{"id":"https://openalex.org/W4301329547","doi":"https://doi.org/10.1109/compsac54236.2022.00127","title":"A Node-labeling-based Method for Evaluating the Anonymity of Tor Network","display_name":"A Node-labeling-based Method for Evaluating the Anonymity of Tor Network","publication_year":2022,"publication_date":"2022-06-01","ids":{"openalex":"https://openalex.org/W4301329547","doi":"https://doi.org/10.1109/compsac54236.2022.00127"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsac54236.2022.00127","pdf_url":null,"source":{"id":"https://openalex.org/S4363607883","display_name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100624505","display_name":"Feng Jiang","orcid":"https://orcid.org/0000-0001-5320-8102"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Jiang","raw_affiliation_strings":["School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071369918","display_name":"Yamei Xia","orcid":"https://orcid.org/0000-0001-9626-7671"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yamei Xia","raw_affiliation_strings":["School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080718178","display_name":"Wenbin Yao","orcid":"https://orcid.org/0000-0002-2830-102X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbin Yao","raw_affiliation_strings":["School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062961947","display_name":"Tianbo Lu","orcid":"https://orcid.org/0009-0001-2882-6037"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianbo Lu","raw_affiliation_strings":["School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100352089","display_name":"Xiaoyan Zhang","orcid":"https://orcid.org/0000-0003-2339-5423"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Zhang","raw_affiliation_strings":["School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":60},"biblio":{"volume":null,"issue":null,"first_page":"773","last_page":"778"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9915,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.85349977},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.80180645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78058445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6222354},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5092548},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4276035},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.42245415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35955915},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08774161},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06350583},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsac54236.2022.00127","pdf_url":null,"source":{"id":"https://openalex.org/S4363607883","display_name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62162060"}],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1992157848","https://openalex.org/W2042301701","https://openalex.org/W2103647628","https://openalex.org/W2108975750","https://openalex.org/W2128540334","https://openalex.org/W2135599859","https://openalex.org/W2136478214","https://openalex.org/W2144624431","https://openalex.org/W2538520193","https://openalex.org/W2763748542","https://openalex.org/W2784002252","https://openalex.org/W2883006946","https://openalex.org/W2911894399","https://openalex.org/W2943919329","https://openalex.org/W2947550312","https://openalex.org/W2964118168","https://openalex.org/W2977511625","https://openalex.org/W3005025697","https://openalex.org/W3007097112","https://openalex.org/W4237826793"],"related_works":["https://openalex.org/W4376136918","https://openalex.org/W4206398305","https://openalex.org/W3023934611","https://openalex.org/W2982648111","https://openalex.org/W2157186778","https://openalex.org/W2117874351","https://openalex.org/W2086251583","https://openalex.org/W2082747743","https://openalex.org/W1966494590","https://openalex.org/W1593132758"],"abstract_inverted_index":{"In":[0,121],"order":[1],"to":[2,38,142],"better":[3],"evaluate":[4],"the":[5,8,14,17,23,39,46,52,60,68,77,84,90,95,103,106,112,116,143],"anonymity":[6,20,104,139],"of":[7,16,25,48,54,63,80,97,99,105,124,146],"Tor":[9,18,91,107],"network,":[10],"this":[11],"paper":[12],"evaluates":[13],"degree":[15],"network":[19,92,108],"by":[21,83],"calculating":[22],"probability":[24],"routing":[26,41],"links":[27,65],"being":[28],"hijacked":[29,61],"when":[30,111,140],"users":[31],"communicate":[32],"under":[33],"different":[34,64,127],"node":[35,42,55],"labels.":[36],"According":[37],"official":[40,85],"algorithm,":[43],"we":[44],"discuss":[45],"results":[47,74],"link":[49],"establishment":[50],"from":[51],"perspective":[53],"labeling":[56],"separately":[57],"and":[58,102],"calculate":[59],"rate":[62],"based":[66,75],"on":[67,76,137],"established":[69],"evaluation":[70],"model.":[71],"The":[72],"experimental":[73],"real":[78],"data":[79],"nodes":[81,114,118,125,129],"provided":[82],"CollecTor":[86],"website":[87],"show":[88],"that":[89],"can":[93],"resist":[94],"intrusion":[96],"10%":[98],"malicious":[100,113],"nodes,":[101],"decreases":[109],"rapidly":[110],"in":[115],"routed":[117],"exceed":[119],"20%.":[120],"a":[122,134],"collection":[123],"with":[126,130],"labels,":[128],"exit":[131],"labels":[132],"have":[133],"greater":[135],"impact":[136],"system":[138],"subjected":[141],"same":[144],"level":[145],"attack.":[147]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4301329547","counts_by_year":[],"updated_date":"2024-12-10T09:54:38.501101","created_date":"2022-10-05"}