Detection of Fake Profiles in Social Media - Literature Review
暂无分享,去创建一个
Jari Veijalainen | Oleksiy Mazhelis | Alexander Semenov | Aleksei Romanov | J. Veijalainen | O. Mazhelis | Alexander Semenov | A. Romanov
[1] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[2] Sotiris Ioannidis,et al. Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[3] Mauro Conti,et al. FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[4] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[5] Wenfeng Li,et al. Real-time traffic information collecting and monitoring system based on the internet of things , 2011, 2011 6th International Conference on Pervasive Computing and Applications.
[6] Edgar R. Weippl,et al. Fake identities in social media: A case study on the sustainability of the Facebook business model , 2012, J. Serv. Sci. Res..
[7] Kyumin Lee,et al. The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing , 2014, ICWSM.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Bruno S. Silvestre,et al. Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .
[10] Anna Cinzia Squicciarini,et al. Uncovering Crowdsourced Manipulation of Online Reviews , 2015, SIGIR.
[11] Kyumin Lee,et al. Characterizing and automatically detecting crowdturfing in Fiverr and Twitter , 2015, Social Network Analysis and Mining.
[12] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[13] Kaushik Dutta,et al. Identifying Fake Profiles in LinkedIn , 2020, PACIS.
[14] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[15] Konstantin Beznosov,et al. Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs , 2016, Comput. Secur..
[16] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[17] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[18] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[19] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[20] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[21] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[22] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[23] Li Guo,et al. Detecting Sybil Nodes in Anonymous Communication Systems , 2013, ITQM.
[24] Emiliano De Cristofaro,et al. Characterizing Seller-Driven Black-Hat Marketplaces , 2015, ArXiv.
[25] Chen-Nee Chuah,et al. Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications , 2010, WOSN.
[26] Christos Faloutsos,et al. Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.
[27] Emiliano De Cristofaro,et al. Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots , 2014, Internet Measurement Conference.
[28] Gang Wang,et al. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.
[29] Gianluca Stringhini,et al. Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[30] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.