SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
暂无分享,去创建一个
Chunhua Su | Weijia Jia | Yu Lu | Dandan Xu | Na Ruan | Ruoyu Deng | Ruidong Jin | Chunhua Su | Na Ruan | Weijia Jia | Ruoyu Deng | Ruidong Jin | Yu Lu | Dandan Xu
[1] Hao Chen,et al. Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets , 2017, AsiaCCS.
[2] Gianluca Stringhini,et al. POISED: Spotting Twitter Spam Off the Beaten Paths , 2017, CCS.
[3] Ben Y. Zhao,et al. Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.
[4] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[5] Xiaolong Li,et al. You are where you have been: Sybil detection via geo-location analysis in OSNs , 2014, 2014 IEEE Global Communications Conference.
[6] Florence Sèdes,et al. A Topic-Based Hidden Markov Model for Real-Time Spam Tweets Filtering , 2017, KES.
[7] Xiaohui Liang,et al. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks , 2017, NDSS.
[8] Christos Faloutsos,et al. VolTime: Unsupervised Anomaly Detection on Users' Online Activity Volume , 2017, SDM.
[9] Bing Liu,et al. Spotting Fake Reviews via Collective Positive-Unlabeled Learning , 2014, 2014 IEEE International Conference on Data Mining.
[10] Chuan-Hoo Tan,et al. Leveraging O2O Commerce for Product Promotion: An Empirical Investigation in Mainland China , 2014, IEEE Transactions on Engineering Management.
[11] Xin Wang,et al. DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks , 2018, IEEE Communications Magazine.
[12] Weixiang Shao,et al. Bimodal Distribution and Co-Bursting in Review Spam Detection , 2017, WWW.
[13] Fabrizio Silvestri,et al. Know your neighbors: web spam detection using the web topology , 2007, SIGIR.
[14] Masrah Azrifah Azmi Murad,et al. Detecting deceptive reviews using lexical and syntactic features , 2013, 2013 13th International Conference on Intellient Systems Design and Applications.
[15] Arjun Mukherjee,et al. Spotting fake reviewer groups in consumer reviews , 2012, WWW.
[16] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[17] Weijia Jia,et al. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[18] Santosh Kumar,et al. A Machine Learning Based Web Spam Filtering Approach , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[19] Jiawei Han,et al. Survey on web spam detection: principles and algorithms , 2012, SKDD.
[20] Arjun Mukherjee,et al. On the Temporal Dynamics of Opinion Spamming: Case Studies on Yelp , 2016, WWW.
[21] Mohit Agrawal,et al. Unsupervised Spam Detection in Hyves Using SALSA , 2015, FICTA.
[22] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.
[23] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[24] Srinivasan Venkatesh,et al. Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[25] Duncan J. Watts,et al. Characterizing individual communication patterns , 2009, KDD.
[26] Sukomal Pal,et al. Recent developments in social spam detection and combating techniques: A survey , 2016, Inf. Process. Manag..