-
1
-
-
84874776051
-
CATS: Characterizing automation of Twitter spammers
-
IEEE
-
A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, and C. Yang, " CATS: Characterizing automation of Twitter spammers," in Fifth International Conference on Communication S ystems and Networks (COMSNETS). IEEE, 2013, pp. 1-10.
-
(2013)
Fifth International Conference on Communication S Ystems and Networks (COMSNETS)
, pp. 1-10
-
-
Amleshwaram, A.A.1
Reddy, N.2
Yadav, S.3
Gu, G.4
Yang, C.5
-
2
-
-
0028468293
-
Using mutual information for selecting features in supervised neural net learning
-
R. Battiti, "Using mutual information for selecting features in supervised neural net learning, " IEEE Transactions On Neural Networks, pp. 537-550, 1994.
-
(1994)
IEEE Transactions on Neural Networks
, pp. 537-550
-
-
Battiti, R.1
-
3
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
New York, NY, USA ACM [Online]. Available
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, " The socialbot network: When bots socialize for fame and money," in Proceedings of the 27th Annual Computer Security Applications Conference, ser. ACSAC 11. New York, NY, USA: ACM, 2011, pp. 93-102.[Online]. Available: Http://doi.acm.org/ 10.1145/2076732.2076746
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, Ser. ACSAC 11
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
4
-
-
76649137380
-
Social networks and context-aware spam
-
New York, NY, USA: ACM [Online]. Available
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders, " Social networks and context-aware spam," in Proceedings of the 2008 ACM conference on Computer supported cooperative work, ser. CSCW 08. New York, NY, USA: ACM, 2008, pp. 403-412.[Online]. Available: Http://doi.acm.org/10.1145/1460563. 1460628
-
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, Ser. CSCW 08
, vol.2008
, pp. 403-412
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
5
-
-
84866593784
-
Detecting automation of Twitter accounts: Are you a human, bot, or cyborg
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, " Detecting automation of Twitter accounts: Are you a human, bot, or cyborg" IEEE Transactions on Dependable and Secure Computing, pp. 811-824, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, pp. 811-824
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
7
-
-
79952391760
-
Comparative analysis of DNA microarray data through the use of feature selection techniques
-
December 2010
-
D. J. Dittman, T. M. Khoshgoftaar, R. Wald, and J. Van Hulse, " Comparative analysis of DNA microarray data through the use of feature selection techniques," in Ninth IEEE International Conference on Machine Learning and Applications (ICMLA), December 2010, pp. 147-152.
-
Ninth IEEE International Conference on Machine Learning and Applications (ICMLA)
, pp. 147-152
-
-
Dittman, D.J.1
Khoshgoftaar, T.M.2
Wald, R.3
Van Hulse, J.4
-
8
-
-
76749092270
-
The WEKA data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: An update," SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10-18, 2009.
-
(2009)
SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
10
-
-
84992726552
-
Estimating attributes: Analysis and extensions of relief
-
F. Bergadano and L. De Raedt, Eds Springer Berlin/Heidelberg [Online]. Available
-
I. Kononenko, "Estimating attributes: Analysis and extensions of relief," in Machine Learning: ECML-94, ser. Lecture Notes in Computer Science, F. Bergadano and L. De Raedt, Eds. Springer Berlin/Heidelberg, 1994, vol. 784, pp. 171-182.[Online]. Available: Http://dx.doi.org/10.1007/3-540- 57868-4 57
-
(1994)
Machine Learning: ECML-94, Ser. Lecture Notes in Computer Science
, vol.784
, pp. 171-182
-
-
Kononenko, I.1
-
11
-
-
80052767040
-
Spam detection on Twitter using traditional classifiers
-
J. M. A. Calero, L. T. Yang, F. G. Marmol, L. J. Garca Villalba, A. X. Li, and Y. Wang, Eds Springer Berlin Heidelberg [Online]. Available
-
M. McCord and M. Chuah, " Spam detection on Twitter using traditional classifiers," in Autonomic and Trusted Computing, ser. Lecture Notes in Computer Science, J. M. A. Calero, L. T. Yang, F. G. Marmol, L. J. Garca Villalba, A. X. Li, and Y. Wang, Eds. Springer Berlin Heidelberg, 2011, vol. 6906, pp. 175-186.[Online]. Available: Http://dx.doi.org/10.1007/978-3-642- 23496-5 13
-
(2011)
Autonomic and Trusted Computing, Ser. Lecture Notes in Computer Science
, vol.6906
, pp. 175-186
-
-
McCord, M.1
Chuah, M.2
-
13
-
-
77949533117
-
A study on the relationships of classifier performance metrics
-
November
-
N. Seliya, T. M. Khoshgoftaar, and J. Van Hulse, " A study on the relationships of classifier performance metrics," in 21st In ternational Conference on Tools with Artificial Intelligence, November 2009, pp. 59-66.
-
(2009)
21st in Ternational Conference on Tools with Artificial Intelligence
, pp. 59-66
-
-
Seliya, N.1
Khoshgoftaar, T.M.2
Van Hulse, J.3
-
14
-
-
84863156952
-
Spam filtering in Twitter using sender-receiver relationship
-
R. Sommer, D. Balzarotti, and G. Maier, Eds Springer Berlin Heidelberg [Online]. Available
-
J. Song, S. Lee, and J. Kim, " Spam filtering in Twitter using sender-receiver relationship," in Recent Adv ances in Intrusion Detection, ser. Lecture Notes in Computer Science, R. Sommer, D. Balzarotti, and G. Maier, Eds. Springer Berlin Heidelberg, 2011, vol. 6961, pp. 301-317.[Online]. Available: Http://dx.doi.org/10.1007/978-3-642-2364 4-0 16
-
(2011)
Recent Adv Ances in Intrusion Detection, Ser. Lecture Notes in Computer Science
, vol.6961
, pp. 301-317
-
-
Song, J.1
Lee, S.2
Kim, J.3
-
15
-
-
84873576218
-
Predicting dark triad personality traits from Twitter usage and a linguistic analysis of tweets
-
C. Sumner, A. Byers, R. Boochever, and G. Park, " Predicting dark triad personality traits from Twitter usage and a linguistic analysis of tweets," in Machine Learning and Applications (ICMLA), 20 12 11th International Conference on, vol. 2, 2012, pp. 386-393.
-
(2012)
Machine Learning and Applications (ICMLA), 20 12 11th International Conference on
, vol.2
, pp. 386-393
-
-
Sumner, C.1
Byers, A.2
Boochever, R.3
Park, G.4
-
16
-
-
77649253939
-
The psychological meaning of words: Liwc and computerized text analysis methods
-
[Online]. Available
-
Y. R. Tausczik and J. W. Pennebaker, " The psychological meaning of words: Liwc and computerized text analysis methods," Journal of La nguage and Social Psychology, vol. 29, no. 1, pp. 24-54, 2010.[Online]. Available: Http://jls.sagepub.com/content/29/1/24.abstract
-
(2010)
Journal of la Nguage and Social Psychology
, vol.29
, Issue.1
, pp. 24-54
-
-
Tausczik, Y.R.1
Pennebaker, J.W.2
-
17
-
-
80051985554
-
Design and evaluation of a real-time url spam filtering service
-
IEEE
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, " Design and evaluation of a real-time url spam filtering service," in IEEE Symposium on Security and Privacy (SP). IEEE, 2011, pp. 447-462.
-
(2011)
IEEE Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
18
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
New York, NY, USA ACM [Online]. Available
-
K. Thomas, C. Grier, D. Song, and V. Paxson, " Suspended accounts in retrospect: An analysis of twitter spam," in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, ser. IMC 11. New York, NY, USA: ACM, 2011, pp. 243-258.[Online]. Available: Http://doi.acm.org/10.1145/ 2068816.2068840
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, Ser. IMC 11
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
19
-
-
79959976570
-
-
Serious skills Wiley Online] Available
-
H. Thomases, Twitter Marketing: An Hour a Day, ser. Serious skills. Wiley, 2009.[Online]. Available: Http://books.google.com/booksid=oGBN0pyfkF4C
-
(2009)
Twitter Marketing: An Hour A Day ser
-
-
Thomases, H.1
-
20
-
-
0035942271
-
Significance analysis of microarrays applied to the ionizing radiation response
-
[Online]. Available
-
V. G. Tusher, R. Tibshirani, and G. Chu, " Significance analysis of microarrays applied to the ionizing radiation response," Proceedings of the National Academy of Sciences, vol. 98, no. 9, pp. 5116-5121, 2001.[Online]. Available: Http://www.pnas.org/content/98/9/5116.abstract
-
(2001)
Proceedings of the National Academy of Sciences
, vol.98
, Issue.9
, pp. 5116-5121
-
-
Tusher, V.G.1
Tibshirani, R.2
Chu, G.3
-
21
-
-
80053155437
-
A comparative evaluation of feature ranking methods for high dimensional bioinformatics data
-
IEEE International Conference on, August 2011
-
J. Van Hulse, T. M. Khoshgoftaar, and A. Napolitano, " A comparative evaluation of feature ranking methods for high dimensional bioinformatics data," in Information Reuse and Integration (IRI), 2011 IEEE International Conference on, August 2011, pp. 315-320.
-
(2011)
Information Reuse and Integration (IRI)
, pp. 315-320
-
-
Van Hulse, J.1
Khoshgoftaar, T.M.2
Napolitano, A.3
-
22
-
-
77951173974
-
Feature selection with high-dimensional imbalanced data
-
ICDMW 09., Y. Saygin, J X. Yu, H. Kargupta, W. Wang, S. Ranka, P. S. Yu, and X. Wu, Eds. IEEE Computer Society, December 2009
-
J. Van Hulse, T. M. Khoshgoftaar, A. Napolitano, and R. Wald, " Feature selection with high-dimensional imbalanced data," in IEEE International Conference on Data Mining Workshops, 2009. ICDMW 09., Y. Saygin, J. X. Yu, H. Kargupta, W. Wang, S. Ranka, P. S. Yu, and X. Wu, Eds. IEEE Computer Society, December 2009, pp. 507-514.
-
(2009)
IEEE International Conference on Data Mining Workshops
, pp. 507-514
-
-
Van Hulse, J.1
Khoshgoftaar, T.M.2
Napolitano, A.3
Wald, R.4
-
23
-
-
84891090573
-
When social bots attack: Modeling susceptibility of users in online social networks
-
C. Wagner, S. Mitter, C. Korner, and M. Strohmaier, " When social bots attack: Modeling susceptibility of users in online social networks," Making Sense of Microposts (# MSM2012) , p. 2, 2012.
-
(2012)
Making Sense of Microposts (# MSM2012
, pp. 2
-
-
Wagner, C.1
Mitter, S.2
Korner, C.3
Strohmaier, M.4
-
24
-
-
84873608162
-
Using Twitter content to predict psychopathy
-
R. Wald, T. M. Khoshgoftaar, A. Napolitano, and C. Sumner, " Using Twitter content to predict psychopathy," in Machine Learning and Applications (ICMLA), 2012 11th International Con ference on, vol. 2, 2012, pp. 394-401.
-
(2012)
Machine Learning and Applications (ICMLA), 2012 11th International Con Ference on
, vol.2
, pp. 394-401
-
-
Wald, R.1
Khoshgoftaar, T.M.2
Napolitano, A.3
Sumner, C.4
-
25
-
-
77956023732
-
Combating the small sample class imbalance problem using feature selection
-
October 2010
-
M. Wasikowski and X. wen Chen, "Combating the small sample class imbalance problem using feature selection, " IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1388-1400, October 2010.
-
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.10
, pp. 1388-1400
-
-
Wasikowski, M.1
Wen Chen, X.2
-
26
-
-
84991833843
-
-
3rd ed Burlington, MA: Morgan Kaufmann, January 2011
-
I. H. Witten, E. Frank, and M. A. Hall, Data Mining: Practical machine learning tools and techniques, 3rd ed. Burlington, MA: Morgan Kaufmann, January 2011.
-
Data Mining: Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
|