暂无分享,去创建一个
Gang Wang | Ben Y. Zhao | Xiao Wang | Christo Wilson | Haitao Zheng | Miriam J. Metzger | Manish Mohanlal | G. Wang | Haitao Zheng | Xiao Wang | Christo Wilson | M. Mohanlal
[1] Ben Y. Zhao,et al. Understanding latent interactions in online social networks , 2010, Internet Measurement Conference.
[2] Ben Y. Zhao,et al. Uncovering social network Sybils in the wild , 2011, ACM Trans. Knowl. Discov. Data.
[3] Aniket Kittur,et al. Crowdsourcing user studies with Mechanical Turk , 2008, CHI.
[4] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[5] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[6] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.
[7] Ben Y. Zhao,et al. Understanding latent interactions in online social networks , 2010, TWEB.
[8] R. Preston McAfee,et al. Who moderates the moderators?: crowdsourcing abuse detection in user-generated content , 2011, EC '11.
[9] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[10] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[11] Panagiotis G. Ipeirotis. Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.
[12] Duncan J. Watts,et al. Financial incentives and the "performance of crowds" , 2009, HCOMP '09.
[13] Mehmet A. Orgun,et al. Trust Transitivity in Complex Social Networks , 2011, AAAI.
[14] Calton Pu,et al. Reverse Social Engineering Attacks in Online Social Networks , 2011, DIMVA.
[15] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[16] Chris Kanich,et al. Putting Out a HIT: Crowdsourcing Malware Installs , 2011, WOOT.
[17] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[18] Lukas Biewald,et al. Programmatic Gold: Targeted and Scalable Quality Assurance in Crowdsourcing , 2011, Human Computation.
[19] Shourya Roy,et al. Beyond Independent Agreement: A Tournament Selection Approach for Quality Assurance of Human Computation Tasks , 2011, Human Computation.
[20] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[21] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[22] Shriram K. Vasudevan,et al. Sybil Guard: Defending Against Sybil Attacks via Social Networks , 2010 .
[23] John Le,et al. Ensuring quality in crowdsourced search relevance evaluation: The effects of training question distribution , 2010 .
[24] Brendan T. O'Connor,et al. Cheap and Fast – But is it Good? Evaluating Non-Expert Annotations for Natural Language Tasks , 2008, EMNLP.
[25] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[26] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[27] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[28] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[29] Jeffrey Heer,et al. Crowdsourcing graphical perception: using mechanical turk to assess visualization design , 2010, CHI.
[30] Björn Hartmann,et al. What's the Right Price? Pricing Tasks for Finishing on Time , 2011, Human Computation.
[31] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[32] Panagiotis G. Ipeirotis. Demographics of Mechanical Turk , 2010 .