Distance-based customer detection in fake follower markets
暂无分享,去创建一个
[1] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[2] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[3] Timothy W. Finin,et al. Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.
[4] Hossein Hamooni,et al. DeBot: Twitter Bot Detection via Warped Correlation , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[5] Roberto Di Pietro,et al. The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.
[6] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[7] Lada A. Adamic. The Small World Web , 1999, ECDL.
[8] Sounman Hong,et al. Which candidates do the public discuss online in an election campaign?: The use of social media by 2012 presidential candidates and its impact on candidate salience , 2012, Gov. Inf. Q..
[9] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[10] Ian H. Witten,et al. WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[11] Roberto Di Pietro,et al. Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..
[12] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[13] Lada A. Adamic,et al. Looking at the Blogosphere Topology through Different Lenses , 2007, ICWSM.
[14] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[15] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[16] Marco Rosa,et al. Four degrees of separation , 2011, WebSci '12.
[17] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[18] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[19] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[20] T. Buchanan,et al. Ethics Guidelines for Internet-mediated Research , 2013 .
[21] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[22] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[23] Roberto Di Pietro,et al. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection , 2016, IEEE Intell. Syst..
[24] Christos Faloutsos,et al. Inferring lockstep behavior from connectivity pattern in large graphs , 2016, Knowledge and Information Systems.
[25] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[26] Edgar R. Weippl,et al. Fake identities in social media: A case study on the sustainability of the Facebook business model , 2012, J. Serv. Sci. Res..
[27] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[28] Massimo Marchiori,et al. Is the Boston subway a small-world network? , 2002 .
[29] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[30] Chih-Hung Wu,et al. Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks , 2009, Expert Syst. Appl..
[31] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[32] Liselot Hudders,et al. Marketing through Instagram influencers: the impact of number of followers and product divergence on brand attitude , 2017 .
[33] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[34] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[35] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[36] Gianluca Stringhini,et al. Poultry markets: on the underground economy of twitter followers , 2012 .
[37] Ponnurangam Kumaraguru,et al. What they do in shadows: Twitter underground follower market , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[38] Eric Gilbert,et al. A longitudinal study of follow predictors on twitter , 2013, CHI.
[39] Roberto Di Pietro,et al. Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.
[40] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[41] Muhammad Abulaish,et al. Community-based features for identifying spammers in Online Social Networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[42] D. Sculley,et al. Relaxed online SVMs for spam filtering , 2007, SIGIR.
[43] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[44] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[45] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[46] Vangelis Metsis,et al. Spam Filtering with Naive Bayes - Which Naive Bayes? , 2006, CEAS.
[47] Patric R. Spence,et al. How much Klout do you have ... A test of system generated cues on source credibility , 2013, Comput. Hum. Behav..
[48] Mohamed F. Mokbel,et al. Location-based and preference-aware recommendation using sparse geo-social networking data , 2012, SIGSPATIAL/GIS.
[49] Shiu-Wan Hung,et al. Examining the small world phenomenon in the patent citation network: a case study of the radio frequency identification (RFID) network , 2009, Scientometrics.
[50] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[51] Michael Luca,et al. Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015 .
[52] Qiang Cao,et al. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.
[53] Christos Faloutsos,et al. Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.
[54] Pierre Baldi,et al. Assessing the accuracy of prediction algorithms for classification: an overview , 2000, Bioinform..
[55] Juan Martínez-Romo,et al. Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..
[56] Yi Yang,et al. Spam ain't as diverse as it seems: throttling OSN spam with templates underneath , 2014, ACSAC.
[57] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[58] Yiqun Liu,et al. Pay Me and I'll Follow You: Detection of Crowdturfing Following Activities in Microblog Environment , 2016, IJCAI.
[59] Jon M. Kleinberg,et al. The Web as a Graph: Measurements, Models, and Methods , 1999, COCOON.
[60] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.