Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection
暂无分享,去创建一个
Angelo Spognardi | Marinella Petrocchi | Stefano Cresci | Stefano Tognazzi | M. Petrocchi | A. Spognardi | S. Cresci | Stefano Tognazzi
[1] Lucas Chi Kwong Hui,et al. Color Set Size Problem with Application to String Matching , 1992, CPM.
[2] Martin Wattenberg,et al. Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms , 1995, NIPS.
[3] Melanie Mitchell,et al. An introduction to genetic algorithms , 1996 .
[4] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[5] Zbigniew Michalewicz,et al. Evolutionary algorithms , 1997, Emerging Evolutionary Algorithms for Antennas and Wireless Communications.
[6] Julie Mitchell. Introduction to Melanie Klein , 1998 .
[7] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[8] Thomas Jansen,et al. On the analysis of the (1+1) evolutionary algorithm , 2002, Theor. Comput. Sci..
[9] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[10] R. Fua,et al. The analysis of the (100)surface of GaAs for NEA photocathode with XPS , 2004, IVESC 2004. The 5th International Vacuum Electron Sources Conference Proceedings (IEEE Cat. No.04EX839).
[11] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[12] Enno Ohlebusch,et al. Linear Time Algorithms for Generalizations of the Longest Common Substring Problem , 2011, Algorithmica.
[13] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[14] Rossano Schifanella,et al. People Are Strange When You're a Stranger: Impact and Influence of Bots on Social Networks , 2012, ICWSM.
[15] Marcel Salathé,et al. The dynamics of health behavior sentiments on a large online social network , 2012, EPJ Data Science.
[16] Aoying Zhou,et al. Social media data analysis for revealing collective behaviors , 2012, KDD.
[17] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..
[18] Muhammad Abulaish,et al. A generic statistical approach for spam detection in Online Social Networks , 2013, Comput. Commun..
[19] GLAD: group anomaly detection in social media analysis , 2014, KDD.
[20] Wei Hu,et al. Twitter spammer detection using data stream clustering , 2014, Inf. Sci..
[21] Yun Fu,et al. Prediction of Human Activity by Discovering Temporal Sequence Patterns , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[23] J. Mervis. Social Science. An Internet research project draws conservative ire. , 2014, Science.
[24] Krishna P. Gummadi,et al. Strength in Numbers: Robust Tamper Detection in Crowd Computations , 2015, COSN.
[25] Christos Faloutsos,et al. ND-Sync: Detecting Synchronized Fraud Activities , 2015, PAKDD.
[26] Fangzhao Wu,et al. Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization , 2015, CIKM.
[27] Pinar Senkul,et al. Random walk based context-aware activity recommendation for location based social networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[28] Reza Zafarani,et al. 10 Bits of Surprise: Detecting Malicious Users with Minimum Information , 2015, CIKM.
[29] Roberto Di Pietro,et al. Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..
[30] Thanh Tran,et al. Uncovering Fake Likers in Online Social Networks , 2016, CIKM.
[31] Hossein Hamooni,et al. DeBot: Twitter Bot Detection via Warped Correlation , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[32] Roberto Di Pietro,et al. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection , 2016, IEEE Intell. Syst..
[33] Nicholas Diakopoulos,et al. News Bots , 2016 .
[34] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[35] Tobias Höllerer,et al. Botivist: Calling Volunteers to Action using Online Bots , 2015, CSCW.
[36] Vincent Larivière,et al. Tweets as impact indicators: Examining the implications of automated “bot” accounts on Twitter , 2014, J. Assoc. Inf. Sci. Technol..
[37] Florian Schmidt,et al. The Devil's Triangle: Ethical Considerations on Developing Bot Detection Methods , 2016, AAAI Spring Symposia.
[38] Sue Moon,et al. Interval Signature: Persistence and Distinctiveness of Inter-event Time Distributions in Online Human Behavior , 2017, WWW.
[39] Christos Faloutsos,et al. HoloScope: Topology-and-Spike Aware Fraud Detection , 2017, CIKM.
[40] Jure Leskovec,et al. Antisocial Behavior on the Web: Characterization and Detection , 2017, WWW.
[41] Maurizio Tesconi,et al. Hybrid Crowdsensing: A Novel Paradigm to Combine the Strengths of Opportunistic and Participatory Crowdsensing , 2017, WWW.
[42] Liang Tong,et al. Hardening Classifiers against Evasion: the Good, the Bad, and the Ugly , 2017 .
[43] Filippo Menczer,et al. Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.
[44] Jun Li,et al. Spectrum-based Deep Neural Networks for Fraud Detection , 2017, CIKM.
[45] Nicholas Berente,et al. Is that social bot behaving unethically? , 2017, CACM.
[46] Binghui Wang,et al. GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs , 2017, 2017 IEEE International Conference on Data Mining (ICDM).
[47] Piotr Sapiezynski,et al. Evidence of complex contagion of information in social media: An experiment using Twitter bots , 2017, PloS one.
[48] Daniel Dajun Zeng,et al. Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information , 2017, CIKM.
[49] Roberto Di Pietro,et al. The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.
[50] Roberto Di Pietro,et al. Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[51] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[52] Gregory Maus,et al. A Typology of Socialbots (Abbrev.) , 2017, WebSci.
[53] L. Stewart,et al. Examining Trolls and Polarization with a Retweet Network , 2018 .
[54] Fabrizio Lillo,et al. $FAKE: Evidence of Spam and Bot Activity in Stock Microblogs on Twitter , 2018, ICWSM.
[55] Ponnurangam Kumaraguru,et al. Worth its Weight in Likes: Towards Detecting Fake Likes on Instagram , 2018, WebSci.
[56] Angelo Spognardi,et al. From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots , 2018, WWW.
[57] Roberto Di Pietro,et al. Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.
[58] Angelo Spognardi,et al. On the capability of evolved spambots to evade detection via genetic engineering , 2019, Online Soc. Networks Media.
[59] Liang Tong,et al. Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features , 2017, USENIX Security Symposium.
[60] Filippo Menczer,et al. Arming the public with AI to counter social bots , 2019, ArXiv.