Mining Spam Accounts with User Influence
暂无分享,去创建一个
[1] Yiqun Liu,et al. Identifying web spam with user behavior analysis , 2008, AIRWeb '08.
[2] Yiqun Liu,et al. User behavior oriented web spam detection , 2008, WWW.
[3] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[4] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[5] Vincent T. Y. Ng,et al. Identifying Influential Users by Their Postings in Social Networks , 2012, MSM/MUSE.
[6] Calton Pu,et al. Study of Static Classification of Social Spam Profiles in MySpace , 2010, ICWSM.
[7] Alex Leavitt,et al. The Influentials : New Approaches for Analyzing Influence on Twitter , 2009 .
[8] Hao Chen,et al. Spam double-funnel: connecting web spammers with advertisers , 2007, WWW '07.
[9] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[10] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[11] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[12] Nagaaki Ohyama,et al. Empirical analysis of internet identity misuse: case study of south Korean real name system , 2010, DIM '10.
[13] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Steven Myers,et al. Prevalence and mitigation of forum spamming , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Danah Boyd. The politics of "real names" , 2012, CACM.
[16] Vincent T. Y. Ng,et al. Identifying influential users by their postings in social networks , 2012, MSM '12.
[17] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[18] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[19] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.