Zombie Follower Recognition Based on Industrial Chain Feature Analysis
暂无分享,去创建一个
Jiayong Liu | Pengsen Cheng | Juan Tang | Cheng Huang | Hualu Xu | Xun Tang
[1] Christos Faloutsos,et al. Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.
[2] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[3] Muhammad Abulaish,et al. Identifying active, reactive, and inactive targets of socialbots in Twitter , 2017, WI.
[4] Michael S. Bernstein,et al. Anyone Can Become a Troll: Causes of Trolling Behavior in Online Discussions , 2017, CSCW.
[5] V. S. Subrahmanian,et al. Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[6] Gianluca Stringhini,et al. Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[7] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[8] Jian Cao,et al. Combating the evasion mechanisms of social bots , 2016, Comput. Secur..
[9] Stefan Stieglitz,et al. Do Social Bots (Still) Act Different to Humans? - Comparing Metrics of Social Bots with Those of Humans , 2017, HCI.
[10] Mihály Héder. A black market for upvotes and likes , 2018, ArXiv.
[11] Jong Kim,et al. WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.
[12] Emiliano De Cristofaro,et al. Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots , 2014, Internet Measurement Conference.
[13] Jure Leskovec,et al. MIS2: Misinformation and Misbehavior Mining on the Web , 2018, WSDM.
[14] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Orestis Papakyriakopoulos,et al. Effects of Social Bots in the Iran-Debate on Twitter , 2018, ArXiv.
[16] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[17] Yibo Wang,et al. Discrimination of Zombie Fans on Weibo based on Features Extraction and Business-Driven Analysis , 2015, ICEC '15.
[18] Eva Zangerle,et al. "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.
[19] Jure Leskovec,et al. Antisocial Behavior in Online Discussion Communities , 2015, ICWSM.
[20] Neil Shah,et al. False Information on Web and Social Media: A Survey , 2018, ArXiv.
[21] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[22] Yi Zhang,et al. Discover millions of fake followers in Weibo , 2016, Social Network Analysis and Mining.
[23] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[24] V. S. Subrahmanian,et al. An Army of Me: Sockpuppets in Online Discussion Communities , 2017, WWW.
[25] D. Paulhus,et al. Trolls just want to have fun , 2014 .
[26] Emiliano De Cristofaro,et al. Measuring, Characterizing, and Detecting Facebook Like Farms , 2017, ACM Trans. Priv. Secur..
[27] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.
[28] Aishik Chakraborty,et al. Detection of Sockpuppets in Social Media , 2017, CSCW Companion.
[29] Wookey Lee,et al. Find spammers by using graph structure , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).
[30] Jianjun Yu,et al. Automatic Fake Followers Detection in Chinese Micro-blogging System , 2014, PAKDD.
[31] Maghsood Abbaspour,et al. An empirical study of the effect of profile and behavioral characteristics on the infiltration rate of socialbots , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).
[32] Huakang Li,et al. 基于行为特征分析的微博恶意用户识别 (Microblogging Malicious User Identification Based on Behavior Characteristic Analysis) , 2018, 计算机科学.
[33] Christos Faloutsos,et al. Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.
[34] Xin Wang,et al. Deep Learning-Based Malicious Account Detection in the Momo Social Network , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[35] Hua Shen,et al. Detecting Spammers on Twitter Based on Content and Social Interaction , 2015, 2015 International Conference on Network and Information Systems for Computers.
[36] Huan Liu,et al. Online Social Spammer Detection , 2014, AAAI.