Follow the green: growth and dynamics in twitter follower markets
暂无分享,去创建一个
Gang Wang | Gianluca Stringhini | Ben Y. Zhao | Christopher Krügel | Giovanni Vigna | Haitao Zheng | Manuel Egele | G. Wang | G. Stringhini | Haitao Zheng | Christopher Krügel | Giovanni Vigna | Manuel Egele | G. Vigna
[1] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[2] B. Schölkopf,et al. Advances in kernel methods: support vector learning , 1999 .
[3] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[4] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[5] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[6] Balachander Krishnamurthy,et al. A few chirps about twitter , 2008, WOSN '08.
[7] Phillip B. Gibbons,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.
[8] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[9] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[10] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[11] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[12] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[13] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[14] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[15] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[16] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[17] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[18] Haewoon Kwak,et al. Fragile online relationship: a first look at unfollow dynamics in twitter , 2011, CHI.
[19] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[21] Gianluca Stringhini,et al. Poultry markets: on the underground economy of twitter followers , 2012, CCRV.
[22] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[23] Chris Jermaine,et al. The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.
[24] Gianluca Stringhini,et al. Poultry markets: on the underground economy of twitter followers , 2012 .
[25] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[26] Eric Gilbert,et al. A longitudinal study of follow predictors on twitter , 2013, CHI.
[27] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[28] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[29] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[30] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.