-
1
-
-
85022018878
-
The rise of twitter bots
-
Nov 15, [Online]
-
R. Dubbin, "The rise of Twitter bots, " The New Yorker, Nov 15 2013. [Online]. Available: http://www.newyorker.com/online/blogs/elements/ 2013/11/the-rise-of-twitter-bots.html
-
(2013)
The New Yorker
-
-
Dubbin, R.1
-
2
-
-
84911031886
-
The invasion of the twitter bots
-
Aug 9, [Online]
-
K. Hill, "The invasion of the Twitter bots, " Forbes, Aug 9 2012. [Online]. Available: http://www.forbes.com/sites/kashmirhill/2012/08/ 09/the-invasion-of-the-twitter-bots/
-
(2012)
Forbes
-
-
Hill, K.1
-
4
-
-
77958488685
-
Detecting spam bots in online social networking sites: A machine learning approach
-
ACM
-
A. H. Wang, "Detecting spam bots in online social networking sites: A machine learning approach, " in Conference on Data and Applications Security and Privacy. ACM, 2010, pp. 335-342.
-
(2010)
Conference on Data and Applications Security and Privacy
, pp. 335-342
-
-
Wang, A.H.1
-
5
-
-
84863160317
-
Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers
-
Springer
-
C. Yang, R. C. Harkreader, and G. Gu, "Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers, " in Recent Advances in Intrusion Detection. Springer, 2011, pp. 318-337.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 318-337
-
-
Yang, C.1
Harkreader, R.C.2
Gu, G.3
-
6
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
ACM
-
K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended accounts in retrospect: An analysis of Twitter spam, " in Internet Measurement Conference (IMC). ACM, 2011, pp. 243-258.
-
(2011)
Internet Measurement Conference (IMC)
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
7
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
ACM
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The socialbot network: When bots socialize for fame and money, " in Annual Computer Security Applications Conference (ACSAC). ACM, 2011, pp. 93-102.
-
(2011)
Annual Computer Security Applications Conference (ACSAC)
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
9
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
ACM
-
K. Lee, J. Caverlee, and S. Webb, "Uncovering social spammers: Social honeypots + machine learning, " in Annual ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2010, pp. 435-442.
-
(2010)
Annual ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
10
-
-
78650907130
-
Measuring the mixing time of social graphs
-
ACM
-
A. Mohaisen, A. Yun, and Y. Kim, "Measuring the mixing time of social graphs, " in Internet Measurement Conference (IMC). ACM, 2010, pp. 383-389.
-
(2010)
Internet Measurement Conference (IMC)
, pp. 383-389
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
11
-
-
78751493674
-
Who is tweeting on twitter: Human, bot, or cyborg?
-
ACM
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Who is tweeting on Twitter: Human, bot, or cyborg?" in Annual Computer Security Applications Conference (ACSAC). ACM, 2010, pp. 21-30.
-
(2010)
Annual Computer Security Applications Conference (ACSAC)
, pp. 21-30
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
12
-
-
84866593784
-
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
-
-, "Detecting automation of Twitter accounts: Are you a human, bot, or cyborg?" IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 811-824, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 811-824
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
14
-
-
84856343452
-
Sentiment analysis of twitter data
-
A. Agarwal, B. Xie, I. Vovsha, O. Rambow, and R. Passonneau, "Sentiment analysis of Twitter data, " in Workshop on Languages in Social Media, 2011, pp. 30-38.
-
(2011)
Workshop on Languages in Social Media
, pp. 30-38
-
-
Agarwal, A.1
Xie, B.2
Vovsha, I.3
Rambow, O.4
Passonneau, R.5
-
17
-
-
84893402986
-
Sentiment analysis: Adjectives and adverbs are better than adjectives alone
-
F. Benamara, C. Cesarano, A. Picariello, D. R. Recupero, and V. S. Subrahmanian, "Sentiment analysis: Adjectives and adverbs are better than adjectives alone." in International Conference on Weblogs and Social Media (ICWSM), 2007.
-
(2007)
International Conference on Weblogs and Social Media (ICWSM)
-
-
Benamara, F.1
Cesarano, C.2
Picariello, A.3
Recupero, D.R.4
Subrahmanian, V.S.5
-
18
-
-
85008017089
-
AVA: Adjective-verb-adverb combinations for sentiment analysis
-
V. S. Subrahmanian and D. Reforgiato, "AVA: Adjective-verb-adverb combinations for sentiment analysis, " IEEE Intelligent Systems, vol. 23, no. 4, pp. 43-50, 2008.
-
(2008)
IEEE Intelligent Systems
, vol.23
, Issue.4
, pp. 43-50
-
-
Subrahmanian, V.S.1
Reforgiato, D.2
-
19
-
-
85162005069
-
Online learning for latent dirichlet allocation
-
M. D. Hoffman, D. M. Blei, and F. R. Bach, "Online learning for latent Dirichlet allocation." in Neural Information Processing Systems (NIPS), vol. 2, no. 3, 2010, p. 5.
-
(2010)
Neural Information Processing Systems (NIPS)
, vol.2
, Issue.3
, pp. 5
-
-
Hoffman, M.D.1
Blei, D.M.2
Bach, F.R.3
-
20
-
-
84911031884
-
Hackers target indian election tweets with malicious spam
-
May 10, [Online]
-
A. Kharpal, "Hackers target Indian election tweets with malicious spam, " CNBC, May 10 2014. [Online]. Available: http://www.cnbc. com/id/101679812
-
(2014)
CNBC
-
-
Kharpal, A.1
-
21
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests, " Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
22
-
-
33646430006
-
Extremely randomized trees
-
P. Geurts, D. Ernst, and L. Wehenkel, "Extremely randomized trees, " Machine Learning, vol. 63, no. 1, pp. 3-42, 2006.
-
(2006)
Machine Learning
, vol.63
, Issue.1
, pp. 3-42
-
-
Geurts, P.1
Ernst, D.2
Wehenkel, L.3
-
23
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting, " Journal of Computer and System Sciences, vol. 55, no. 1, pp. 119-139, 1997.
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
24
-
-
0035470889
-
Greedy function approximation: A gradient boosting machine
-
J. H. Friedman, "Greedy function approximation: a gradient boosting machine, " Annals of Statistics, pp. 1189-1232, 2001.
-
(2001)
Annals of Statistics
, pp. 1189-1232
-
-
Friedman, J.H.1
-
25
-
-
80555140075
-
Scikit-learn: Machine learning in python
-
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, "Scikit-learn: Machine learning in Python, " Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
|