Detecting spams in social networks using ML algorithms - a review
暂无分享,去创建一个
[1] Michalis Faloutsos,et al. Detecting Malicious Facebook Applications , 2016, IEEE/ACM Transactions on Networking.
[2] Harpreet Kaur,et al. Spatial big data analytics of influenza epidemic in Vellore, India , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[3] M. N. Masrek,et al. Comparison of Machine Learning algorithms performance in detecting network intrusion , 2010, 2010 International Conference on Networking and Information Technology.
[4] Anthony Corso,et al. We Know Where You Are Tweeting From: Assigning a Type of Place to Tweets Using Natural Language Processing and Random Forests , 2014, 2014 IEEE International Congress on Big Data.
[5] H. N. Suresh,et al. A novel method for image processing using Particle Swarm Optimization technique , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[6] Samit Bhattacharya,et al. Classification of web pages on attractiveness: A supervised learning approach , 2012, 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI).
[7] R. I. Woodward,et al. Self-optimizing mode-locked laser using a genetic algorithm , 2016, 2016 Conference on Lasers and Electro-Optics (CLEO).
[8] Chao Yang,et al. CATS: Characterizing automation of Twitter spammers , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[9] AbdulMalik S. Al-Salman,et al. Combating Comment Spam with Machine Learning Approaches , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[10] Binxing Fang,et al. Detecting Tag Spam in Social Tagging Systems with Collaborative Knowledge , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[11] Vo Thi Ngoc Chau,et al. Automatic de-identification of medical records with a multilevel hybrid semi-supervised learning approach , 2016, 2016 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF).
[12] Mehrdad Jalali,et al. Spam detection in social networks: A review , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).
[13] Nikola Vlahovic. An evaluation framework and a brief survey of decision tree tools , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[14] Blake D. Bryant,et al. IEEE Transactions on Information Forensics and Security , 2018 .
[15] Paolo Gastaldo,et al. Semi-supervised machine learning approach for unknown malicious software detection , 2014, 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings.
[16] Bo Sun,et al. A survey of user classification in social networks , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[17] Xiao Chen,et al. 6 million spam tweets: A large ground truth for timely Twitter spam detection , 2015, 2015 IEEE International Conference on Communications (ICC).
[18] Michal Prilepok,et al. Spam Detection Based on Nearest Community Classifier , 2015, 2015 International Conference on Intelligent Networking and Collaborative Systems.
[19] Rishabh Kaushal,et al. Ecosystem of spamming on Twitter: Analysis of spam reporters and spam reportees , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[20] Jiawei Han,et al. Survey on web spam detection: principles and algorithms , 2012, SKDD.
[21] Nik Bessis,et al. A hybrid spam detection method based on unstructured datasets , 2017, Soft Comput..
[22] Jun Zhang,et al. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection , 2015, IEEE Transactions on Computational Social Systems.
[23] Alex Alves Freitas,et al. Towards the automatic design of decision tree induction algorithms , 2011, GECCO.
[24] Tahir Mehmood,et al. Machine learning algorithms in context of intrusion detection , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[25] G. Usha Devi,et al. Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles , 2017, Cluster Computing.
[26] Uzma Maroof,et al. Analysis and detection of SPIM using message statistics , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[27] Deng Libao,et al. A Hybrid Mutation Scheme-Based Discrete Differential Evolution Algorithm for Multidimensional Knapsack Problem , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).
[28] Na Li,et al. Detecting and filtering instant messaging spam - a global and personalized approach , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[29] Tiago A. Almeida,et al. TubeSpam: Comment Spam Filtering on YouTube , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[30] Kelton A. P. Costa,et al. Spam intrusion detection in computer networks using intelligent techniques , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[31] Thomas M. Chen,et al. Proliferation and Detection of Blog Spam , 2010, IEEE Security & Privacy.
[32] Sunil B. Rathod,et al. Content based spam detection in email using Bayesian classifier , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[33] Fabricio A. Breve,et al. Combined unsupervised and semi-supervised learning for data classification , 2016, 2016 IEEE 26th International Workshop on Machine Learning for Signal Processing (MLSP).
[34] Lin Zhang,et al. Exploring mobile users and their effects in online social networks: A Twitter case study , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[35] Rim Faiz,et al. SVM based approach for opinion classification in Arabic written tweets , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[36] Bin-Xing Fang,et al. Comparison of machine learning algorithms in Chinese Web filtering , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[37] Phivos Mylonas,et al. Types of contextual information in the social networks era , 2016, 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP).
[38] Weiqing Sun,et al. Efficient spam detection across Online Social Networks , 2016, 2016 IEEE International Conference on Big Data Analysis (ICBDA).
[39] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[40] Jenq-Haur Wang,et al. Using Inter-comment Similarity for Comment Spam Detection in Chinese Blogs , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[41] Paolo Gastaldo,et al. A machine learning approach for Twitter spammers detection , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[42] M. Manoj. Finest Source-Based Refinery of Spam in Networks , 2017 .
[43] Ahmed Hamza Osman,et al. Enhancement of spam detection mechanism based on hybrid $$\varvec{k}$$k-mean clustering and support vector machine , 2015, Soft Comput..
[44] Zhong Chen,et al. SpamClean: Towards Spam-Free Tagging Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[45] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.