-
2
-
-
80053291127
-
Rumor has it: Identifying misinformation in microblogs
-
V. Qazvinian, E. Rosengren, D. R. Radev, and Q. Mei, " Rumor has it: Identifying Misinformation in Microblogs," in EMNLP, 2011, pp. 1589-1599.
-
(2011)
EMNLP
, pp. 1589-1599
-
-
Qazvinian, V.1
Rosengren, E.2
Radev, D.R.3
Mei, Q.4
-
3
-
-
84876796382
-
Evaluating event credibility on twitter
-
M. Gupta, P. Zhao, and J. Han, "Evaluating Event Credibility on Twitter, " in SDM, 2012, pp. 153-164.
-
(2012)
SDM
, pp. 153-164
-
-
Gupta, M.1
Zhao, P.2
Han, J.3
-
4
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, " Detecting spammers on twitter," in Collaboration, electronic messaging, antiabuse and spam conference (CEAS), vol. 6, 2010.
-
(2010)
Collaboration, Electronic Messaging, Antiabuse and Spam Conference (CEAS
, vol.6
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
5
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
F. Benevenuto, T. Rodrigues, V. A. F. Almeida, J. M. Almeida, and M. A. Gonçalves, " Detecting spammers and content promoters in online video social networks," in SIGIR, 2009, pp. 620-627.
-
(2009)
SIGIR
, pp. 620-627
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.A.F.3
Almeida, J.M.4
Gonçalves, M.A.5
-
6
-
-
78650005374
-
Spam: The underground on 140 characters or less
-
C. Grier, K. Thomas, V. Paxson, and C. M. Zhang, "@spam: the underground on 140 characters or less," in ACM Conference on Computer and Communications Security, 2010, pp. 27-37.
-
ACM Conference on Computer and Communications Security
, vol.2010
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, C.M.4
-
7
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended accounts in retrospect: an analysis of twitter spam, " in Internet Measurement Conference, 2011, pp. 243-258.
-
(2011)
Internet Measurement Conference
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
8
-
-
85113590917
-
Modeling public mood and emotion: Twitter senti ment and socio-economic phenomena
-
J. Bollen, H. Mao, and A. Pepe, "Modeling Public Mood and Emotion: Twitter Senti ment and Socio-Economic Phenomena," in ICWSM, 2011.
-
(2011)
ICWSM
-
-
Bollen, J.1
Mao, H.2
Pepe, A.3
-
9
-
-
79953102821
-
Twitter mood predicts the stock market
-
J. Bollen, H. Mao, and X.-J. Zeng, "Twitter mood predicts the stock market, " J. Comput. Science, vol. 2, no. 1, pp. 1-8, 2011.
-
(2011)
J. Comput. Science
, vol.2
, Issue.1
, pp. 1-8
-
-
Bollen, J.1
Mao, H.2
Zeng, X.-J.3
-
10
-
-
84858020958
-
Correlating financial time series with micro-blogging activity
-
E. J. Ruiz, V. Hristidis, C. Castillo, A. Gionis, and A. Jaimes, " Correlating financial time series with micro-blogging activity," in WSDM, 2012, pp. 513-522.
-
(2012)
WSDM
, pp. 513-522
-
-
Ruiz, E.J.1
Hristidis, V.2
Castillo, C.3
Gionis, A.4
Jaimes, A.5
-
11
-
-
84890668120
-
Predicting elections with twitter: What 140 characters reveal about political sentiment
-
A. Tumas jan, T. O. Sprenger, P. G. Sandner, and I. M. Welpe, " Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment," in ICWSM, 2010.
-
(2010)
ICWSM
-
-
Tumasjan, A.1
Sprenger, T.O.2
Sandner, P.G.3
Welpe, I.M.4
-
12
-
-
78649842272
-
Predicting the future with social media
-
S. Asur and B. A. Huberman, "Predicting the Future with Social Media, " in Web Intelligence, 2010, pp. 492-499.
-
(2010)
Web Intelligence
, pp. 492-499
-
-
Asur, S.1
Huberman, B.A.2
-
13
-
-
84874814009
-
A text cube approach to human, social and cultural behavior in the twitter stream
-
X. Liu, K. Tang, J. Hancock, J. Han, M. Song, R. Xu, and B. Pokorny, " A Text Cube Approach to Human, Social and Cultural Behavior in the Twitter Stream," in SBP, 2013, pp. 321-330.
-
(2013)
SBP
, pp. 321-330
-
-
Liu, X.1
Tang, K.2
Hancock, J.3
Han, J.4
Song, M.5
Xu, R.6
Pokorny, B.7
-
14
-
-
84877881232
-
Modeling indirect influence on twitter
-
X. Shuai, Y. Ding, J. R. Busemeyer, S. Chen, Y. Sun, and J. Tang, " Modeling Indirect Influence on Twitter," Int. J. Semantic Web Inf. Syst., vol. 8, no. 4, pp. 20-36, 2012.
-
(2012)
Int. J. Semantic Web Inf. Syst
, vol.8
, Issue.4
, pp. 20-36
-
-
Shuai, X.1
Ding, Y.2
Busemeyer, J.R.3
Chen, S.4
Sun, Y.5
Tang, J.6
-
15
-
-
42549096144
-
Opinion spam and analysis
-
N. Jindal and B. Liu, "Opinion spam and analysis, " in WSDM, 2008, pp. 219-230.
-
(2008)
WSDM
, pp. 219-230
-
-
Jindal, N.1
Liu, B.2
-
18
-
-
85085133306
-
You are what you tweet: Analyzing twitter for public health
-
M. J. Paul and M. Dredze, "You Are What You Tweet: Analyzing Twitter for Public Health, " in ICWSM, 2011.
-
(2011)
ICWSM
-
-
Paul, M.J.1
Dredze, M.2
-
19
-
-
84900387506
-
Exploiting burstiness in reviews for review spammer detection
-
G. Fei, A. Mukherjee, B. Liu, M. Hsu, M. Castellanos, and R. Ghosh, " Exploiting Burstiness in Reviews for Review Spammer Detection," in ICWSM, 2013.
-
(2013)
ICWSM
-
-
Fei, G.1
Mukherjee, A.2
Liu, B.3
Hsu, M.4
Castellanos, M.5
Ghosh, R.6
-
20
-
-
85019796905
-
Spotting opinion spammers using behavioral footprints
-
A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh, " Spotting opinion spammers using behavioral footprints," in KDD, 2013, pp. 632-640.
-
(2013)
KDD
, pp. 632-640
-
-
Mukherjee, A.1
Kumar, A.2
Liu, B.3
Wang, J.4
Hsu, M.5
Castellanos, M.6
Ghosh, R.7
-
21
-
-
0002425879
-
Loopy belief propagation for approximate inference: An empirical study
-
K. P. Murphy, Y. Weiss, and M. I. Jordan, "Loopy Belief Propagation for Approximate Inference: An Empirical Study, " in UAI, 1999, pp. 467-475.
-
(1999)
UAI
, pp. 467-475
-
-
Murphy, K.P.1
Weiss, Y.2
Jordan, M.I.3
-
22
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
A. Mille, F. L. Gandon, J. Misselis, M. Rabinovich, and S. St aab, Eds. ACM. [Online]. Available
-
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and P. K. Gummadi, " Understanding and combating link farming in the twitter social network." in WWW, A. Mille, F. L. Gandon, J. Misselis, M. Rabinovich, and S. St aab, Eds. ACM, 2012, pp. 61-70. [Online]. Available: http://dblp.unitrier. De/db/conf/www/www2012.html#GhoshVKSKBGG12
-
(2012)
WWW
, pp. 61-70
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, P.K.8
-
23
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
C. Yang, R. C. Harkreader, J. Zhang, S. Shin, and G. Gu, " Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter," in WWW, 2012, pp. 71-80.
-
(2012)
WWW
, pp. 71-80
-
-
Yang, C.1
Harkreader, R.C.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
24
-
-
78650025451
-
Detecting and characterizing social spam campaigns
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, " Detecting and characterizing social spam campaigns," in ACM Conference on Computer and Communications Security, 2010, pp. 681-683.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 681-683
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
25
-
-
83055187614
-
Content-driv en detection of campaigns in social media
-
K. Lee, J. Caverlee, Z. Cheng, and D. Z. Sui, "Content-driv en detection of campaigns in social media," in CIKM, 2011, pp. 551-556.
-
(2011)
CIKM
, pp. 551-556
-
-
Lee, K.1
Caverlee, J.2
Cheng, Z.3
Sui, D.Z.4
-
26
-
-
84874032132
-
Detecting spam and promoting campaigns in the twitter social network
-
X. Zhang, S. Zhu, and W. Liang, "Detecting spam and promoting campaigns in the twitter social network, " in ICDM, 2012, pp. 1194-1199.
-
(2012)
ICDM
, pp. 1194-1199
-
-
Zhang, X.1
Zhu, S.2
Liang, W.3
-
27
-
-
35348860262
-
Netprobe: A fast and scalable system for fraud detection in online auction networks
-
S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos, " Netprobe: a fast and scalable system for fraud detection in online auction networks," in WWW, 2007, pp. 201-210.
-
(2007)
WWW
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
28
-
-
70350647577
-
Snare: A link analytic system for graph labeling and risk detection
-
M. McGlohon, S. Bay, M. G. Anderle, D. M. Steier, and C. Faloutsos, " Snare: a link analytic system for graph labeling and risk detection," in KDD, 2009, pp. 1265-1274.
-
(2009)
KDD
, pp. 1265-1274
-
-
McGlohon, M.1
Bay, S.2
Anderle, M.G.3
Steier, D.M.4
Faloutsos, C.5
-
29
-
-
84900399896
-
Opinion fraud detection in online reviews by network effects
-
L. Akoglu, R. Chandy, and C. Faloutsos, " Opinion Fraud Detection in Online Reviews by Network Effects," in ICWSM, 2013.
-
(2013)
ICWSM
-
-
Akoglu, L.1
Chandy, R.2
Faloutsos, C.3
-
30
-
-
19944399438
-
Information diffusion through blogspace
-
ACM Press
-
D. Gruhl, R. Guha, D. Liben-nowell, and A. Tomkins, " Information Diffusion through Blogspace," in WWW. ACM Press, 2004, pp. 491-501.
-
(2004)
WWW
, pp. 491-501
-
-
Gruhl, D.1
Guha, R.2
Liben-Nowell, D.3
Tomkins, A.4
-
31
-
-
84873450362
-
Differences in the mechanics of information diffusion across topics : Idioms, political hashtags, and complex contagion on twitter
-
D. M. Romero, B. Meeder, and J. M. Kleinberg, "Differences in the mechanics of information diffusion across topics : idioms, political hashtags, and complex contagion on twitter," in WWW, 2011, pp. 695-704.
-
(2011)
WWW
, pp. 695-704
-
-
Romero, D.M.1
Meeder, B.2
Kleinberg, J.M.3
-
32
-
-
84959908374
-
Turning the tide: Curbing deceptive yelp behaviors
-
M. Rahman, B. Carbunar, J. Ballesteros, G. Burri, and D. H. Chau., " Turning the tide: Curbing deceptive yelp behaviors," in SIAM, 2014.
-
(2014)
SIAM
-
-
Rahman, M.1
Carbunar, B.2
Ballesteros, J.3
Burri, G.4
Chau, D.H.5
-
33
-
-
0020276268
-
Reverend bayes on inference engines: A distributed hierarchical approach
-
J. Pearl, "Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach, " in AAAI, 1982, pp. 133-136.
-
(1982)
AAAI
, pp. 133-136
-
-
Pearl, J.1
-
34
-
-
0000388721
-
Generalized belief propagation
-
J. S. Yedidi a, W. T. Freeman, and Y. Weiss, " Generalized Belief Propagation," in NIPS, 2000, pp. 689-695.
-
(2000)
NIPS
, pp. 689-695
-
-
Yedidia, J.S.1
Freeman, W.T.2
Weiss, Y.3
-
35
-
-
33748659203
-
Improved peak detection in mass spectrum by incorporating continuous wavelet transform-based pattern matching
-
P. Du, W. A. Kibbe, and S. M. Lin, " Improved peak detection in mass spectrum by incorporating continuous wavelet transform-based pattern matching," Bioinformatics, vol. 22, no. 17, pp. 2059-2065, 2006.
-
(2006)
Bioinformatics
, vol.22
, Issue.17
, pp. 2059-2065
-
-
Du, P.1
Kibbe, W.A.2
Lin, S.M.3
-
37
-
-
53749083869
-
Collective classification in network data
-
P. Sen, G. Namata, M. Bilgic, L. Getoor, B. Gallagher, and T. Eliassi-Rad, " Collective classification in network data," AI Magazine, vol. 29, no. 3, pp. 93-106, 2008.
-
(2008)
AI Magazine
, vol.29
, Issue.3
, pp. 93-106
-
-
Sen, P.1
Namata, G.2
Bilgic, M.3
Getoor, L.4
Gallagher, B.5
Eliassi-Rad, T.6
|