ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions
暂无分享,去创建一个
Lili Liu | Junjie Zhang | Ting Liu | Huan Jin | Yadong Zhou | Dae Wook Kim | Hongbo Jin | Junjie Zhang | Ting Liu | Huan Jin | Yadong Zhou | Lili Liu | D. Kim | Hongbo Jin
[1] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[2] Sushil Jajodia,et al. Blog or block: Detecting blog bots through behavioral biometrics , 2013, Comput. Networks.
[3] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[4] Yao Zhao,et al. BotGraph: Large Scale Spamming Botnet Detection , 2009, NSDI.
[5] Huan Liu,et al. Online Social Spammer Detection , 2014, AAAI.
[6] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[7] J. Gans,et al. Some Economics of Private Digital Currency , 2013 .
[8] Fangzhao Wu,et al. Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization , 2015, CIKM.
[9] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[10] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[11] David C. Yen,et al. Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts' judgments , 2015, Knowl. Based Syst..
[12] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[13] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[14] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[15] Hsin-Hsi Chen,et al. Opinion Spammer Detection in Web Forum , 2015, SIGIR.
[16] Dominik Olszewski,et al. Fraud detection using self-organizing map visualizing the user profiles , 2014, Knowl. Based Syst..
[17] Wei Hu,et al. Twitter spammer detection using data stream clustering , 2014, Inf. Sci..
[18] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.
[19] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[20] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[21] James R. Foulds,et al. Collective Spammer Detection in Evolving Multi-Relational Social Networks , 2015, KDD.
[22] Teng-Sheng Moh,et al. Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers , 2010, ICISTM.
[23] Huan Liu,et al. Leveraging knowledge across media for spammer detection in microblogging , 2014, SIGIR.
[24] Maumita Bhattacharya,et al. Intelligent Financial Fraud Detection: A Comprehensive Review , 2015 .
[25] Martijn J. Schuemie,et al. Improving sensitivity of machine learning methods for automated case identification from free-text electronic medical records , 2013, BMC Medical Informatics and Decision Making.
[26] Yang Wang,et al. Human-Currency Interaction: learning from virtual currency use in China , 2008, CHI.
[27] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[28] Leslie M. Collins,et al. Financial fraud detection using vocal, linguistic and financial cues , 2015, Decis. Support Syst..