An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service
暂无分享,去创建一个
Angelos Stavrou | Daiping Liu | Haining Wang | Haitao Xu | A. Stavrou | Haining Wang | Haitao Xu | Daiping Liu
[1] Stefan Savage,et al. Priceless: the role of payments in abuse-advertised goods , 2012, CCS.
[2] Dina Mayzlin,et al. Promotional Reviews: An Empirical Investigation of Online Review Manipulation , 2012 .
[3] Christos Faloutsos,et al. Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.
[4] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[5] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[6] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[7] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[8] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[9] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.
[10] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[11] Panagiotis G. Ipeirotis,et al. Quality management on Amazon Mechanical Turk , 2010, HCOMP '10.
[12] Markus Jakobsson,et al. Scambaiter: Understanding Targeted Nigerian Scams on Craigslist , 2014, NDSS.
[13] Steven Tadelis,et al. The Limits of Reputation in Platform Markets: An Empirical Analysis and Field Experiment , 2015 .
[14] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[15] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[16] Chris Kanich,et al. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.
[17] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[18] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[19] Angelos Stavrou,et al. E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service , 2015, WWW.
[20] Gayatri Swamynathan,et al. The design of a reliable reputation system , 2010, Electron. Commer. Res..
[21] Mihaela van der Schaar,et al. Towards Social Norm Design for Crowdsourcing Markets , 2012, HCOMP@AAAI.
[22] Claire Cardie,et al. Estimating the prevalence of deception in online review communities , 2012, WWW.
[23] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[24] Claire Cardie,et al. Identifying Manipulated Offerings on Review Portals , 2013, EMNLP.
[25] Leman Akoglu,et al. Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.
[26] Hsin-Hsi Chen,et al. Opinion Spam Detection in Web Forum: A Real Case Study , 2015, WWW.
[27] Lilly Irani,et al. Amazon Mechanical Turk , 2018, Advances in Intelligent Systems and Computing.
[28] Chrysanthos Dellarocas,et al. The Sound of Silence in Online Feedback: Estimating Trading Risks in the Presence of Reporting Bias , 2006, Manag. Sci..
[29] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.