-
2
-
-
84890629874
-
Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors
-
Dublin, Ireland
-
F. Al Zamal, W. Liu, and D. Ruths, "Homophily and latent attribute inference: Inferring latent attributes of Twitter users from neighbors." in 6th International AAAI Conference on Weblogs and Social Media (ICWSM'12), pp. 387-390, Dublin, Ireland, 2012.
-
(2012)
6th International AAAI Conference on Weblogs and Social Media (ICWSM'12)
, pp. 387-390
-
-
Al Zamal, F.1
Liu, W.2
Ruths, D.3
-
3
-
-
84899420772
-
Empirical evaluation of profile characteristics gender classification on twitter
-
Miami, Florida, Dec. 2013. IEEE
-
J. Alowibdi, U. Buy, and P. Yu, "Empirical evaluation of profile characteristics gender classification on Twitter, " in 12th International Conference onMachine Learning and Applications (ICMLA), pp. 365-369, Miami, Florida, Dec. 2013. IEEE, 2013.
-
(2013)
12th International Conference OnMachine Learning and Applications (ICMLA)
, pp. 365-369
-
-
Alowibdi, J.1
Buy, U.2
Yu, P.3
-
4
-
-
84893257250
-
Language independent gender classification on twitter
-
Niagara Falls, Ontario, Aug
-
J. Alowibdi, U. Buy, and P. Yu, "Language independent gender classification on Twitter, " in IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13, pp. 739-743, Niagara Falls, Ontario, Aug. 2013.
-
(2013)
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13
, pp. 739-743
-
-
Alowibdi, J.1
Buy, U.2
Yu, P.3
-
5
-
-
84899893357
-
Gender identity and lexical variation in social media
-
April
-
D. Bamman, J. Eisenstein, and T. Schnoebelen, "Gender identity and lexical variation in social media, " in Journal of Sociolinguistics, Vol. 18(2), pp. 135-160, April 2014.
-
(2014)
Journal of Sociolinguistics
, vol.18
, Issue.2
, pp. 135-160
-
-
Bamman, D.1
Eisenstein, J.2
Schnoebelen, T.3
-
6
-
-
84860848688
-
Detecting spammers on twitter
-
Redmond, Washington, July
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on Twitter, " in Collaboration, electronic messaging, antiabuse and spam conference (CEAS), vol. 6, Redmond, Washington, July 2010.
-
(2010)
Collaboration, Electronic Messaging, Antiabuse and Spam Conference (CEAS)
, vol.6
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
7
-
-
78651076564
-
KNIME - The konstanz information miner: Version 2.0 and beyond
-
M. R. Berthold, N. Cebron, F. Dill, T. R. Gabriel, T. Kötter, T. Meinl, P. Ohl, K. Thiel, and B. Wiswedel, "KNIME-The Konstanz information miner: version 2.0 and beyond, " ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 26-31, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 26-31
-
-
Berthold, M.R.1
Cebron, N.2
Dill, F.3
Gabriel, T.R.4
Kötter, T.5
Meinl, T.6
Ohl, P.7
Thiel, K.8
Wiswedel, B.9
-
8
-
-
80053276036
-
Discriminating gender on twitter
-
Edinburgh, Scotland, UK.: Association for Computational Linguistics, July 2011, [Online]
-
J. D. Burger, J. Henderson, G. Kim, and G. Zarrella, "Discriminating gender on Twitter, " in Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing. Edinburgh, Scotland, UK.: Association for Computational Linguistics, July 2011, pp. 1301-1309. [Online]. Available: http://www.aclweb.org/anthology/D11-1120
-
Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing
, pp. 1301-1309
-
-
Burger, J.D.1
Henderson, J.2
Kim, G.3
Zarrella, G.4
-
9
-
-
0034965787
-
The role of trust and deception in virtual societies
-
Wailea, Hawaii, Jan
-
C. Castelfranchi and Y.-H. Tan, "The role of trust and deception in virtual societies, " in Proc. 34th Annual Hawaii Int. Conf. on System Sciences, pp. 8, Wailea, Hawaii, Jan. 2001.
-
(2001)
Proc. 34th Annual Hawaii Int. Conf. on System Sciences
, pp. 8
-
-
Castelfranchi, C.1
Tan, Y.-H.2
-
11
-
-
80052582956
-
Information credibility on twitter
-
C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on Twitter, " in Proceedings of the 20th International Conference on the World Wide Web. ACM, 2011, pp. 675-684.
-
(2011)
Proceedings of the 20th International Conference on the World Wide Web. ACM
, pp. 675-684
-
-
Castillo, C.1
Mendoza, M.2
Poblete, B.3
-
12
-
-
84866593784
-
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Detecting automation of Twitter accounts: Are you a human, bot, or cyborg?" IEEE Transactions on Dependable and Secure Computing, pp. 811-824, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, pp. 811-824
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
13
-
-
13244267079
-
P2p-based collaborative spam detection and filtering
-
IEEE
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, "P2p-based collaborative spam detection and filtering, " in Peer-to- Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on. IEEE, 2004, pp. 176-183.
-
(2004)
Peer-to- Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on
, pp. 176-183
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
15
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
ACM
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, "Detecting and characterizing social spam campaigns, " in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 2010, pp. 35-47.
-
(2010)
Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
17
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update, " ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
19
-
-
84883300452
-
Whats in a name? Using first names as features for gender inference in twitter, " in 2013 aaai spring symposium series
-
W. Liu and D. Ruths, "Whats in a name? using first names as features for gender inference in Twitter, " in 2013 AAAI Spring Symposium Series, In Symposium on Analyzing Microtext, 2013.
-
(2013)
Symposium on Analyzing Microtext
-
-
Liu, W.1
Ruths, D.2
-
20
-
-
84906928701
-
Using social media to infer gender composition of commuter populations
-
W. Liu, F. Al Zamal, and D. Ruths, "Using social media to infer gender composition of commuter populations, " in Proceedings of the When the City Meets the Citizen Workshop, the International Conference on Weblogs and Social Media, 2012.
-
(2012)
Proceedings of the When the City Meets the Citizen Workshop, the International Conference on Weblogs and Social Media
-
-
Liu, W.1
Al Zamal, F.2
Ruths, D.3
-
22
-
-
80052767040
-
Spam detection on twitter using traditional classifiers
-
Springer
-
M. McCord and M. Chuah, "Spam detection on Twitter using traditional classifiers, " in Autonomic and Trusted Computing. Springer, 2011, pp. 175-186.
-
(2011)
Autonomic and Trusted Computing
, pp. 175-186
-
-
McCord, M.1
Chuah, M.2
-
23
-
-
85070357722
-
Understanding the demographics of twitter users
-
A. Mislove, S. L. Jørgensen, Y.-Y. Ahn, J.-P. Onnela, and J. N. Rosenquist, "Understanding the demographics of Twitter users, " in 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011, pp. 554-557.
-
(2011)
5th International AAAI Conference on Weblogs and Social Media (ICWSM'11)
, pp. 554-557
-
-
Mislove, A.1
Jørgensen, S.L.2
Ahn, Y.-Y.3
Onnela, J.-P.4
Rosenquist, J.N.5
-
24
-
-
84876343347
-
The twitter of babel: Mapping world languages through microblogging platforms
-
D. Mocanu, A. Baronchelli, N. Perra, B. Gonçalves, Q. Zhang, and A. Vespignani, "The Twitter of babel: Mapping world languages through microblogging platforms, " PloS one, vol. 8, no. 4, p. e61981, 2013.
-
(2013)
PloS One
, vol.8
, Issue.4
-
-
Mocanu, D.1
Baronchelli, A.2
Perra, N.3
Gonçalves, B.4
Zhang, Q.5
Vespignani, A.6
-
26
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
A. Ramachandran, N. Feamster, and S. Vempala, "Filtering spam with behavioral blacklisting, " in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 342-351.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM
, pp. 342-351
-
-
Ramachandran, A.1
Feamster, N.2
Vempala, S.3
-
27
-
-
85013169200
-
Hierarchical bayesian models for latent attribute detection in social media
-
D. Rao, M. J. Paul, C. Fink, D. Yarowsky, T. Oates, and G. Coppersmith, "Hierarchical bayesian models for latent attribute detection in social media." in 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011.
-
(2011)
5th International AAAI Conference on Weblogs and Social Media (ICWSM'11)
-
-
Rao, D.1
Paul, M.J.2
Fink, C.3
Yarowsky, D.4
Oates, T.5
Coppersmith, G.6
-
28
-
-
78651284817
-
Classifying latent user attributes in twitter
-
ACM
-
D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta, "Classifying latent user attributes in Twitter, " in Proceedings of the 2nd international workshop on Search and mining user-generated contents. ACM, 2010, pp. 37-44.
-
(2010)
Proceedings of the 2nd International Workshop on Search and Mining User-generated Contents
, pp. 37-44
-
-
Rao, D.1
Yarowsky, D.2
Shreevats, A.3
Gupta, M.4
-
29
-
-
79960856387
-
Prevalence and mitigation of forum spamming
-
Y. Shin, M. Gupta, and S. Myers, "Prevalence and mitigation of forum spamming, " in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 2309-2317.
-
(2011)
INFOCOM, 2011 Proceedings IEEE. IEEE
, pp. 2309-2317
-
-
Shin, Y.1
Gupta, M.2
Myers, S.3
-
30
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse, " in USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
31
-
-
84857554841
-
Machine learning for the detection of spam in twitter networks
-
Springer
-
A. H. Wang, "Machine learning for the detection of spam in Twitter networks, " in e-Business and Telecommunications. Springer, 2012, pp. 319-333.
-
(2012)
E-Business and Telecommunications
, pp. 319-333
-
-
Wang, A.H.1
-
34
-
-
77950275127
-
Detecting spam in a twitter network
-
S. Yardi, D. Romero, G. Schoenebeck, et al., "Detecting spam in a Twitter network, " First Monday, vol. 15, no. 1, 2009.
-
(2009)
First Monday
, vol.15
, Issue.1
-
-
Yardi, S.1
Romero, D.2
Schoenebeck, G.3
|