Graph Based Local Risk Estimation in Large Scale Online Social Networks
暂无分享,去创建一个
[1] Barbara Carminati,et al. Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[2] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[3] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[4] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[5] Jian Tang,et al. On Complementarity of Cluster and Outlier Detection Schemes , 2003, DaWaK.
[6] Haifeng Chen,et al. Fault detection and localization in distributed systems using invariant relationships , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[7] Christos Faloutsos,et al. It's who you know: graph mining using recursive structural features , 2011, KDD.
[8] Anthony K. H. Tung,et al. Ranking Outliers Using Symmetric Neighborhood Relationship , 2006, PAKDD.
[9] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[10] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[11] Christos Faloutsos,et al. Metric forensics: a multi-level approach for mining volatile graphs , 2010, KDD.
[12] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[13] Luca Becchetti,et al. Link-Based Characterization and Detection of Web Spam , 2006, AIRWeb.
[14] Ee-Peng Lim,et al. Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles , 2012, 2012 IEEE 12th International Conference on Data Mining.
[15] Marco Rosa,et al. Four degrees of separation , 2011, WebSci '12.
[16] Shaik. AshaBee,et al. Towards Online Spam Filtering In Social Networks , 2017 .
[17] Konstantin Beznosov,et al. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.
[18] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[19] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[20] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[21] Mohammad Abdollahi Azgomi,et al. A hybrid fraud scoring and spike detection technique in streaming data , 2010, Intell. Data Anal..
[22] Konstantin Beznosov,et al. Graph-based Sybil Detection in social and information systems , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[23] Christos Faloutsos,et al. oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.
[24] Paul Barford,et al. Intrusion as (anti)social communication: characterization and detection , 2012, KDD.