False-Name-Proofness in Social Networks
暂无分享,去创建一个
Vincent Conitzer | Nicole Immorlica | Kamesh Munagala | Joshua Letchford | Liad Wagman | Nicole Immorlica | Liad Wagman | Joshua Letchford | Kamesh Munagala | Vincent Conitzer
[1] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[2] Vahab S. Mirrokni,et al. Local Computation of PageRank Contributions , 2007, Internet Math..
[3] Howard Raiffa,et al. Games and Decisions: Introduction and Critical Survey. , 1958 .
[4] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2008, TNET.
[5] Vincent Conitzer,et al. Limited verification of identities to induce false-name-proofness , 2007, TARK '07.
[6] Jon M. Kleinberg,et al. Navigation in a small world , 2000, Nature.
[7] Vahab S. Mirrokni,et al. Robust PageRank and locally computable spam detection features , 2008, AIRWeb '08.
[8] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[9] Vahab S. Mirrokni,et al. Local Computation of PageRank Contributions , 2007, WAW.
[10] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[11] Makoto Yokoo,et al. The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..
[12] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[13] K. Menger. Zur allgemeinen Kurventheorie , 1927 .
[14] Vincent Conitzer,et al. Optimal False-Name-Proof Voting Rules with Costly Voting , 2008, AAAI.
[15] Vincent Conitzer,et al. Anonymity-Proof Voting Rules , 2008, WINE.
[16] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[17] Fan Chung Graham,et al. Internet and Network Economics, Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007, Proceedings , 2007, WINE.
[18] Hector Garcia-Molina,et al. Link spam detection based on mass estimation , 2006, VLDB.
[19] Hiroshi Nagamochi,et al. Minimum cost source location problem with vertex-connectivity requirements in digraphs , 2001, Inf. Process. Lett..
[20] H. Raiffa,et al. GAMES AND DECISIONS; INTRODUCTION AND CRITICAL SURVEY. , 1958 .
[21] Makoto Yokoo,et al. Robust double auction protocol against false-name bids , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[22] Rashmi Raj,et al. Web Spam Detection with Anti-Trust Rank , 2006, AIRWeb.
[23] Vincent Conitzer,et al. Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms , 2010, AAMAS.
[24] S. Vajda,et al. GAMES AND DECISIONS; INTRODUCTION AND CRITICAL SURVEY. , 1958 .