-
1
-
-
84910140943
-
-
Facebook Ads Optimization. http://weigend.com/files/teaching/stanford/2009/homeworks/ad-optimization-final.pdf.
-
Facebook Ads Optimization
-
-
-
4
-
-
84893095820
-
Copy catch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. Copy Catch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In WWW, 2013.
-
(2013)
WWW
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
5
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
-
(2012)
NSDI
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
8
-
-
85141046573
-
You are what you like! information leakage through users' interests
-
A. Chaabane, G. Acs, and M.-A. Kaafar. You Are What You Like! Information Leakage Through Users' Interests. In NDSS, 2012.
-
(2012)
NDSS
-
-
Chaabane, A.1
Acs, G.2
Kaafar, M.-A.3
-
9
-
-
84899866845
-
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
-
T. Chen, A. Chaabane, P. U. Tournoux, M.-A. Kaafar, and R. Boreli. How Much is too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. In PETS, 2013.
-
(2013)
PETS
-
-
Chen, T.1
Chaabane, A.2
Tournoux, P.U.3
Kaafar, M.-A.4
Boreli, R.5
-
10
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
11
-
-
84866484075
-
Measuring and fingerprinting click-spam in ad networks
-
V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In SIGCOMM, 2012.
-
(2012)
SIGCOMM
-
-
Dave, V.1
Guha, S.2
Zhang, Y.3
-
15
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and Characterizing Social Spam Campaigns. In IMC, 2010.
-
(2010)
IMC
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
17
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots + machine learning. In SIGIR, 2010.
-
(2010)
SIGIR
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
20
-
-
84910135236
-
-
February
-
D. Muller. Facebook Fraud. https://www.youtube.com/watch?v=oVfHeWTKjag, February 2014.
-
(2014)
Facebook Fraud
-
-
Muller, D.1
-
21
-
-
84862950548
-
Ghost busting facebook: Detecting and characterizing phantom profiles in online social gaming applications
-
A. Nazir, S. Raza, C.-N. Chuah, and B. Schipper. Ghost busting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications. In WOSN, 2010.
-
(2010)
WOSN
-
-
Nazir, A.1
Raza, S.2
Chuah, C.-N.3
Schipper, B.4
-
24
-
-
84910126763
-
Follow the green: Growth and dynamics in twitter follower markets
-
G. Stringhini, G. Wang, M. Egeley, C. Kruegel, G. Vigna, H. Zheng, and B. Y. Zhao. Follow the Green: Growth and Dynamics in Twitter Follower Markets. In ACM IMC, 2013.
-
(2013)
ACM IMC
-
-
Stringhini, G.1
Wang, G.2
Egeley, M.3
Kruegel, C.4
Vigna, G.5
Zheng, H.6
Zhao, B.Y.7
-
25
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended Accounts in Retrospect: An Analysis of Twitter Spam. In IMC, 2011.
-
(2011)
IMC
-
-
Thomas, K.1
Grier, C.2
Paxson, V.3
Song, D.4
-
26
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
27
-
-
84910151063
-
Analyzing spammersŠ social networks for fun and profit
-
C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing SpammersŠ Social Networks for Fun and Profit. In WWW, 2012.
-
(2012)
WWW
-
-
Yang, C.1
Harkreader, R.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
28
-
-
82955161549
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering Social Network Sybils in the Wild. In IMC, 2011.
-
(2011)
IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
30
-
-
35548992569
-
Sybil guard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybil Guard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|