Detecting Bots and Assessing Their Impact in Social Networks
暂无分享,去创建一个
Tauhid Zaman | Zakaria el Hjouji | Nicolas Guenon des Mesnards | David Scott Hunter | Tauhid Zaman | Seungju KIM
[1] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[2] Qiang Cao,et al. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.
[3] S. Galam,et al. The role of inflexible minorities in the breaking of democratic opinion dynamics , 2007, physics/0703021.
[4] Giacomo Como,et al. Opinion Fluctuations and Disagreement in Social Networks , 2010 .
[5] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[6] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[7] Max Nanis,et al. Socialbots: voices from the fronts , 2012, INTR.
[8] R. Holley,et al. Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model , 1975 .
[9] Tauhid Zaman,et al. Optimizing Opinions with Stubborn Agents Under Time-Varying Dynamics , 2018 .
[10] John N. Tsitsiklis,et al. Convergence Speed in Distributed Consensus and Averaging , 2009, SIAM J. Control. Optim..
[11] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[12] Ilan Lobel,et al. BAYESIAN LEARNING IN SOCIAL NETWORKS , 2008 .
[13] Lawrence Gray,et al. Duality for General Attractive Spin Systems with Applications in One Dimension , 1986 .
[14] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[15] J. T. Cox,et al. Diffusive Clustering in the Two Dimensional Voter Model , 1986 .
[16] Tauhid Zaman,et al. Opinion Dynamics with Stubborn Agents , 2018, ArXiv.
[17] John N. Tsitsiklis,et al. Problems in decentralized decision making and computation , 1984 .
[18] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[19] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.
[20] D. Rubin. Causal Inference Using Potential Outcomes , 2005 .
[21] E. Rogers,et al. HOMOPHILY-HETEROPHILY: RELATIONAL CONCEPTS FOR COMMUNICATION RESEARCH , 1970 .
[22] F. Barahona. On the computational complexity of Ising spin glass models , 1982 .
[23] Vladimir Kolmogorov,et al. What energy functions can be minimized via graph cuts? , 2002, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] Filippo Menczer,et al. BotOrNot: A System to Evaluate Social Bots , 2016, WWW.
[25] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[26] S. Redner,et al. Voter model on heterogeneous graphs. , 2004, Physical review letters.
[27] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[28] Omer Levy,et al. word2vec Explained: deriving Mikolov et al.'s negative-sampling word-embedding method , 2014, ArXiv.
[29] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[30] Mehmet E. Yildiz,et al. Binary Opinion Dynamics with Stubborn Agents , 2013, TEAC.
[31] Eva Zangerle,et al. "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.
[32] Christopher Marks,et al. Building a Location-Based Set of Social Media Users , 2017, Oper. Res..
[33] Jie Lin,et al. Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..
[34] Hanghang Tong,et al. Big data classification , 2014 .
[35] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[36] R. Zabih,et al. Spatially coherent clustering using graph cuts , 2004, CVPR 2004.
[37] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[38] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[39] Alex Hai Wang,et al. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.
[40] Douglas Gale,et al. Bayesian learning in social networks , 2003, Games Econ. Behav..
[41] Piotr Sapiezynski,et al. Evidence of complex contagion of information in social media: An experiment using Twitter bots , 2017, PloS one.
[42] Timothy Baldwin,et al. Text-Based Twitter User Geolocation Prediction , 2014, J. Artif. Intell. Res..
[43] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[44] Hansjörg Neth,et al. Social Influence and the Collective Dynamics of Opinion Formation , 2013, PloS one.
[45] Asuman E. Ozdaglar,et al. Opinion Fluctuations and Disagreement in Social Networks , 2010, Math. Oper. Res..
[46] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[47] S. Redner,et al. On the role of zealotry in the voter model , 2007 .
[48] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[49] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[50] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[51] Emilio Ferrara,et al. Disinformation and Social Bot Operations in the Run Up to the 2017 French Presidential Election , 2017, First Monday.
[52] Sinan Aral,et al. The spread of true and false news online , 2018, Science.
[53] Emilio Ferrara,et al. Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.
[54] E. Seneta,et al. Towards consensus: some convergence theorems on repeated averaging , 1977, Journal of Applied Probability.
[55] M. Degroot. Reaching a Consensus , 1974 .
[56] Jytte Klausen,et al. Finding Extremists in Online Social Networks , 2018, Oper. Res..
[57] Danah Boyd,et al. Detecting Spam in a Twitter Network , 2009, First Monday.
[58] A. Banerjee,et al. A Simple Model of Herd Behavior , 1992 .
[59] P. Clifford,et al. A model for spatial conflict , 1973 .
[60] John N. Tsitsiklis,et al. Distributed Asynchronous Deterministic and Stochastic Gradient Optimization Algorithms , 1984, 1984 American Control Conference.
[61] Krapivsky. Kinetics of monomer-monomer surface catalytic reactions. , 1992, Physical review. A, Atomic, molecular, and optical physics.
[62] S. Bikhchandani,et al. You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .
[63] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[64] Amir Herzberg,et al. Ethical Considerations when Employing Fake Identities in Online Social Networks for Research , 2014, Sci. Eng. Ethics.
[65] Kristina Lerman,et al. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[66] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[67] Drew Fudenberg,et al. Word-of-mouth learning , 2004, Games Econ. Behav..
[68] E. Ising. Beitrag zur Theorie des Ferromagnetismus , 1925 .
[69] John N. Tsitsiklis,et al. Distributed asynchronous deterministic and stochastic gradient optimization algorithms , 1986 .
[70] R. Srikant,et al. Opinion dynamics in social networks: A local interaction game with stubborn agents , 2012, 2013 American Control Conference.
[71] Tauhid Zaman,et al. Detecting Influence Campaigns in Social Networks Using the Ising Model , 2018, ArXiv.
[72] Dean Eckles,et al. Protecting elections from social media manipulation , 2019, Science.
[73] B. Huberman,et al. Social Structure and Opinion Formation , 2004, cond-mat/0407252.
[74] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[75] Rami Puzis,et al. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks , 2017, IEEE Transactions on Computational Social Systems.
[76] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[77] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[78] Derek Ruths,et al. Geolocation Prediction in Twitter Using Social Networks: A Critical Analysis and Review of Current Practice , 2015, ICWSM.
[79] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[80] Dan Braha,et al. Dynamical Response of Networks Under External Perturbations: Exact Results , 2007, 0705.4607.
[81] Dan Mercea,et al. The Brexit Botnet and User-Generated Hyperpartisan News , 2017 .