Profile Cloning Detection in Online Social Networks
暂无分享,去创建一个
Zbigniew Tarapata | Rafał Kasprzyk | Krzysztof Szkółka | Michał Zabielski | Z. Tarapata | R. Kasprzyk | M. Zabielski | K. Szkółka
[1] Avrim Blum,et al. Learning from Labeled and Unlabeled Data using Graph Mincuts , 2001, ICML.
[2] Mohammad Reza Khayyambashi,et al. An approach for detecting profile cloning in online social networks , 2013, 7th International Conference on e-Commerce in Developing Countries:with focus on e-Security.
[3] Paul Van Dooren,et al. A MEASURE OF SIMILARITY BETWEEN GRAPH VERTICES . WITH APPLICATIONS TO SYNONYM EXTRACTION AND WEB SEARCHING , 2002 .
[4] Zbigniew Tarapata,et al. An Application of Multicriteria Weighted Graph Similarity Method to Social Networks Analyzing , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[5] Jennifer Widom,et al. SimRank: a measure of structural-context similarity , 2002, KDD.
[6] Zbigniew Tarapata,et al. Application of Graphs and Networks Similarity Measures for Analyzing Complex Networks , 2011 .
[7] H. J. Smith,et al. Managing Privacy: Information Technology and Corporate America , 1994 .
[8] Zbigniew Tarapata,et al. Methods of Profile Cloning Detection in Online Social Networks , 2016 .
[9] Sotiris Ioannidis,et al. Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[10] Laura Zager,et al. Graph similarity and matching , 2005 .
[11] Mladen Nikolic,et al. Measuring similarity of graph nodes by neighbor matching , 2012, Intell. Data Anal..
[12] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[13] Zoubin Ghahramani,et al. Combining active learning and semi-supervised learning using Gaussian fields and harmonic functions , 2003, ICML 2003.
[14] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[15] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[16] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[17] Irwin King,et al. Exploit of online social networks with Semi-Supervised Learning , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).