Characterizing and automatically detecting crowdturfing in Fiverr and Twitter
暂无分享,去创建一个
[1] Michael S. Bernstein,et al. Soylent: a word processor with a crowd inside , 2010, UIST.
[2] Srinivasan Venkatesh,et al. Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[3] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[4] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[5] Kyumin Lee,et al. The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing , 2014, ICWSM.
[6] Hector Garcia-Molina,et al. Quality control for comparison microtasks , 2012, CrowdKDD '12.
[7] Ian H. Witten,et al. Data mining - practical machine learning tools and techniques, Second Edition , 2005, The Morgan Kaufmann series in data management systems.
[8] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[9] Загоровская Ольга Владимировна,et al. Исследование влияния пола и психологических характеристик автора на количественные параметры его текста с использованием программы Linguistic Inquiry and Word Count , 2015 .
[10] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[11] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[12] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.
[13] Tim Kraska,et al. CrowdDB: answering queries with crowdsourcing , 2011, SIGMOD '11.
[14] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[15] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.
[16] D. Funder,et al. Personality as manifest in word use: correlations with self-report, acquaintance report, and behavior. , 2008, Journal of personality and social psychology.
[17] Hector Garcia-Molina,et al. Turkalytics: analytics for human computation , 2011, WWW.
[18] Hisashi Kashima,et al. Leveraging non-expert crowdsourcing workers for improper task detection in crowdsourcing marketplaces , 2014, Expert Syst. Appl..
[19] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[20] Roi Blanco,et al. Machine-Learning for Spammer Detection in Crowd-Sourcing , 2012, HCOMP@AAAI.
[21] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[22] Jon Oberlander,et al. What Are They Blogging About? Personality, Topic and Motivation in Blogs , 2009, ICWSM.
[23] Yiming Yang,et al. A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.
[24] Kyumin Lee,et al. Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media , 2013, ICWSM.
[25] Elisa Bertino,et al. Quality Control in Crowdsourcing Systems: Issues and Directions , 2013, IEEE Internet Computing.