{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:11:09Z","timestamp":1750219869865,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CIF 1942124; IIS 2046640"],"award-info":[{"award-number":["CIF 1942124; IIS 2046640"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583424","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"3816-3826","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Dataset on Malicious Paper Bidding in Peer Review"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3151-7489","authenticated-orcid":false,"given":"Steven","family":"Jecmen","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3693-9127","authenticated-orcid":false,"given":"Minji","family":"Yoon","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1899-7884","authenticated-orcid":false,"given":"Vincent","family":"Conitzer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5158-9677","authenticated-orcid":false,"given":"Nihar B.","family":"Shah","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2256-8329","authenticated-orcid":false,"given":"Fei","family":"Fang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. Proceedings of the International AAAI Conference on Web and Social Media (2013)."},{"key":"e_1_3_2_1_2_1","first-page":"36","article-title":"I Hate Your Paper. Many Say the Peer Review System is Broken. Here\u2019s How Some Journals Are Trying to Fix It","volume":"24","author":"Akst Jef","year":"2010","unstructured":"Jef Akst. 2010. I Hate Your Paper. Many Say the Peer Review System is Broken. Here\u2019s How Some Journals Are Trying to Fix It. The Scientist 24, 8 (2010), 36.","journal-title":"The Scientist"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3346\/jkms.2014.29.11.1450"},{"key":"e_1_3_2_1_4_1","volume-title":"27th Conference on Uncertainty in Artificial Intelligence. 86\u201395","author":"Charlin Laurent","year":"2011","unstructured":"Laurent Charlin, Richard Zemel, and Craig Boutilier. 2011. A Framework for Optimizing Paper Matching. In 27th Conference on Uncertainty in Artificial Intelligence. 86\u201395."},{"key":"e_1_3_2_1_5_1","volume-title":"ICML Workshop on Peer Reviewing and Publishing Models.","author":"Charlin Laurent","year":"2013","unstructured":"Laurent Charlin and Richard\u00a0S. Zemel. 2013. The Toronto Paper Matching System: An Automated Paper-Reviewer Assignment system. In ICML Workshop on Peer Reviewing and Publishing Models."},{"key":"e_1_3_2_1_6_1","volume-title":"The Price of Strategyproofing Peer Assessment. In The 9th AAAI Conference on Human Computation and Crowdsourcing.","author":"Dhull Komal","year":"2022","unstructured":"Komal Dhull, Steven Jecmen, Pravesh Kothari, and Nihar\u00a0B. Shah. 2022. The Price of Strategyproofing Peer Assessment. In The 9th AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-011-9181-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055554"},{"key":"e_1_3_2_1_9_1","volume-title":"36th Conference on Uncertainty in Artificial Intelligence.","author":"Fiez Tanner","year":"2020","unstructured":"Tanner Fiez, Nihar Shah, and Lillian Ratliff. 2020. A SUPER* Algorithm to Optimize Paper Bidding in Peer Review. In 36th Conference on Uncertainty in Artificial Intelligence."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809413"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"key":"e_1_3_2_1_12_1","volume-title":"The AI Conference Paper Assignment Problem. AAAI Workshop WS-07-10 (12","author":"Goldsmith Judy","year":"2007","unstructured":"Judy Goldsmith and Robert H. Sloan. 2007. The AI Conference Paper Assignment Problem. AAAI Workshop WS-07-10 (12 2007), 53\u201357."},{"key":"e_1_3_2_1_13_1","volume-title":"Tradeoffs in Preventing Manipulation in Paper Bidding for Reviewer Assignment. In ML Evaluation Standards Workshop at ICLR","author":"Jecmen Steven","year":"2022","unstructured":"Steven Jecmen, Nihar\u00a0B. Shah, Fei Fang, and Vincent Conitzer. 2022. Tradeoffs in Preventing Manipulation in Paper Bidding for Reviewer Assignment. In ML Evaluation Standards Workshop at ICLR 2022."},{"key":"e_1_3_2_1_14_1","volume-title":"Near-Optimal Reviewer Splitting in Two-Phase Paper Reviewing and Conference Experiment Design. In The 9th AAAI Conference on Human Computation and Crowdsourcing.","author":"Jecmen Steven","year":"2022","unstructured":"Steven Jecmen, Hanrui Zhang, Ryan Liu, Fei Fang, Vincent Conitzer, and Nihar\u00a0B. Shah. 2022. Near-Optimal Reviewer Splitting in Two-Phase Paper Reviewing and Conference Experiment Design. In The 9th AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_3_2_1_15_1","unstructured":"Steven Jecmen Hanrui Zhang Ryan Liu Nihar\u00a0B. Shah Vincent Conitzer and Fei Fang. 2020. Mitigating Manipulation in Peer Review via Randomized Reviewer Assignments. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_16_1","volume-title":"Paper Matching with Local Fairness Constraints. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"Kobren Ari","year":"2019","unstructured":"Ari Kobren, Barna Saha, and Andrew McCallum. 2019. Paper Matching with Local Fairness Constraints. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_2_1_18_1","volume-title":"Matching Papers and Reviewers at Large Conferences. arXiv preprint arXiv:2202.12273","author":"Leyton-Brown Kevin","year":"2022","unstructured":"Kevin Leyton-Brown, Mausam, Yatin Nandwani, Hedayat Zarkoob, Chris Cameron, Neil Newman, and Dinesh Raghu. 2022. Matching Papers and Reviewers at Large Conferences. arXiv preprint arXiv:2202.12273 (2022)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429776"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645749"},{"key":"e_1_3_2_1_21_1","volume-title":"On Good and Fair Paper-Reviewer Assignment. In IEEE International Conference on Data Mining. 1145\u20131150","author":"Long Cheng","year":"2013","unstructured":"Cheng Long, Raymond Wong, Yu Peng, and Liangliang Ye. 2013. On Good and Fair Paper-Reviewer Assignment. In IEEE International Conference on Data Mining. 1145\u20131150."},{"key":"e_1_3_2_1_22_1","volume-title":"3rd International Conference on Algorithmic Decision Theory(Lecture Notes in Artificial Intelligence). Springer.","author":"Mattei Nicholas","year":"2013","unstructured":"Nicholas Mattei and Toby Walsh. 2013. PrefLib: A Library of Preference Data http:\/\/preflib.org. In 3rd International Conference on Algorithmic Decision Theory(Lecture Notes in Artificial Intelligence). Springer."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281247"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-014-1239-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458127"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528086"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291125.3309611"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.133"},{"key":"e_1_3_2_1_29_1","volume-title":"On the Optimal Assignment of Conference Papers to Reviewers. Technical Report. Department of Computer and Information Science","author":"Taylor J.","year":"2008","unstructured":"Camillo\u00a0J. Taylor. 2008. On the Optimal Assignment of Conference Papers to Reviewers. Technical Report. Department of Computer and Information Science, University of Pennsylvania."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2017.7956540"},{"key":"e_1_3_2_1_31_1","volume-title":"Potential Organized Fraud in ACM\/IEEE Computer Architecture Conferences. https:\/\/medium.com\/@tnvijayk\/potential-organized-fraud-in-acm-ieee-computer-architecture- conferences-ccd61169370d (accessed","author":"Vijaykumar N.","year":"2020","unstructured":"T.\u00a0N. Vijaykumar. 2020. Potential Organized Fraud in ACM\/IEEE Computer Architecture Conferences. https:\/\/medium.com\/@tnvijayk\/potential-organized-fraud-in-acm-ieee-computer-architecture- conferences-ccd61169370d (accessed February 2023)."},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Machine Learning. PMLR, 11240\u201311250","author":"Wu Ruihan","year":"2021","unstructured":"Ruihan Wu, Chuan Guo, Felix Wu, Rahul Kidambi, Laurens Van Der\u00a0Maaten, and Kilian Weinberger. 2021. Making Paper Reviewing Robust to Bid Manipulation Attacks. In International Conference on Machine Learning. PMLR, 11240\u201311250."},{"key":"e_1_3_2_1_33_1","volume-title":"On Strategyproof Conference Peer Review. In International Joint Conference on Artificial Intelligence.","author":"Xu Yichong","year":"2018","unstructured":"Yichong Xu, H. Zhao, Xiaofei Shi, and Nihar\u00a0B. Shah. 2018. On Strategyproof Conference Peer Review. In International Joint Conference on Artificial Intelligence."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3543507.3583424","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583424","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:52Z","timestamp":1750178872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":33,"alternative-id":["10.1145\/3543507.3583424","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583424","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}