A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks
暂无分享,去创建一个
Hongliang Zhu | Yang Xin | Chensu Zhao | Mingcheng Gao | Yang Xin | Hongliang Zhu | Chensu Zhao | Mingcheng Gao
[1] Jinyuan Jia,et al. Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[3] Keke Gai,et al. A survey on FinTech , 2018, J. Netw. Comput. Appl..
[4] Fenglong Ma,et al. Discovering social spammers from multiple views , 2017, Neurocomputing.
[5] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[6] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[7] S. Santhosinidevi,et al. Towards Detecting Compromised Accounts on Social Networks , 2018 .
[8] Mohammad Karim Sohrabi,et al. A Feature Selection Approach to Detect Spam in the Facebook Social Network , 2018 .
[9] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[10] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[11] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[12] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.
[13] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[14] Gianluca Stringhini,et al. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services , 2015, USENIX Security Symposium.
[15] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[16] Eva Zangerle,et al. "Sorry, I was hacked": a classification of compromised twitter accounts , 2014, SAC.
[17] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[18] Michalis Faloutsos,et al. An analysis of socware cascades in online social networks , 2013, WWW.
[19] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[20] Xiaowei Ying,et al. Spectrum based fraud detection in social networks , 2011, ICDE.
[21] Muhammad Al-Qurishi,et al. Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.
[22] Cao Xiao,et al. Detecting Clusters of Fake Accounts in Online Social Networks , 2015, AISec@CCS.
[23] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[24] Songqing Chen,et al. UNIK: unsupervised social network spam detection , 2013, CIKM.
[25] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[26] Indrajit Ray,et al. SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks , 2016, SEC.
[27] Muhammad Abulaish,et al. An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[28] Keke Gai,et al. Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.
[29] Teng-Sheng Moh,et al. Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers , 2010, ICISTM.