FLOCK: Combating Astroturfing on Livestreaming Platforms
暂无分享,去创建一个
[1] Christos Faloutsos,et al. EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2010, PAKDD.
[2] Keith W. Ross,et al. Queuing Network Models for Multi-Channel P2P Live Streaming Systems , 2009, IEEE INFOCOM 2009.
[3] Yunhao Liu,et al. AnySee: Peer-to-Peer Live Streaming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[5] D. Sculley,et al. Web-scale k-means clustering , 2010, WWW '10.
[6] Pavel Berkhin,et al. A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.
[7] Keith W. Ross,et al. Inferring Network-Wide Quality in P2P Live Streaming Systems , 2007, IEEE Journal on Selected Areas in Communications.
[8] Andruid Kerne,et al. Streaming on twitch: fostering participatory communities of play within live mixed media , 2014, CHI.
[9] Christos Faloutsos,et al. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.
[10] David Mandell Freeman,et al. Using naive bayes to detect spammy names in social networks , 2013, AISec.
[11] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[12] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[13] Christos Faloutsos,et al. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection , 2015, SDM.
[14] Christos Faloutsos,et al. EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[15] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[16] Christos Faloutsos,et al. Inferring Strange Behavior from Connectivity Pattern in Social Networks , 2014, PAKDD.
[17] J. Copas,et al. Interpreting Kullback-Leibler divergence with the Neyman-Pearson lemma , 2006 .
[18] Mung Chiang,et al. Performance bounds for peer-assisted live streaming , 2008, SIGMETRICS '08.
[19] Christos Faloutsos,et al. MalSpot: Multi2 Malicious Network Behavior Patterns Analysis , 2014, PAKDD.
[20] Christos Faloutsos,et al. oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.
[21] Virgílio A. F. Almeida,et al. A hierarchical characterization of a live streaming media workload , 2006, TNET.
[22] Qiang Cao,et al. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.
[23] Cao Xiao,et al. Detecting Clusters of Fake Accounts in Online Social Networks , 2015, AISec@CCS.
[24] References , 1971 .
[25] Loïc Cerf,et al. Watch me playing, i am a professional: a first study on video game live streaming , 2012, WWW.
[26] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[27] Shah Neil,et al. EdgeCentric: Anomaly Detection in Edge-Attributed Networks , 2016 .
[28] Bruce M. Maggs,et al. An analysis of live streaming workloads on the internet , 2004, IMC '04.
[29] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[30] J. Tukey,et al. Performance of Some Resistant Rules for Outlier Labeling , 1986 .