Combating Threats to Collective Attention in Social Media: An Evaluation
暂无分享,去创建一个
[1] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[3] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[4] Zhiyuan Cheng,et al. Detecting collective attention spam , 2012, WebQuality '12.
[5] Christos Faloutsos,et al. Modeling Blog Dynamics , 2009, ICWSM.
[6] Fang Yu,et al. On Network-level Clusters for Spam Detection , 2010, NDSS.
[7] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[8] Georgia Koutrika,et al. Combating spam in tagging systems: An evaluation , 2008, TWEB.
[9] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[10] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[11] Constantine D. Spyropoulos,et al. An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages , 2000, SIGIR '00.
[12] Brian D. Davison,et al. Predicting popular messages in Twitter , 2011, WWW.
[13] Jon Kleinberg,et al. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter , 2011, WWW.
[14] Calton Pu,et al. Study of Trend-Stuffing on Twitter through Text Classification , 2010 .
[15] Chris Kanich,et al. Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.
[16] Nick Feamster,et al. Observing common spam in Twitter and email , 2012, Internet Measurement Conference.
[17] Fang Wu,et al. Novelty and collective attention , 2007, Proceedings of the National Academy of Sciences.
[18] Kristina Lerman,et al. Information Contagion: An Empirical Study of the Spread of News on Digg and Twitter Social Networks , 2010, ICWSM.
[19] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[20] Anirban Dasgupta,et al. Impact of Spam Exposure on User Engagement , 2012, USENIX Security Symposium.
[21] Ciro Cattuto,et al. Dynamical classes of collective attention in twitter , 2011, WWW.
[22] Gianluca Stringhini,et al. BOTMAGNIFIER: Locating Spambots on the Internet , 2011, USENIX Security Symposium.
[23] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[24] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[25] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[26] Jaana Kekäläinen,et al. IR evaluation methods for retrieving highly relevant documents , 2000, SIGIR '00.
[27] C. Lumezanu. Observing Common Spam in Tweets and Email , 2012 .
[28] Santosh S. Vempala,et al. Filtering spam with behavioral blacklisting , 2007, CCS '07.