Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning
暂无分享,去创建一个
Sajal K. Das | Sajal K. Das | Rashmi Ranjan Rout | Greeshma Lingam | DVLN Somayajulu | R. R. Rout | D. Somayajulu | G. Lingam
[1] Jinyuan Jia,et al. Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Guanhua Yan,et al. The Rise of Social Botnets: Attacks and Countermeasures , 2016, IEEE Transactions on Dependable and Secure Computing.
[3] Xiao Wang,et al. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.
[4] Feifan Wang,et al. Deep Auto-encoded Clustering Algorithm for Community Detection in Complex Networks , 2019 .
[5] Fengyuan Xu,et al. SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[6] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[7] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[8] Robert D. Nowak,et al. Active Clustering: Robust and Efficient Hierarchical Clustering using Adaptively Selected Similarities , 2011, AISTATS.
[9] Chong-kwon Kim,et al. Toward trustworthy social network services: A robust design of recommender systems , 2015, Journal of Communications and Networks.
[10] Gianluca Stringhini,et al. Poultry markets: on the underground economy of twitter followers , 2012, CCRV.
[11] Jing Wang,et al. Botnet Detection Based on Anomaly and Community Detection , 2017, IEEE Transactions on Control of Network Systems.
[12] Roberto Di Pietro,et al. The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.
[13] Paul D. Yoo,et al. IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction , 2020, IEEE Access.
[14] Laxmi Ahuja,et al. Detecting redirection spam using multilayer perceptron neural network , 2017, Soft Computing.
[15] Amos Azaria,et al. The DARPA Twitter Bot Challenge , 2016, Computer.
[16] Le Zhang,et al. Structure-Based Sybil Detection in Social Networks via Local Rule-Based Propagation , 2018, IEEE Transactions on Network Science and Engineering.
[17] Fereshteh-Azadi Parand,et al. Combining fuzzy logic and eigenvector centrality measure in social network analysis , 2016 .
[18] Xiao Liang,et al. Detecting Fake Accounts in Online Social Networks at the Time of Registrations , 2019, CCS.
[19] Raúl Monroy,et al. Contrast Pattern-Based Classification for Bot Detection on Twitter , 2019, IEEE Access.
[20] Qun Jin,et al. Enriching user search experience by mining social streams with heuristic stones and associative ripples , 2012, Multimedia Tools and Applications.
[21] Emilio Ferrara,et al. Deep Neural Networks for Bot Detection , 2018, Inf. Sci..
[22] Jianshe Wu,et al. Partition signed social networks via clustering dynamics , 2016 .
[23] Hossam Faris,et al. Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts , 2018, Knowl. Based Syst..
[24] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[25] Rashmi Ranjan Rout,et al. Detection of Social Botnet using a Trust Model based on Spam Content in Twitter Network , 2018, 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS).
[26] P. Santhi Thilagam,et al. Discovering spammer communities in twitter , 2017, Journal of Intelligent Information Systems.
[27] D. V. L. N. Somayajulu,et al. Adaptive deep Q-learning model for detecting social bots and influential users in online social networks , 2019, Applied Intelligence.
[28] Guanhua Yan,et al. Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks , 2013, Comput. Networks.
[29] Kim-Kwang Raymond Choo,et al. Detecting Malicious Social Bots Based on Clickstream Sequences , 2019, IEEE Access.
[30] Muhammad Al-Qurishi,et al. Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks , 2018, IEEE Transactions on Industrial Informatics.