{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:12:50Z","timestamp":1774541570609,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Jiangsu Provincial Key R\\&D Programs","award":["No. BE2022680, BE2022065-5"],"award-info":[{"award-number":["No. BE2022680, BE2022065-5"]}]},{"name":"National Natural Science Foundation of China","award":["No. 62072103, 62441207, 62472089, 62232004"],"award-info":[{"award-number":["No. 62072103, 62441207, 62472089, 62232004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714767","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T18:47:11Z","timestamp":1745347631000},"page":"2959-2968","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Do Not Trust What They Tell: Exposing Malicious Accomplices in Tor via Anomalous Circuit Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5480-6357","authenticated-orcid":false,"given":"Yixuan","family":"Yao","sequence":"first","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8209-1000","authenticated-orcid":false,"given":"Ming","family":"Yang","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5417-9570","authenticated-orcid":false,"given":"Zixia","family":"Liu","sequence":"additional","affiliation":[{"name":"Anhui University of Technology, Maanshan, Anhui, China and Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3156-9035","authenticated-orcid":false,"given":"Kai","family":"Dong","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0519-1358","authenticated-orcid":false,"given":"Xiaodan","family":"Gu","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6772-2480","authenticated-orcid":false,"given":"Chunmian","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Daniel J Benjamin James O Berger Magnus Johannesson Brian A Nosek E-J Wagenmakers Richard Berk Kenneth A Bollen Bj\u00f6rn Brembs Lawrence Brown Colin Camerer et al. 2018. Redefine statistical significance. Nature human behaviour 2 1 (2018) 6--10.","DOI":"10.1038\/s41562-017-0189-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012099975-0.50005-1"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceeding of 15th Passive and Active Measurement(PAM)","author":"Chakravarty Sambuddho","unstructured":"Sambuddho Chakravarty, Marco V Barbera, Georgios Portokalidis, Michalis Polychronakis, and Angelos D Keromytis. 2014. On the effectiveness of traffic analysis against anonymity networks using flow records. In Proceeding of 15th Passive and Active Measurement(PAM). Springer, 247--257."},{"key":"e_1_3_2_1_6_1","volume-title":"DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks. arXiv preprint arXiv:2211.16751","author":"Darir Hussein","year":"2022","unstructured":"Hussein Darir, Nikita Borisov, and Geir Dullerud. 2022. DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks. arXiv preprint arXiv:2211.16751 (2022)."},{"key":"e_1_3_2_1_7_1","unstructured":"Roger Dingledine and Nick Mathewson. 2024. Tor Path Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/path-spec.txt"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_10_1","volume-title":"The meaning of binomial distribution. Nature 186, 4730","author":"Edwards AWF","year":"1960","unstructured":"AWF Edwards. 1960. The meaning of binomial distribution. Nature 186, 4730 (1960), 1074--1074."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceeding of 2nd Knowledge Discovery and Data Mining(KDD)","volume":"96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, Xiaowei Xu, et al. 1996. A densitybased algorithm for discovering clusters in large spatial databases with noise. In Proceeding of 2nd Knowledge Discovery and Data Mining(KDD), Vol. 96. 226--231."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780091208"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093615"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security). 287--302","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In Proceedings of 24th USENIX Security Symposium (USENIX Security). 287--302."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/25152459221080396"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of 27th IEEE Symposium on Security and Privacy (S&P). IEEE, 15--pp.","author":"Peng Pai","year":"2006","unstructured":"Pai Peng, Peng Ning, and Douglas S Reeves. 2006. On the secrecy of timingbased active watermarking trace-back techniques. In Proceedings of 27th IEEE Symposium on Security and Privacy (S&P). IEEE, 15--pp."},{"key":"e_1_3_2_1_21_1","unstructured":"The Tor Project. 2024. Tor Metrics. https:\/\/metrics.torproject.org\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0006-3495(97)78709-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.40"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 26th on Web Conference (WWW).","author":"Singh Debayan","year":"2017","unstructured":"Debayan Singh, Tobias Pulls, Ioannis Karkotis, and Niklas Carlsson. 2017. The Web is Smaller Than It Seems: A Graph Approach to Detect Malicious Web Services. In Proceedings of the 26th on Web Conference (WWW)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).","author":"Sun Yue","unstructured":"Yue Sun, Roya Ensafi, Nick Feamster, Vern Paxson, and Michael K. Reiter. 2015. Invisible Sites: Verifying the Reachability of Hidden Web Servers. In Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3174003"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of 25th USENIX Security Symposium (USENIX Security). 1169--1185","author":"Winter Philipp","year":"2016","unstructured":"Philipp Winter, Roya Ensafi, Karsten Loesing, and Nick Feamster. 2016. Identifying and characterizing Sybils in the Tor network. In Proceedings of 25th USENIX Security Symposium (USENIX Security). 1169--1185."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"e_1_3_2_1_31_1","volume-title":"Marcela Moncada-Velez, Jie Chen, Masato Ogishi, Ira KD Sabli, Stephanie Hodeib, Cecilia Korol, et al.","author":"Zhang Qian","year":"2020","unstructured":"Qian Zhang, Paul Bastard, Zhiyong Liu, J\u00e9r\u00e9mie Le Pen, Marcela Moncada-Velez, Jie Chen, Masato Ogishi, Ira KD Sabli, Stephanie Hodeib, Cecilia Korol, et al. 2020. Inborn errors of type I IFN immunity in patients with life-threatening COVID-19. Science 370, 6515 (2020), eabd4570."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T06:13:16Z","timestamp":1761631996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":31,"alternative-id":["10.1145\/3696410.3714767","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714767","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}