-
1
-
-
84907602109
-
An adaptive fusion algorithm for spam detection
-
C. Xu et al., "An Adaptive Fusion Algorithm for Spam Detection," IEEE Intelligent Systems, vol. 29, no. 4, 2014, pp. 2-8.
-
(2014)
IEEE Intelligent Systems
, vol.29
, Issue.4
, pp. 2-8
-
-
Xu, C.1
-
2
-
-
85100558628
-
Detecting and tracking political abuse in social media
-
J. Ratkiewicz et al., "Detecting and Tracking Political Abuse in Social Media," Proc. 5th Int'l AAAI Conf. Weblogs and Social Media, 2011; www. aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2850.
-
(2011)
Proc. 5th Int'l AAAI Conf. Weblogs and Social Media
-
-
Ratkiewicz, J.1
-
3
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb, "Uncovering Social Spammers: Social Honeypots + Machine Learning," Proc. 33rd Int'l ACM SIGIR Conf. Research and Development in Information Retrieval, 2010, pp. 435-442.
-
(2010)
Proc. 33rd Int'l ACM SIGIR Conf. Research and Development in Information Retrieval
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
4
-
-
33745785709
-
Mailrank: Using ranking for spam detection
-
P.-A. Chirita, J. Diederich, and W. Nejdl, "Mailrank: Using Ranking for Spam Detection," Proc. 14th ACM Int'l Conf. Information and Knowledge Management, 2005, pp. 373-380.
-
(2005)
Proc. 14th ACM Int'l Conf. Information and Knowledge Management
, pp. 373-380
-
-
Chirita, P.-A.1
Diederich, J.2
Nejdl, W.3
-
5
-
-
77953686613
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu et al., "Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Networking, vol. 18, no. 3, 2010, pp. 885-898.
-
(2010)
IEEE/ACM Trans. Networking
, vol.18
, Issue.3
, pp. 885-898
-
-
Yu, H.1
-
6
-
-
79955135282
-
Truthy: Mapping the spread of astroturf in microblog streams
-
J. Ratkiewicz et al., "Truthy: Mapping the Spread of Astroturf in Microblog Streams," Proc. 20th Int'l Conf. Comp. World Wide Web, 2011, pp. 249-252.
-
(2011)
Proc. 20th Int'l Conf. Comp. World Wide Web
, pp. 249-252
-
-
Ratkiewicz, J.1
-
7
-
-
79956316709
-
Oddball: Spotting anomalies in weighted graphs
-
Springer
-
L. Akoglu, M. McGlohon, and C. Faloutsos, "Oddball: Spotting Anomalies in Weighted Graphs," Advances in Knowledge Discovery and Data Mining, LNCS 6119, Springer, 2010, pp. 410-421.
-
(2010)
Advances in Knowledge Discovery and Data Mining, LNCS
, vol.6119
, pp. 410-421
-
-
Akoglu, L.1
McGlohon, M.2
Faloutsos, C.3
-
8
-
-
84868275089
-
Sms spam detection using noncontent features
-
Q. Xu et al., "SMS Spam Detection Using Noncontent Features," IEEE Intelligent Systems, vol. 27, no. 6, 2012, pp. 44-51.
-
(2012)
IEEE Intelligent Systems
, vol.27
, Issue.6
, pp. 44-51
-
-
Xu, Q.1
-
9
-
-
84893095820
-
Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel et al., "Copycatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks," Proc. 22nd Int'l Conf. World Wide Web, 2013, pp. 119-130.
-
(2013)
Proc. 22nd Int'l Conf. World Wide Web
, pp. 119-130
-
-
Beutel, A.1
-
12
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
S. Ghosh et al., "Understanding and Combating Link Farming in the Twitter Social Network," Proc. 21st Int'l Conf. World Wide Web, 2012, pp. 61-70.
-
(2012)
Proc. 21st Int'l Conf. World Wide Web
, pp. 61-70
-
-
Ghosh, S.1
-
14
-
-
84860868145
-
Spotting fake reviewer groups in consumer reviews
-
A. Mukherjee, B. Liu, and N. Glance, "Spotting Fake Reviewer Groups in Consumer Reviews," Proc. 21st Int'l Conf. World Wide Web, 2012, pp. 191-200.
-
(2012)
Proc. 21st Int'l Conf. World Wide Web
, pp. 191-200
-
-
Mukherjee, A.1
Liu, B.2
Glance, N.3
-
17
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto et al., "Detecting Spammers on Twitter," Proc. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf., vol. 6, 2010, p. 12.
-
(2010)
Proc. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf
, vol.6
, pp. 12
-
-
Benevenuto, F.1
-
19
-
-
84900399896
-
Opinion fraud detection in online reviews by network effects
-
L. Akoglu, R. Chandy, and C. Faloutsos, "Opinion Fraud Detection in Online Reviews by Network Effects," Proc. Int'l Conf. Web and Social Media, 2013; www.aaai.org/ocs/index. php/ICWSM/ICWSM13/paper/viewFile/5981/6338.
-
(2013)
Proc. Int'l Conf. Web and Social Media
-
-
Akoglu, L.1
Chandy, R.2
Faloutsos, C.3
-
20
-
-
84901273636
-
Com2: Fast automatic discovery of temporal ('comet') communities
-
Springer
-
M.Araujo et al., "Com2: Fast Automatic Discovery of Temporal ('Comet') Communities," Advances in Knowledge Discovery and Data Mining, LNCS 8444, Springer, 2014, pp. 271-283.
-
(2014)
Advances in Knowledge Discovery and Data Mining, LNCS
, vol.8444
, pp. 271-283
-
-
Araujo, M.1
-
21
-
-
84901261504
-
Inferring strange behavior from connectivity pattern in social networks
-
Springer
-
M. Jiang et al., "Inferring Strange Behavior from Connectivity Pattern in Social Networks," Advances in Knowledge Discovery and Data Mining, LNCS 8443, Springer, 2014, pp. 126-138.
-
(2014)
Advances in Knowledge Discovery and Data Mining, LNCS
, vol.8443
, pp. 126-138
-
-
Jiang, M.1
-
22
-
-
84900387506
-
Exploiting burstiness in reviews for review spammer detection
-
G. Fei et al., "Exploiting Burstiness in Reviews for Review Spammer Detection," Proc. 7th Int'l AAAI Conf. Weblogs and Social Media, 2013; www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/viewFile/6069/6356.
-
(2013)
Proc. 7th Int'l AAAI Conf. Weblogs and Social Media
-
-
Fei, G.1
-
24
-
-
84936946656
-
Social spammer detection with sentiment information
-
X. Hu et al., "Social Spammer Detection with Sentiment Information," Proc. Int'l Conf. Data Mining, 2014, pp. 180-189.
-
(2014)
Proc. Int'l Conf. Data Mining
, pp. 180-189
-
-
Hu, X.1
-
26
-
-
84907022679
-
Fema: Flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery
-
M. Jiang et al., "FEMA: Flexible Evolutionary Multi-Faceted Analysis for Dynamic Behavioral Pattern Discovery," Proc. 20th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, 2014, pp. 1186-1195.
-
(2014)
Proc. 20th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 1186-1195
-
-
Jiang, M.1
-
27
-
-
84988576212
-
A general suspiciousness metric for dense blocks in multi-modal data
-
to be published
-
M. Jiang et al., "A General Suspiciousness Metric for Dense Blocks in Multi-Modal Data," to be published in Proc. IEEE Int'l Conf. Data Mining, 2015; www.meng-jiang.com/pubs/crossspoticdm15/crossspot-icdm15-paper.pdf.
-
(2015)
Proc. IEEE Int'l Conf. Data Mining
-
-
Jiang, M.1
|