{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:23:03Z","timestamp":1759940583519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CPS-1739684"],"award-info":[{"award-number":["CPS-1739684"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3372200","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"732-743","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hunting Sybils in Participatory Mobile Consensus-Based Networks"],"prefix":"10.1145","author":[{"given":"Nickolai","family":"Verchok","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Alex","family":"Orailo\u011flu","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"journal-title":"A survey of mobile phone sensing, in IEEE Communications Magazine","year":"2010","author":"Lane N. D.","key":"e_1_3_2_2_1_1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoforum.2013.02.001"},{"volume-title":"Participatory Sensing","year":"2006","author":"Burke J. A.","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815273"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"e_1_3_2_2_6_1","first-page":"52","author":"Shilton K.","year":"2009","journal-title":"Commun. ACM"},{"journal-title":"Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services, in IEEE\/ACM Transactions on Networking","year":"2018","author":"Wang G.","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"volume-title":"IEEE Transactions on Signal Processing","year":"2009","author":"Kar S.","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"volume-title":"Proceedings of NSDI'12","year":"2012","author":"Cao Q.","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492568"},{"key":"e_1_3_2_2_13_1","unstructured":"U.S. Department of Homeland Security DHS\/SI&T\/PIA-021 Cell All 2011.  U.S. Department of Homeland Security DHS\/SI&T\/PIA-021 Cell All 2011."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682204"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.11.160"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPS.2013.6581485"},{"volume-title":"Proceedings of International Symposium on a World of Wireless, Mobile and Multimedia Networks","year":"2006","author":"Demirbas M.","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249492"},{"volume-title":"Proceedings of MobiSys '16 Companion, ACM","year":"2016","author":"Nika Ana","key":"e_1_3_2_2_19_1"},{"volume-title":"Simulation","year":"2007","author":"Newport Calvin","key":"e_1_3_2_2_20_1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549288"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3372200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:52Z","timestamp":1750273492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":21,"alternative-id":["10.1145\/3320269.3372200","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3372200","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}