Detecting and Mitigating the Effect of Manipulated Reputation on Online Social Networks
暂无分享,去创建一个
[1] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[2] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[3] Gang Wang,et al. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.
[4] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[5] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[6] Kyumin Lee,et al. Characterizing and automatically detecting crowdturfing in Fiverr and Twitter , 2015, Social Network Analysis and Mining.
[7] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[8] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[9] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[10] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[11] Haining Wang,et al. Detecting Social Spam Campaigns on Twitter , 2012, ACNS.
[12] Ponnurangam Kumaraguru,et al. What they do in shadows: Twitter underground follower market , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[13] Krishna P. Gummadi,et al. Strength in Numbers: Robust Tamper Detection in Crowd Computations , 2015, COSN.
[14] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.