","volume-title":"Retrieved","author":"Martinez E.","year":"2010","unstructured":"E. Martinez . 2010 . Alexis Pilkington brutally cyber bullied even after her suicide. (March 2010) . Retrieved October, 2013 from http:\/\/www.cbsnews.com\/8301-504083-162-20001181-504083.html CBS News. E. Martinez. 2010. Alexis Pilkington brutally cyber bullied even after her suicide. (March 2010). Retrieved October, 2013 from http:\/\/www.cbsnews.com\/8301-504083-162-20001181-504083.html CBS News."},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_47_1","unstructured":"Merriam-Webster. 2015 . Dictionary: Identity. (2015) . Retrieved August 20, 2015 http:\/\/www.merriam-webster.com\/dictionary\/identity. Merriam-Webster. 2015. Dictionary: Identity. (2015). Retrieved August 20, 2015 http:\/\/www.merriam-webster.com\/dictionary\/identity."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.01.007"},{"key":"e_1_2_1_49_1","volume-title":"Understanding the impact of socialbot attacks in online social networks. arXiv preprint arXiv:1402.6289","author":"Mitter Silvia","year":"2014","unstructured":"Silvia Mitter , Claudia Wagner , and Markus Strohmaier . 2014. Understanding the impact of socialbot attacks in online social networks. arXiv preprint arXiv:1402.6289 ( 2014 ). Silvia Mitter, Claudia Wagner, and Markus Strohmaier. 2014. Understanding the impact of socialbot attacks in online social networks. arXiv preprint arXiv:1402.6289 (2014)."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2858"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543711"},{"volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 254--263","author":"Snow Rion","key":"e_1_2_1_53_1","unstructured":"Rion Snow , Brendan O\u2019Connor , Daniel Jurafsky , and Andrew Y. Ng . 2008. Cheap and fast\u2014but is it good? Evaluating non-expert annotations for natural language tasks . In Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 254--263 . Rion Snow, Brendan O\u2019Connor, Daniel Jurafsky, and Andrew Y. Ng. 2008. Cheap and fast\u2014but is it good? Evaluating non-expert annotations for natural language tasks. In Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 254--263."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2808861"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"volume-title":"Proceedings of the 2011 IEEE INFOCOM. IEEE, 3218--3226","author":"Tran Nguyen","key":"e_1_2_1_57_1","unstructured":"Nguyen Tran , Jinyang Li , Lakshminarayanan Subramanian , and Sherman S. M. Chow . 2011. Optimal Sybil-resilient node admission control . In Proceedings of the 2011 IEEE INFOCOM. IEEE, 3218--3226 . Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, and Sherman S. M. Chow. 2011. Optimal Sybil-resilient node admission control. In Proceedings of the 2011 IEEE INFOCOM. IEEE, 3218--3226."},{"key":"e_1_2_1_58_1","volume-title":"Van Tilborg and Sushil Jajodia","author":"Henk C.","year":"2011","unstructured":"Henk C. A. Van Tilborg and Sushil Jajodia . 2011 . Encyclopedia of Cryptography and Security. Springer . Henk C. A. Van Tilborg and Sushil Jajodia. 2011. Encyclopedia of Cryptography and Security. Springer."},{"volume-title":"Proceedings of the 2010 International Conference on Communication and Computational Intelligence (INCOCCI). IEEE, 540--545","author":"Vijayarani S.","key":"e_1_2_1_59_1","unstructured":"S. Vijayarani , A. Tamilarasi , and M. Sampoorna . 2010. Analysis of privacy preserving K-anonymity methods and techniques . In Proceedings of the 2010 International Conference on Communication and Computational Intelligence (INCOCCI). IEEE, 540--545 . S. Vijayarani, A. Tamilarasi, and M. Sampoorna. 2010. Analysis of privacy preserving K-anonymity methods and techniques. In Proceedings of the 2010 International Conference on Communication and Computational Intelligence (INCOCCI). IEEE, 540--545."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14)","author":"Viswanath Bimal","year":"2014","unstructured":"Bimal Viswanath , M. Ahmad Bashir , Mark Crovella , Saikat Guha , Krishna P. Gummadi , Balachander Krishnamurthy , and Alan Mislove . 2014 . Towards detecting anomalous user behavior in online social networks . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14) . 223--238. Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14). 223--238."},{"volume-title":"Proceedings of the USENIX Security Symposium. Citeseer, 1--15","author":"Wang Gang","key":"e_1_2_1_61_1","unstructured":"Gang Wang , Tristan Konolige , Christo Wilson , Xiao Wang , Haitao Zheng , and Ben Y. Zhao . 2013. You are how you click: Clickstream analysis for Sybil detection . In Proceedings of the USENIX Security Symposium. Citeseer, 1--15 . Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y. Zhao. 2013. You are how you click: Clickstream analysis for Sybil detection. In Proceedings of the USENIX Security Symposium. Citeseer, 1--15."},{"key":"e_1_2_1_62_1","volume-title":"Zhao","author":"Wang Gang","year":"2012","unstructured":"Gang Wang , Manish Mohanlal , Christo Wilson , Xiao Wang , Miriam Metzger , Haitao Zheng , and Ben Y . Zhao . 2012 . Social turing tests: Crowdsourcing Sybil de tection. arXiv preprint arXiv:1205.3856 (2012). Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, and Ben Y. Zhao. 2012. Social turing tests: Crowdsourcing Sybil detection. arXiv preprint arXiv:1205.3856 (2012)."},{"volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Gang","key":"e_1_2_1_63_1","unstructured":"Gang Wang , Tianyi Wang , Haitao Zheng , and Ben Y. Zhao . 2014. Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14) . 239--254. Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y. Zhao. 2014. Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14). 239--254."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187928"},{"key":"e_1_2_1_65_1","unstructured":"Jing Wang and Panagiotis Ipeirotis. 2013. Quality-based pricing for crowdsourced workers. (2013).  Jing Wang and Panagiotis Ipeirotis. 2013. Quality-based pricing for crowdsourced workers. (2013)."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376630"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"e_1_2_1_71_1","volume-title":"CRUC: Cold-start recommendations using collaborative filtering in internet of things. arXiv preprint arXiv:1306.0165","author":"Zhang Daqiang","year":"2013","unstructured":"Daqiang Zhang , Qin Zou , and Haoyi Xiong . 2013 . CRUC: Cold-start recommendations using collaborative filtering in internet of things. arXiv preprint arXiv:1306.0165 (2013). Daqiang Zhang, Qin Zou, and Haoyi Xiong. 2013. CRUC: Cold-start recommendations using collaborative filtering in internet of things. arXiv preprint arXiv:1306.0165 (2013)."},{"key":"e_1_2_1_72_1","first-page":"372","article-title":"Sybil attacks and their defenses in the internet of things","volume":"1","author":"Zhang Kuan","year":"2014","unstructured":"Kuan Zhang , Xiaohui Liang , Rongxing Lu , and Xuemin Shen . 2014 . Sybil attacks and their defenses in the internet of things . IEEE IOT J. 1 , 5 (2014), 372 -- 383 . Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin Shen. 2014. Sybil attacks and their defenses in the internet of things. IEEE IOT J. 1, 5 (2014), 372--383.","journal-title":"IEEE IOT J."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:17Z","timestamp":1750220597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,13]]},"references-count":71,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12,27]]}},"alternative-id":["10.1145\/3014338"],"URL":"https:\/\/doi.org\/10.1145\/3014338","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2016,12,13]]},"assertion":[{"value":"2014-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}