{"id":"https://openalex.org/W2614632423","doi":"https://doi.org/10.1109/tdsc.2017.2703887","title":"Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks","display_name":"Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks","publication_year":2017,"publication_date":"2017-05-15","ids":{"openalex":"https://openalex.org/W2614632423","doi":"https://doi.org/10.1109/tdsc.2017.2703887","mag":"2614632423"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2703887","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2703887","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Wormhole_The_Hidden_Virus_Propagation_Power_of_the_Search_Engine_in_Social_Networks/20748049","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038034507","display_name":"Cai Fu","orcid":"https://orcid.org/0000-0003-4536-3537"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cai Fu","raw_affiliation_strings":["School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100405233","display_name":"Xiao-Yang Liu","orcid":"https://orcid.org/0000-0002-9532-1709"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Yang Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110532463","display_name":"Jia Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Yang","raw_affiliation_strings":["School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049154222","display_name":"Laurence T. Yang","orcid":"https://orcid.org/0000-0002-7986-4244"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Laurence T. Yang","raw_affiliation_strings":["School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036801346","display_name":"Tianqing Zhu","orcid":"https://orcid.org/0000-0003-3411-7947"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tianqing Zhu","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038034507"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":1.9064,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.85679435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"16","issue":"4","first_page":"693","last_page":"710"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6710220575332642},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.589007556438446},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.44313323497772217},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.43412530422210693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2020406723022461},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13735583424568176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6710220575332642},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.589007556438446},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.44313323497772217},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.43412530422210693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2020406723022461},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13735583424568176}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2017.2703887","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2703887","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/20748049","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Wormhole_The_Hidden_Virus_Propagation_Power_of_the_Search_Engine_in_Social_Networks/20748049","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/138345","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/138345","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20748049","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Wormhole_The_Hidden_Virus_Propagation_Power_of_the_Search_Engine_in_Social_Networks/20748049","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1007895129","https://openalex.org/W1420268584","https://openalex.org/W1575078351","https://openalex.org/W1634636992","https://openalex.org/W1914027636","https://openalex.org/W1978136502","https://openalex.org/W1982968425","https://openalex.org/W1987117885","https://openalex.org/W1995841658","https://openalex.org/W1997222770","https://openalex.org/W2005813008","https://openalex.org/W2011557321","https://openalex.org/W2044911211","https://openalex.org/W2048616039","https://openalex.org/W2048885124","https://openalex.org/W2058807478","https://openalex.org/W2062533261","https://openalex.org/W2069499430","https://openalex.org/W2082203014","https://openalex.org/W2086640216","https://openalex.org/W2088540444","https://openalex.org/W2095656202","https://openalex.org/W2100460448","https://openalex.org/W2102822724","https://openalex.org/W2103849350","https://openalex.org/W2105979081","https://openalex.org/W2106444274","https://openalex.org/W2112680994","https://openalex.org/W2113496760","https://openalex.org/W2114762409","https://openalex.org/W2116164611","https://openalex.org/W2124486211","https://openalex.org/W2125011234","https://openalex.org/W2128397999","https://openalex.org/W2144622325","https://openalex.org/W2145530262","https://openalex.org/W2161728228","https://openalex.org/W2165184405","https://openalex.org/W2265130982","https://openalex.org/W2515448417","https://openalex.org/W2963407725","https://openalex.org/W4206143658","https://openalex.org/W4235057894","https://openalex.org/W6628306711","https://openalex.org/W6634225516"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W1479889306"],"abstract_inverted_index":{"Today":[0],"search":[1,42,48,87,105,181,187],"engines":[2],"are":[3,17,26],"tightly":[4],"coupled":[5],"with":[6,12,185],"social":[7,91],"networks,":[8],"and":[9,56,74,118,139,154,203],"present":[10],"users":[11,24],"a":[13,41,52,86,94,104,108,125,180,190],"double-edged":[14],"sword:":[15],"they":[16],"able":[18],"to":[19,23,38],"acquire":[20],"information":[21],"interesting":[22],"but":[25],"also":[27],"capable":[28],"of":[29,77,85,169],"spreading":[30],"viruses":[31],"introduced":[32],"by":[33],"hackers.":[34],"It":[35],"is":[36],"challenging":[37],"characterize":[39],"how":[40],"engine":[43,49,106,188],"spreads":[44],"viruses,":[45],"since":[46],"the":[47,61,75,78,83,132,136,140,163,167,177,186],"serves":[50],"as":[51],"virtual":[53],"virus":[54,71,79,99,183],"pool":[55],"creates":[57],"propagation":[58,72,80,109,121,133,184,198],"paths":[59],"over":[60],"underlying":[62],"network":[63,195],"structure.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,101,112,145,160],"quantitatively":[69,119],"analyze":[70,120],"effects":[73,122],"stability":[76],"process":[81],"in":[82],"presence":[84],"engine.":[88],"First,":[89],"although":[90],"networks":[92],"have":[93],"community":[95],"structure":[96],"that":[97,103,162],"impedes":[98],"propagation,":[100],"find":[102],"generates":[107],"wormhole.":[110],"Second,":[111],"propose":[113],"an":[114],"epidemic":[115,137,201],"feedback":[116],"model":[117,126,165],"based":[123],"on":[124,149],"employing":[127],"four":[128,150],"metrics:":[129],"infection":[130,192],"density,":[131,193],"wormhole":[134],"effect,":[135],"threshold,":[138,202],"basic":[141,205],"reproduction":[142,206],"number.":[143,207],"Third,":[144],"verify":[146],"our":[147],"analyses":[148],"real-world":[151],"data":[152,157],"sets":[153],"two":[155],"simulated":[156],"sets.":[158],"Moreover,":[159],"prove":[161],"proposed":[164],"has":[166,189],"property":[168],"partial":[170],"stability.":[171],"Evaluation":[172],"results":[173],"show":[174],"that,":[175],"compared":[176],"cases":[178],"without":[179],"engine,":[182],"higher":[191],"shorter":[194],"diameter,":[196],"greater":[197],"velocity,":[199],"lower":[200],"larger":[204]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
