{"id":"https://openalex.org/W2532830080","doi":"https://doi.org/10.1145/2976749.2978319","title":"SmartWalk","display_name":"SmartWalk","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2532830080","doi":"https://doi.org/10.1145/2976749.2978319","mag":"2532830080"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978319","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978319","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2976749.2978319","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2976749.2978319","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100670240","display_name":"Yushan Liu","orcid":"https://orcid.org/0009-0009-7607-3306"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yushan Liu","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Zhejiang University &amp; Georgia Tech, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp; Georgia Tech, Zhejiang, China","institution_ids":["https://openalex.org/I130701444","https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015619835","display_name":"Prateek Mittal","orcid":"https://orcid.org/0000-0002-4057-0118"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prateek Mittal","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100670240"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":5.7423,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.96245142,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"492","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-walk","display_name":"Random walk","score":0.8776973485946655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7354186177253723},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6368400454521179},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5465168952941895},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5151365995407104},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4475446939468384},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4420519173145294},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.4283193349838257},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4238974452018738},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4153318405151367},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4121488630771637},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34297674894332886},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.259366512298584},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20402854681015015},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08548682928085327},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.0829954445362091}],"concepts":[{"id":"https://openalex.org/C121194460","wikidata":"https://www.wikidata.org/wiki/Q856741","display_name":"Random walk","level":2,"score":0.8776973485946655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7354186177253723},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6368400454521179},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5465168952941895},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5151365995407104},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4475446939468384},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4420519173145294},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.4283193349838257},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4238974452018738},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4153318405151367},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4121488630771637},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34297674894332886},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.259366512298584},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20402854681015015},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08548682928085327},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.0829954445362091},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978319","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978319","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2976749.2978319","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2976749.2978319","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978319","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2976749.2978319","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/1","display_name":"No poverty"}],"awards":[{"id":"https://openalex.org/G2800119129","display_name":null,"funder_award_id":"CNS-1553437","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3784506589","display_name":"TWC: Medium: Collaborative: Aspire: Leveraging Automated Synthesis Technologies for Enhancing System Security","funder_award_id":"1409415","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5165965387","display_name":"CAREER: Trustworthy Social Systems Using Network Science","funder_award_id":"1553437","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G549728197","display_name":"CIF: Small: Collaborative Research: Analytics on Edge-labeled Hypergraphs: Limits to De-anonymization","funder_award_id":"1617286","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8925538911","display_name":null,"funder_award_id":"CNS-1409415 CNS-1423139 CNS-1553437 CNS-1617286","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320316083","display_name":"Tencent","ror":"https://ror.org/00hhjss72"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2532830080.pdf","grobid_xml":"https://content.openalex.org/works/W2532830080.grobid-xml"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W20667085","https://openalex.org/W195533127","https://openalex.org/W577407893","https://openalex.org/W1502591710","https://openalex.org/W1514107797","https://openalex.org/W1544573083","https://openalex.org/W1551760018","https://openalex.org/W1561898552","https://openalex.org/W1562618793","https://openalex.org/W1587819022","https://openalex.org/W1594972289","https://openalex.org/W1600293573","https://openalex.org/W1630733292","https://openalex.org/W1650252156","https://openalex.org/W1655958391","https://openalex.org/W1822655612","https://openalex.org/W1922851884","https://openalex.org/W1993370323","https://openalex.org/W1994356260","https://openalex.org/W2020470251","https://openalex.org/W2038073775","https://openalex.org/W2039688703","https://openalex.org/W2043694962","https://openalex.org/W2047443612","https://openalex.org/W2075529230","https://openalex.org/W2083694140","https://openalex.org/W2090212887","https://openalex.org/W2095724373","https://openalex.org/W2098509290","https://openalex.org/W2099399367","https://openalex.org/W2101890615","https://openalex.org/W2119404697","https://openalex.org/W2124142520","https://openalex.org/W2124849257","https://openalex.org/W2127503167","https://openalex.org/W2134711723","https://openalex.org/W2142772221","https://openalex.org/W2150941206","https://openalex.org/W2153204928","https://openalex.org/W2154897810","https://openalex.org/W2163898372","https://openalex.org/W2168256531","https://openalex.org/W2168274815","https://openalex.org/W2168508162","https://openalex.org/W2188656998","https://openalex.org/W2233384038","https://openalex.org/W2471517265","https://openalex.org/W2578456176","https://openalex.org/W2755088640","https://openalex.org/W2911964244","https://openalex.org/W2913340405","https://openalex.org/W2950884312","https://openalex.org/W2963807284","https://openalex.org/W4240443285"],"related_works":["https://openalex.org/W1983063916","https://openalex.org/W4362644772","https://openalex.org/W2158052187","https://openalex.org/W2948091038","https://openalex.org/W2116533290","https://openalex.org/W2132828661","https://openalex.org/W2034279876","https://openalex.org/W3004249040","https://openalex.org/W2167351964","https://openalex.org/W2558151157"],"abstract_inverted_index":{"Random":[0],"walks":[1,33,70,177],"form":[2],"a":[3,38,47,62,78,98,117,135,179],"critical":[4],"foundation":[5],"in":[6,71,208],"many":[7],"social":[8,20,39,72,99,182],"network":[9,73,183],"based":[10,92,156,184],"security":[11,21,51,63,74,185],"systems":[12],"and":[13,52,131,144,161,186,194,199],"applications.":[14,75],"Currently,":[15],"the":[16,26,42,87,94,111,125,129,151,158,162,166,172],"design":[17],"of":[18,29,80,97,128,138,174,181,205],"such":[19],"mechanisms":[22],"is":[23],"limited":[24,132],"to":[25,85,202],"classical":[27],"paradigm":[28,45],"using":[30],"fixed-length":[31,43],"random":[32,69,89,146,176],"for":[34,134],"all":[35],"nodes":[36,164],"on":[37,93,103,157,165,178],"graph.":[40,100],"However,":[41],"walk":[44,90,113,147,152],"induces":[46],"poor":[48],"trade-off":[49],"between":[50],"other":[53],"desirable":[54],"properties.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59,108],"propose":[60],"SmartWalk,":[61],"enhancing":[64],"system":[65],"which":[66],"incorporates":[67],"adaptive":[68,175],"We":[76,141,169],"utilize":[77],"set":[79,137],"supervised":[81],"machine":[82],"learning":[83],"techniques":[84],"predict":[86],"necessary":[88],"length":[91,114,153],"structural":[95],"characteristics":[96],"Using":[101],"experiments":[102],"multiple":[104],"real":[105],"world":[106],"topologies,":[107],"show":[109,200],"that":[110],"desired":[112],"starting":[115,159],"from":[116],"specific":[118],"node":[119,160],"can":[120],"be":[121],"well":[122],"predicted":[123],"given":[124],"local":[126],"features":[127],"node,":[130],"knowledge":[133],"small":[136],"training":[139],"nodes.":[140],"describe":[142],"node-adaptive":[143],"path-adaptive":[145],"usage":[148],"models,":[149],"where":[150],"adaptively":[154],"changes":[155],"intermediate":[163],"path,":[167],"respectively.":[168],"experimentally":[170],"demonstrate":[171],"applicability":[173],"number":[180],"privacy":[187,196],"systems,":[188,198],"including":[189],"Sybil":[190],"defenses,":[191],"anonymous":[192],"communication":[193],"link":[195],"preserving":[197],"up":[201],"two":[203],"orders":[204],"magnitude":[206],"improvement":[207],"performance.":[209]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2016-10-28T00:00:00"}
