暂无分享,去创建一个
Gang Wang | Ben Y. Zhao | Christo Wilson | Yibo Zhu | Haitao Zheng | Xiaohan Zhao | Manish Mohanlal | G. Wang | Yibo Zhu | Haitao Zheng | Xiaohan Zhao | Christo Wilson | M. Mohanlal
[1] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[2] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[3] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[4] Panagiotis G. Ipeirotis. Demographics of Mechanical Turk , 2010 .
[5] Steven M. Seitz,et al. Photo tourism: exploring photo collections in 3D , 2006, ACM Trans. Graph..
[6] Christopher Krügel,et al. Understanding fraudulent activities in online ad exchanges , 2011, IMC '11.
[7] Ben Y. Zhao,et al. Uncovering social network Sybils in the wild , 2011, ACM Trans. Knowl. Discov. Data.
[8] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[9] Srinivasan Venkatesh,et al. Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[10] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.
[11] Jim Giles. Inside Facebook's massive cyber-security system , 2011 .
[12] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[13] Phuoc Tran-Gia,et al. Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.com , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[14] Aniket Kittur,et al. Crowdsourcing user studies with Mechanical Turk , 2008, CHI.
[15] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[16] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[17] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[18] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[19] Björn Hartmann,et al. What's the Right Price? Pricing Tasks for Finishing on Time , 2011, Human Computation.
[20] Ee-Peng Lim,et al. Finding unusual review patterns using unexpected rules , 2010, CIKM.
[21] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[22] Panagiotis G. Ipeirotis. Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.
[23] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[24] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.