{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T02:44:53Z","timestamp":1777085093664,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2153482"],"award-info":[{"award-number":["CNS-2153482"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1145\/3625007.3627722","type":"proceedings-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T15:12:42Z","timestamp":1710515562000},"page":"636-643","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Combating Identity Attacks in Online Social Networks: A Multi-Layered Framework Using Zero-Knowledge Proof and Permissioned Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8417-9316","authenticated-orcid":false,"given":"Md Jahangir","family":"Alam","sequence":"first","affiliation":[{"name":"Southern Illinois University, Carbondale, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7572-9557","authenticated-orcid":false,"given":"Ismail","family":"Hossain","sequence":"additional","affiliation":[{"name":"Southern Illinois University, Carbondale, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0334-5756","authenticated-orcid":false,"given":"Sai","family":"Puppala","sequence":"additional","affiliation":[{"name":"Southern Illinois University, Carbondale, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8054-9770","authenticated-orcid":false,"given":"Sajedul","family":"Talukder","sequence":"additional","affiliation":[{"name":"Southern Illinois University, Carbondale, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/2815675.2815699","volume-title":"Proceedings of the 2015 internet measurement conference","author":"Goga Oana","year":"2015","unstructured":"Oana Goga, Giridhari Venkatadri, and Krishna P Gummadi. The doppelg\u00e4nger bot attack: Exploring identity impersonation in online social networks. In Proceedings of the 2015 internet measurement conference, pages 141--153, 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"A study of friend abuse perception in facebook. ACM transactions on social computing, 3(4):1--34","author":"Talukder Sajedul","year":"2020","unstructured":"Sajedul Talukder and Bogdan Carbunar. A study of friend abuse perception in facebook. ACM transactions on social computing, 3(4):1--34, 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"12","author":"Talukder Sajedul","year":"2018","unstructured":"Sajedul Talukder and Bogdan Carbunar. Abusniff: Automatic detection and defenses against abusive facebook friends. In Proceedings of the International AAAI Conference on Web and Social Media, volume 12, 2018."},{"key":"e_1_3_2_1_4_1","first-page":"186","volume-title":"The knowledge complexity of interactive proof-systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof-systems. volume 18, pages 186--208. 1989."},{"key":"e_1_3_2_1_5_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized business review, page 21260","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review, page 21260, 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-0-387-35568-9_18","volume-title":"Secure Information Networks: Communications and Multimedia Security IFIP TC6\/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20--21","author":"Jakobsson Markus","year":"1999","unstructured":"Markus Jakobsson and Ari Juels. Proofs of work and bread pudding protocols. In Secure Information Networks: Communications and Multimedia Security IFIP TC6\/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20--21, 1999, Leuven, Belgium, pages 258--272. Springer, 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"Blockchain without waste: Proof-of-stake. The Review of financial studies, 34(3):1156--1190","author":"Saleh Fahad","year":"2021","unstructured":"Fahad Saleh. Blockchain without waste: Proof-of-stake. The Review of financial studies, 34(3):1156--1190, 2021."},{"key":"e_1_3_2_1_8_1","volume-title":"Delegated proof-of-stake (dpos). Bitshare whitepaper, 81:85","author":"Larimer Daniel","year":"2014","unstructured":"Daniel Larimer. Delegated proof-of-stake (dpos). Bitshare whitepaper, 81:85, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"The Journal of Supercomputing","author":"Liu Ying-Ho","year":"2023","unstructured":"Ying-Ho Liu and Chia-Yu Kuo. Simaim: identifying sockpuppets and puppetmasters on a single forum-oriented social media site. The Journal of Supercomputing, pages 1--32, 2023."},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"ICC 2020-2020 IEEE International Conference on Communications (ICC)","author":"Song Tianlin","year":"2020","unstructured":"Tianlin Song, Jingqiang Lin, Wei Wang, and Quanwei Cai. Traceable revocable anonymous registration scheme with zero-knowledge proof on blockchain. In ICC 2020-2020 IEEE International Conference on Communications (ICC), pages 1--7. IEEE, 2020."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102050"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/math9202569"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","author":"Sharma Bhavye","year":"2020","unstructured":"Bhavye Sharma, Raju Halder, and Jawar Singh. Blockchain-based interoperable healthcare using zero-knowledge proofs and proxy re-encryption. In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pages 1--6. IEEE, 2020."},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Blockchain data privacy protection and sharing scheme based on zero-knowledge proof","volume":"2022","author":"Feng Tao","year":"2022","unstructured":"Tao Feng, Pu Yang, Chunyan Liu, Junli Fang, and Rong Ma. Blockchain data privacy protection and sharing scheme based on zero-knowledge proof. Wireless Communications and Mobile Computing, 2022:1--11, 2022.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"4","key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1080\/1206212X.2017.1395132","article-title":"Generating security questions for better protection of user privacy","volume":"42","author":"Anvari Armin","year":"2020","unstructured":"Armin Anvari, Lei Pan, and Xi Zheng. Generating security questions for better protection of user privacy. International Journal of Computers and Applications, 42(4):329--350, 2020.","journal-title":"International Journal of Computers and Applications"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01571-y"},{"key":"e_1_3_2_1_19_1","first-page":"18","volume-title":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","author":"Li Wanxin","year":"2020","unstructured":"Wanxin Li, Collin Meese, Hao Guo, and Mark Nejad. Blockchain-enabled identity verification for safe ridesharing leveraging zero-knowledge proof. In 2020 3rd International Conference on Hot Information-Centric Networking (HotICN), pages 18--24. IEEE, 2020."},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"100072","article-title":"Privacy preserving transparent supply chain management through hyperledger fabric. Blockcha","volume":"3","author":"Ravi Deebthik","year":"2022","unstructured":"Deebthik Ravi, Sashank Ramachandran, Raahul Vignesh, Vinod Ramesh Falmari, and M Brindha. Privacy preserving transparent supply chain management through hyperledger fabric. Blockchain: Research and Applications, 3(2):100072, 2022.","journal-title":"Research and Applications"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20226587"},{"key":"e_1_3_2_1_22_1","volume-title":"docs.spring.io","author":"Documentation PasswordEncoder","year":"2022","unstructured":"spring.io. BCryptPasswordEncoder Documentation. docs.spring.io, 2022."},{"key":"e_1_3_2_1_23_1","volume-title":"Topic transferable table question answering. arXiv preprint arXiv:2109.07377","author":"Chemmengath Saneem Ahmed","year":"2021","unstructured":"Saneem Ahmed Chemmengath, Vishwajeet Kumar, Samarth Bharadwaj, Jaydeep Sen, Mustafa Canim, Soumen Chakrabarti, Alfio Gliozzo, and Karthik Sankaranarayanan. Topic transferable table question answering. arXiv preprint arXiv:2109.07377, 2021."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3455716.3455856"},{"key":"e_1_3_2_1_25_1","volume-title":"Hyperledger","year":"2018","unstructured":"Hyperledger. Measuring Blockchain Performance with Hyperledger Caliper. Hyperledger, 2018."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"2018 3rd International Conference for Convergence in Technology (I2CT)","author":"Naidu Vishal","year":"2018","unstructured":"Vishal Naidu, Kumaresan Mudliar, Abhishek Naik, and Prasenjit Bhavathankar. A fully observable supply chain management system using block chain and iot. In 2018 3rd International Conference for Convergence in Technology (I2CT), pages 1--4. IEEE, 2018."},{"key":"e_1_3_2_1_27_1","first-page":"1171","volume-title":"B-fica: Blockchain based framework for auto-insurance claim and adjudication. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications","author":"Oham Chuka","year":"2018","unstructured":"Chuka Oham, Raja Jurdak, Salil S Kanhere, Ali Dorri, and Sanjay Jha. B-fica: Blockchain based framework for auto-insurance claim and adjudication. In 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pages 1171--1180. IEEE, 2018."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231535.3231539"},{"key":"e_1_3_2_1_29_1","volume-title":"Backlinko","author":"Dean Brian","year":"2023","unstructured":"Brian Dean. Facebook Demographic Statistics: How Many People Use Facebook in 2023? Backlinko, 2023."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2099"}],"event":{"name":"ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining","location":"Kusadasi Turkiye","acronym":"ASONAM '23","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"]},"container-title":["Proceedings of the International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625007.3627722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:50Z","timestamp":1750178810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":29,"alternative-id":["10.1145\/3625007.3627722","10.1145\/3625007"],"URL":"https:\/\/doi.org\/10.1145\/3625007.3627722","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"2024-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}