{"id":"https://openalex.org/W2016828263","doi":"https://doi.org/10.1145/1609956.1609964","title":"Compromising anonymous communication systems using blind source separation","display_name":"Compromising anonymous communication systems using blind source separation","publication_year":2009,"publication_date":"2009-10-01","ids":{"openalex":"https://openalex.org/W2016828263","doi":"https://doi.org/10.1145/1609956.1609964","mag":"2016828263"},"language":"en","primary_location":{"id":"doi:10.1145/1609956.1609964","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1609956.1609964","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101992277","display_name":"Ye Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ye Zhu","raw_affiliation_strings":["Cleveland State University, Cleveland, OH","Cleveland State University, Cleveland, Oh#TAB#"],"affiliations":[{"raw_affiliation_string":"Cleveland State University, Cleveland, OH","institution_ids":["https://openalex.org/I102607778"]},{"raw_affiliation_string":"Cleveland State University, Cleveland, Oh#TAB#","institution_ids":["https://openalex.org/I102607778"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040027964","display_name":"Riccardo Bettati","orcid":"https://orcid.org/0000-0002-5877-6667"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Riccardo Bettati","raw_affiliation_strings":["Texas A&amp;M University, College Station, TX","Texas A&M University, College Station. TX#TAB#"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University, College Station, TX","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Texas A&M University, College Station. TX#TAB#","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101992277"],"corresponding_institution_ids":["https://openalex.org/I102607778"],"apc_list":null,"apc_paid":null,"fwci":1.0736,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75024968,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8521488904953003},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6298439502716064},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6284503936767578},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5773047804832458},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.45517826080322266},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.44513165950775146},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4403696060180664},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.433794766664505},{"id":"https://openalex.org/keywords/blind-signal-separation","display_name":"Blind signal separation","score":0.42498356103897095},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4221535325050354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23166382312774658},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.15434899926185608},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15419968962669373}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8521488904953003},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6298439502716064},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6284503936767578},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5773047804832458},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.45517826080322266},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.44513165950775146},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4403696060180664},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.433794766664505},{"id":"https://openalex.org/C120317606","wikidata":"https://www.wikidata.org/wiki/Q17105967","display_name":"Blind signal separation","level":3,"score":0.42498356103897095},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4221535325050354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23166382312774658},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.15434899926185608},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15419968962669373},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1609956.1609964","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1609956.1609964","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:engagedscholarship.csuohio.edu:enece_facpub-1039","is_oa":false,"landing_page_url":"https://engagedscholarship.csuohio.edu/enece_facpub/40","pdf_url":null,"source":{"id":"https://openalex.org/S4306400889","display_name":"EngagedScholarship @ Cleveland State University (Cleveland State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102607778","host_organization_name":"Cleveland State University","host_organization_lineage":["https://openalex.org/I102607778"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical and Computer Engineering Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W131683133","https://openalex.org/W1484474218","https://openalex.org/W1484798037","https://openalex.org/W1511198340","https://openalex.org/W1551509424","https://openalex.org/W1562199962","https://openalex.org/W1565980524","https://openalex.org/W1584514021","https://openalex.org/W1591967853","https://openalex.org/W1655958391","https://openalex.org/W1671522217","https://openalex.org/W1788696583","https://openalex.org/W1847401883","https://openalex.org/W1880384800","https://openalex.org/W1894333397","https://openalex.org/W1978884755","https://openalex.org/W1987383232","https://openalex.org/W1996355918","https://openalex.org/W2019502123","https://openalex.org/W2044931626","https://openalex.org/W2056211671","https://openalex.org/W2060764506","https://openalex.org/W2078813897","https://openalex.org/W2099741732","https://openalex.org/W2103647628","https://openalex.org/W2104722531","https://openalex.org/W2106048721","https://openalex.org/W2106506060","https://openalex.org/W2108668142","https://openalex.org/W2116347193","https://openalex.org/W2116843749","https://openalex.org/W2117370538","https://openalex.org/W2119647652","https://openalex.org/W2124597473","https://openalex.org/W2125613938","https://openalex.org/W2125657162","https://openalex.org/W2126467210","https://openalex.org/W2128735745","https://openalex.org/W2141224535","https://openalex.org/W2142638745","https://openalex.org/W2145347071","https://openalex.org/W2150248082","https://openalex.org/W2154583779","https://openalex.org/W2157050350","https://openalex.org/W2157629714","https://openalex.org/W2162297215","https://openalex.org/W2168812739","https://openalex.org/W2168927703","https://openalex.org/W2170102584","https://openalex.org/W2174056151","https://openalex.org/W2338245394","https://openalex.org/W2341111334","https://openalex.org/W2523169138","https://openalex.org/W2912373455","https://openalex.org/W2944132414","https://openalex.org/W3102014660","https://openalex.org/W3143304050"],"related_works":["https://openalex.org/W2145745943","https://openalex.org/W2078600672","https://openalex.org/W2611314012","https://openalex.org/W185677139","https://openalex.org/W17611330","https://openalex.org/W2111277886","https://openalex.org/W1993766952","https://openalex.org/W2038592428","https://openalex.org/W2899793596","https://openalex.org/W2046061299"],"abstract_inverted_index":{"We":[0,113,173],"propose":[1],"a":[2,78,101,115,148],"class":[3],"of":[4,32,44,109,142,151,153,164,169,188,203],"anonymity":[5,12,46,59,71,127],"attacks":[6,15,60,128],"to":[7,26,49,53,118,176,199],"both":[8],"wired":[9,70],"and":[10,89,217],"wireless":[11,130,138,205,235],"networks.":[13],"These":[14],"are":[16,61],"based":[17],"on":[18,147],"the":[19,39,42,57,75,93,106,110,121,158,162,167,178,189,193,201,204,212,228],"blind":[20],"source":[21],"separation":[22,66,95],"algorithms":[23],"widely":[24],"used":[25,198],"recover":[27],"individual":[28],"signals":[29,33],"from":[30],"mixtures":[31],"in":[34,55,77,135,192,233],"statistical":[35],"signal":[36],"processing.":[37],"Since":[38],"philosophy":[40],"behind":[41],"design":[43],"current":[45],"networks":[47,72,131,139,236],"is":[48,87],"mix":[50,79,111],"traffic":[51,76,107,183,239],"or":[52],"hide":[54],"crowds,":[56],"proposed":[58,68,126],"very":[62,143,231],"effective.":[63],"The":[64,125],"flow":[65,94],"attack":[67,86,123],"for":[69,129,220],"can":[73,104,132,196],"separate":[74,177],"network.":[80,112],"Our":[81,207],"experiments":[82,209,225],"show":[83,119,214],"that":[84,120,211,227,237],"this":[85],"effective":[88],"scalable.":[90],"By":[91],"combining":[92],"method":[96],"with":[97,166,186],"frequency":[98],"spectrum":[99],"matching,":[100],"passive":[102],"attacker":[103],"derive":[105],"map":[108],"use":[114,168,238],"nontrivial":[116],"network":[117],"combined":[122],"works.":[124],"identify":[133],"nodes":[134,165],"fully":[136],"anonymized":[137,221],"using":[140],"collections":[141],"simple":[144],"sensors.":[145],"Based":[146],"time":[149],"series":[150],"counts":[152],"anonymous":[154,234],"packets":[155],"provided":[156],"by":[157],"sensors,":[159,195],"we":[160],"estimate":[161,200],"number":[163],"principal":[170],"component":[171],"analysis.":[172],"then":[174],"proceed":[175],"collected":[179],"packet":[180],"data":[181],"into":[182],"flows":[184],"that,":[185],"help":[187],"spatial":[190],"diversity":[191],"available":[194],"be":[197],"location":[202],"nodes.":[206],"simulation":[208],"indicate":[210,226],"estimators":[213,229],"high":[215,218],"accuracy":[216],"confidence":[219],"TCP":[222],"traffic.":[223],"Additional":[224],"perform":[230],"well":[232],"padding.":[240]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
