{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:01Z","timestamp":1750306141507,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:00:00Z","timestamp":1498348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1527153","CNS-1422215","SES-1450619","IUSE-1525601"],"award-info":[{"award-number":["CNS-1527153","CNS-1422215","SES-1450619","IUSE-1525601"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Samsung","award":["GRO 2015"],"award-info":[{"award-number":["GRO 2015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,25]]},"DOI":"10.1145\/3091478.3091507","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:17:13Z","timestamp":1499689033000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stateless Puzzles for Real Time Online Fraud Preemption"],"prefix":"10.1145","author":[{"given":"Mizanur","family":"Rahman","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Ruben","family":"Recabarren","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Dongwon","family":"Lee","sequence":"additional","affiliation":[{"name":"Penn State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"www.youtube.com\/watch?v=5Od2SuL2igA","author":"Getting O","year":"2013","unstructured":"Google I\/ O 2013 - Getting Discovered on Google Play. www.youtube.com\/watch?v=5Od2SuL2igA , 2013 . Google I\/O 2013 - Getting Discovered on Google Play. www.youtube.com\/watch?v=5Od2SuL2igA, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0297.2012.02512.x"},{"volume-title":"http:\/\/www.app-reviews.org","year":"2016","key":"e_1_3_2_1_4_1","unstructured":"AppReviews. http:\/\/www.app-reviews.org , 2016 . AppReviews. http:\/\/www.app-reviews.org, 2016."},{"volume-title":"http:\/\/www.appsuch.com","year":"2016","key":"e_1_3_2_1_5_1","unstructured":"AppSuch. http:\/\/www.appsuch.com , 2016 . AppSuch. http:\/\/www.appsuch.com, 2016."},{"volume-title":"http:\/\/www.appsviral.com\/","year":"2016","key":"e_1_3_2_1_6_1","unstructured":"AppsViral. http:\/\/www.appsviral.com\/ , 2016 . AppsViral. http:\/\/www.appsviral.com\/, 2016."},{"key":"e_1_3_2_1_7_1","unstructured":"Apptamin. Optimize Your Google Play Store App Details Page. http:\/\/www.apptamin.com\/blog\/optimize-play-store-app\/ 2016.  Apptamin. Optimize Your Google Play Store App Details Page. http:\/\/www.apptamin.com\/blog\/optimize-play-store-app\/ 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_1_10_1","volume-title":"Syn cookies","author":"Bernstein D. J.","year":"1996","unstructured":"D. J. Bernstein . Syn cookies , 1996 . D. J. Bernstein. Syn cookies, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of CRYPTO","author":"Dwork C.","year":"1992","unstructured":"C. Dwork and M. Naor . Pricing via processing or combatting junk mail . In Proceedings of CRYPTO , 1992 . C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proceedings of CRYPTO, 1992."},{"key":"e_1_3_2_1_13_1","volume-title":"Community detection in networks: A user guide. arXiv:1608.00163","author":"Fortunato S.","year":"2016","unstructured":"S. Fortunato and D. Hric . Community detection in networks: A user guide. arXiv:1608.00163 , 2016 . S. Fortunato and D. Hric. Community detection in networks: A user guide. arXiv:1608.00163, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of ISOC NDSS","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard . Client puzzles: A cryptographic counter-measure against connection depletion attacks . In Proceedings of ISOC NDSS , 1999 . A. Juels and J. Brainard. Client puzzles: A cryptographic counter-measure against connection depletion attacks. In Proceedings of ISOC NDSS, 1999."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464470"},{"key":"e_1_3_2_1_17_1","volume-title":"Fake it till you make it: Reputation, competition, and yelp review fraud. Management Science, 62(12)","author":"Luca M.","year":"2016","unstructured":"M. Luca and G. Zervas . Fake it till you make it: Reputation, competition, and yelp review fraud. Management Science, 62(12) , 2016 . M. Luca and G. Zervas. Fake it till you make it: Reputation, competition, and yelp review fraud. Management Science, 62(12), 2016."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of USENIX Security","author":"Motoyama M.","year":"2011","unstructured":"M. Motoyama , D. McCoy , K. Levchenko , S. Savage , and G. M. Voelker . Dirty jobs: The role of freelance labor in web service abuse . In Proceedings of USENIX Security , 2011 . M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty jobs: The role of freelance labor in web service abuse. In Proceedings of USENIX Security, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_3_2_1_20_1","volume-title":"A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin : A peer-to-peer electronic cash system , 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.12"},{"volume-title":"http:\/\/www.ranklikes.com\/","year":"2016","key":"e_1_3_2_1_22_1","unstructured":"RankLikes. http:\/\/www.ranklikes.com\/ , 2016 . RankLikes. http:\/\/www.ranklikes.com\/, 2016."},{"volume-title":"http:\/\/www.reviewroster.com\/","year":"2016","key":"e_1_3_2_1_23_1","unstructured":"ReviewRoster. http:\/\/www.reviewroster.com\/ , 2016 . ReviewRoster. http:\/\/www.reviewroster.com\/, 2016."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"volume-title":"http:\/\/www.thesocialmarketeers.org\/","year":"2016","key":"e_1_3_2_1_25_1","unstructured":"TheSocialMarketeers. http:\/\/www.thesocialmarketeers.org\/ , 2016 . TheSocialMarketeers. http:\/\/www.thesocialmarketeers.org\/, 2016."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23528-8_17"}],"event":{"name":"WebSci '17: ACM Web Science Conference","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Troy New York USA","acronym":"WebSci '17"},"container-title":["Proceedings of the 2017 ACM on Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091507","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091507","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:29Z","timestamp":1750217849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,25]]},"references-count":26,"alternative-id":["10.1145\/3091478.3091507","10.1145\/3091478"],"URL":"https:\/\/doi.org\/10.1145\/3091478.3091507","relation":{},"subject":[],"published":{"date-parts":[[2017,6,25]]},"assertion":[{"value":"2017-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}