Exploitation in Human Computation Systems
暂无分享,去创建一个
[1] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[2] Michael S. Bernstein,et al. Mechanical Turk is Not Anonymous , 2013 .
[3] M. Six Silberman,et al. Turkopticon: interrupting worker invisibility in amazon mechanical turk , 2013, CHI.
[4] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[5] Hector Garcia-Molina,et al. Quality control for comparison microtasks , 2012, CrowdKDD '12.
[6] John C. Tang,et al. Reflecting on the DARPA Red Balloon Challenge , 2011, Commun. ACM.
[7] Kyumin Lee,et al. Combating Threats to Collective Attention in Social Media: An Evaluation , 2013, ICWSM.
[8] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[9] Hector Garcia-Molina,et al. Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.
[10] Kyumin Lee,et al. Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media , 2013, ICWSM.
[11] Paul Resnick,et al. Reputation systems , 2000, CACM.
[12] Chuang Zhang,et al. Real-time quality control for crowdsourcing relevance evaluation , 2012, 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content.
[13] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.