Detection of Internet Water Army in Social Network
暂无分享,去创建一个
[1] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[2] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[3] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[4] Charu C. Aggarwal,et al. On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.
[5] Yejin Choi,et al. Distributional Footprints of Deceptive Product Reviews , 2012, ICWSM.
[6] C. Barr Taylor,et al. Evaluation of computerized text analysis in an Internet breast cancer support group , 2005, Comput. Hum. Behav..
[7] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[8] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.
[9] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[10] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[11] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[12] S. Asch. Studies of independence and conformity: I. A minority of one against a unanimous majority. , 1956 .
[13] Walter Willinger,et al. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference , 2011, IMC 2011.
[14] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[15] Srinivasan Venkatesh,et al. Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[16] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[17] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.