SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks
暂无分享,去创建一个
M. Shamim Hossain | Muhammad Al-Qurishi | Atif Alamri | B. B. Gupta | Majed A. AlRubaian | Sk. Md. Mizanur Rahman | Mohamed A. Mostafa | M. S. Hossain | B. Gupta | Atif Alamri | Majed Alrubaian | Muhammad Al-Qurishi | S. Rahman | Mohamed A. Mostafa
[1] Yazan Boshmaf,et al. A Quick Survey of Social Network-based Sybil Defenses , 2012 .
[2] Muhammad Al-Qurishi,et al. Reputation‐based credibility analysis of Twitter social network users , 2017, Concurr. Comput. Pract. Exp..
[3] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[4] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[5] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[6] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Konstantin Beznosov,et al. Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs , 2016, Comput. Secur..
[8] Peng Gao,et al. SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection , 2015, ArXiv.
[9] Xiao Wang,et al. Understanding Sybil Groups in the Wild , 2015, Journal of Computer Science and Technology.
[10] M. Shamim Hossain,et al. Relational User Attribute Inference in Social Media , 2015, IEEE Transactions on Multimedia.
[11] Zhuhua Cai,et al. The Latent Community Model for Detecting Sybil Attacks in Social Networks , 2011 .
[12] Xiao Wang,et al. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.
[13] Muhammad Al-Qurishi,et al. A novel prevention mechanism for Sybil attack in online social network , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).
[14] Chris Jermaine,et al. The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.
[15] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[16] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[17] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[18] Guandong Xu,et al. Intelligent Sybil Attack Detection on Abnormal Connectivity Behavior in Mobile Social Networks , 2015, KMO.
[19] William G. Kennedy,et al. Social Computing, Behavioral-Cultural Modeling and Prediction , 2013, Lecture Notes in Computer Science.
[20] M. Shamim Hossain,et al. A Location-Based Mobile Crowdsensing Framework Supporting a Massive Ad Hoc Social Network Environment , 2017, IEEE Communications Magazine.
[21] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[22] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[23] Muhammad Al-Qurishi,et al. Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.
[24] M. Shamim Hossain,et al. Collaborative analysis model for trending images on social networks , 2017, Future Gener. Comput. Syst..
[25] Jie Zhang,et al. Improving Sybil Detection via Graph Pruning and Regularization Techniques , 2015, ACML.
[26] Prateek Mittal,et al. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.
[27] M. Shamim Hossain,et al. Social Event Classification via Boosted Multimodal Supervised Latent Dirichlet Allocation , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[28] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[29] Hossein Hamooni,et al. Identifying Correlated Bots in Twitter , 2016, SocInfo.
[30] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.
[31] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[32] Yu Wang,et al. Statistical Features-Based Real-Time Detection of Drifted Twitter Spam , 2017, IEEE Transactions on Information Forensics and Security.
[33] Prateek Mittal,et al. SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.
[34] Muhammad Al-Qurishi,et al. A Credibility Analysis System for Assessing Information on Twitter , 2018, IEEE Transactions on Dependable and Secure Computing.
[35] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[36] Krishna P. Gummadi,et al. Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.
[37] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[38] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[39] Satyajayant Misra,et al. SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[40] Konstantin Beznosov,et al. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.
[41] Xiaowei Yang,et al. SybilFence: Improving Social-Graph-Based Sybil Defenses with User Negative Feedback , 2013, ArXiv.
[42] Fengyuan Xu,et al. SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[43] Silvio Lattanzi,et al. Communities, Random Walks, and Social Sybil Defense , 2014, Internet Math..