{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:45:44Z","timestamp":1730209544485,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162060"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/compsac54236.2022.00127","type":"proceedings-article","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T19:34:53Z","timestamp":1660160093000},"page":"773-778","source":"Crossref","is-referenced-by-count":0,"title":["A Node-labeling-based Method for Evaluating the Anonymity of Tor Network"],"prefix":"10.1109","author":[{"given":"Feng","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Yamei","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Wenbin","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Tianbo","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Xiaoyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00334-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2176511"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.824826"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382452"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020203"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00011"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1515\/popets-2016-0004","article-title":"Your choice MATor (s) large scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks","author":"backes","year":"2016","journal-title":"Proc on Privacy Enhancing Technologies"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919322"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref6","first-page":"2373","article-title":"Towards measuring unobservability in anonymous communication systems","volume":"52","author":"tan","year":"2015","journal-title":"Journal of Computer research and development"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314347"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0013"},{"key":"ref7","first-page":"231","article-title":"I'm Not an Entropist[A]","author":"why","year":"2013","journal-title":"Security Protocols XVI"},{"journal-title":"The Tor Project Tor Metrics [OL]","year":"2021","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref9","first-page":"145","article-title":"Guard Sets in Tor using AS Relationships","volume":"1","author":"mohsen","year":"2018","journal-title":"Proc Priv Enhancing Technol"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978310"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660371"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.18"},{"journal-title":"The Mis-entropists New Approaches to Measures in Tor[R]","year":"2011","author":"hamel","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2280232"}],"event":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","start":{"date-parts":[[2022,6,27]]},"location":"Los Alamitos, CA, USA","end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9842455\/9842394\/09842547.pdf?arnumber=9842547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:55:58Z","timestamp":1661810158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9842547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/compsac54236.2022.00127","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}