-
3
-
-
38749085661
-
Local graph partitioning using pagerank vectors
-
IEEE
-
R. Andersen, F. Chung, and K. Lang. Local graph partitioning using pagerank vectors. In FOCS, pages 475-486. IEEE, 2006.
-
(2006)
FOCS
, pp. 475-486
-
-
Andersen, R.1
Chung, F.2
Lang, K.3
-
4
-
-
40949116672
-
Link analysis for web spam detection
-
L. Becchetti, C. Castillo, D. Donato, R. Baeza-Yates, and S. Leonardi. Link analysis for web spam detection. ACM Transactions on the Web (TWEB), 2(1):2, 2008.
-
(2008)
ACM Transactions on the Web (TWEB)
, vol.2
, Issue.1
, pp. 2
-
-
Becchetti, L.1
Castillo, C.2
Donato, D.3
Baeza-Yates, R.4
Leonardi, S.5
-
5
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-Abuse and spam conference (CEAS), volume 6, page 12, 2010.
-
(2010)
Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS)
, vol.6
, pp. 12
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
6
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
ACM
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Goncalves. Detecting spammers and content promoters in online video social networks. In SIGIR, pages 620-627. ACM, 2009.
-
(2009)
SIGIR
, pp. 620-627
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Goncalves, M.5
-
7
-
-
84893095820
-
Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
-
ACM
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW, pages 119-130. ACM, 2013.
-
(2013)
WWW
, pp. 119-130
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
8
-
-
84910660900
-
Uncovering large groups of active malicious accounts in online social networks
-
ACM
-
Q. Cao, X. Yang, J. Yu, and C. Palow. Uncovering large groups of active malicious accounts in online social networks. In SIGSAC CCS, pages 477-488. ACM, 2014.
-
(2014)
SIGSAC CCS
, pp. 477-488
-
-
Cao, Q.1
Yang, X.2
Yu, J.3
Palow, C.4
-
9
-
-
36448992581
-
Know your neighbors: Web spam detection using the web topology
-
ACM
-
C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. In SIGIR, pages 423-430. ACM, 2007.
-
(2007)
SIGIR
, pp. 423-430
-
-
Castillo, C.1
Donato, D.2
Gionis, A.3
Murdock, V.4
Silvestri, F.5
-
10
-
-
33745785709
-
Mailrank: Using ranking for spam detection
-
ACM
-
P.-A. Chirita, J. Diederich, and W. Nejdl. Mailrank: using ranking for spam detection. In CIKM, pages 373-380. ACM, 2005.
-
(2005)
CIKM
, pp. 373-380
-
-
Chirita, P.-A.1
Diederich, J.2
Nejdl, W.3
-
11
-
-
84910115464
-
Paying for likes?: Understanding facebook like fraud using honeypots
-
ACM
-
E. De Cristofaro, A. Friedman, G. Jourjon, M. A. Kaafar, and M. Z. Shaq. Paying for likes?: Understanding facebook like fraud using honeypots. In IMC, pages 129-136. ACM, 2014.
-
(2014)
IMC
, pp. 129-136
-
-
De Cristofaro, E.1
Friedman, A.2
Jourjon, G.3
Kaafar, M.A.4
Shaq, M.Z.5
-
12
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
ACM
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and characterizing social spam campaigns. In IMC, pages 35-47. ACM, 2010.
-
(2010)
IMC
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
13
-
-
84954170997
-
Using local spectral methods to robustify graph-based learning algorithms
-
ACM
-
D. F. Gleich and M. W. Mahoney. Using local spectral methods to robustify graph-based learning algorithms. In SIGKDD, pages 359-368. ACM, 2015.
-
(2015)
SIGKDD
, pp. 359-368
-
-
Gleich, D.F.1
Mahoney, M.W.2
-
14
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. Internet Computing, IEEE, 11(6):36-45, 2007.
-
(2007)
Internet Computing IEEE
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
15
-
-
84901261504
-
Inferring strange behavior from connectivity pattern in social networks
-
Springer
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Inferring strange behavior from connectivity pattern in social networks. In Advances in Knowledge Discovery and Data Mining, pages 126-138. Springer, 2014.
-
(2014)
Advances in Knowledge Discovery and Data Mining
, pp. 126-138
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
17
-
-
63049114931
-
Detecting spam blogs: A machine learning approach
-
P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi. Detecting spam blogs: A machine learning approach. In AAAI, volume 21, page 1351, 2006.
-
(2006)
AAAI
, vol.21
, pp. 1351
-
-
Kolari, P.1
Java, A.2
Finin, T.3
Oates, T.4
Joshi, A.5
-
18
-
-
84860572561
-
Detecting collective attention spam
-
ACM
-
K. Lee, J. Caverlee, K. Y. Kamath, and Z. Cheng. Detecting collective attention spam. In WebQuality, pages 48-55. ACM, 2012.
-
(2012)
WebQuality
, pp. 48-55
-
-
Lee, K.1
Caverlee, J.2
Kamath, K.Y.3
Cheng, Z.4
-
20
-
-
84968835239
-
-
WWW ACM
-
Y. Li, K. He, D. Bindel, and J. E. Hopcroft. Uncovering the small community structure in large networks: A local spectral approach. In WWW, pages 658-668. ACM, 2015.
-
(2015)
Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach
, pp. 658-668
-
-
Li, Y.1
He, K.2
Bindel, D.3
Hopcroft, J.E.4
-
21
-
-
78651302642
-
Detecting product review spammers using rating behaviors
-
ACM
-
E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In CIKM, pages 939-948. ACM, 2010.
-
(2010)
CIKM
, pp. 939-948
-
-
Lim, E.-P.1
Nguyen, V.-A.2
Jindal, N.3
Liu, B.4
Lauw, H.W.5
-
22
-
-
84869155042
-
A local spectral method for graphs: With applications to improving graph partitions and exploring data graphs locally
-
M. W. Mahoney, L. Orecchia, and N. K. Vishnoi. A local spectral method for graphs: With applications to improving graph partitions and exploring data graphs locally. The Journal of Machine Learning Research, 13(1):2339-2365, 2012.
-
(2012)
The Journal of Machine Learning Research
, vol.13
, Issue.1
, pp. 2339-2365
-
-
Mahoney, M.W.1
Orecchia, L.2
Vishnoi, N.K.3
-
23
-
-
57349173529
-
-
WWW ACM
-
B. Mehta, S. Nangia, M. Gupta, and W. Nejdl. Detecting image spam using visual features and near duplicate detection. In WWW, pages 497-506. ACM, 2008.
-
(2008)
Detecting Image Spam Using Visual Features and Near Duplicate Detection
, pp. 497-506
-
-
Mehta, B.1
Nangia, S.2
Gupta, M.3
Nejdl, W.4
-
24
-
-
84860868145
-
Spotting fake reviewer groups in consumer reviews
-
ACM
-
A. Mukherjee, B. Liu, and N. Glance. Spotting fake reviewer groups in consumer reviews. In WWW, pages 191-200. ACM, 2012.
-
(2012)
WWW
, pp. 191-200
-
-
Mukherjee, A.1
Liu, B.2
Glance, N.3
-
25
-
-
34250653315
-
Detecting spam web pages through content analysis
-
ACM
-
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting spam web pages through content analysis. In WWW, pages 83-92. ACM, 2006.
-
(2006)
WWW
, pp. 83-92
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
27
-
-
35348860262
-
Netprobe: A fast and scalable system for fraud detection in online auction networks
-
ACM
-
S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos. Netprobe: A fast and scalable system for fraud detection in online auction networks. In WWW, pages 201-210. ACM, 2007.
-
(2007)
WWW
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
28
-
-
78751502334
-
Detecting spammers on social networks
-
ACM
-
G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC, pages 1-9. ACM, 2010.
-
(2010)
ACSAC
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
29
-
-
84974703959
-
Evilcohort: Detecting communities of malicious accounts on online services
-
G. Stringhini, P. Mourlanne, G. Jacob, M. Egele, C. Kruegel, and G. Vigna. Evilcohort: detecting communities of malicious accounts on online services. In USENIX Security Symposium, 2015.
-
(2015)
USENIX Security Symposium
-
-
Stringhini, G.1
Mourlanne, P.2
Jacob, G.3
Egele, M.4
Kruegel, C.5
Vigna, G.6
-
30
-
-
78651420679
-
Don't follow me: Spam detection in twitter
-
IEEE
-
A. H. Wang. Don't follow me: Spam detection in twitter. In SECRYPT, pages 1-10. IEEE, 2010.
-
(2010)
SECRYPT
, pp. 1-10
-
-
Wang, A.H.1
-
31
-
-
85076287406
-
You are how you click: Clickstream analysis for sybil detection
-
G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao. You are how you click: Clickstream analysis for sybil detection. In Usenix Security, pages 241-256, 2013.
-
(2013)
Usenix Security
, pp. 241-256
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
-
32
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
ACM
-
Y.-M. Wang, M. Ma, Y. Niu, and H. Chen. Spam double-funnel: Connecting web spammers with advertisers. In WWW, pages 291-300. ACM, 2007.
-
(2007)
WWW
, pp. 291-300
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
33
-
-
84889587455
-
Overlapping community detection using seed set expansion
-
ACM
-
J. J. Whang, D. F. Gleich, and I. S. Dhillon. Overlapping community detection using seed set expansion. In CIKM, pages 2099-2108. ACM, 2013.
-
(2013)
CIKM
, pp. 2099-2108
-
-
Whang, J.J.1
Gleich, D.F.2
Dhillon, I.S.3
-
34
-
-
34250632435
-
Topical trustrank: Using topicality to combat web spam
-
ACM
-
B. Wu, V. Goel, and B. D. Davison. Topical trustrank: Using topicality to combat web spam. In WWW, pages 63-72. ACM, 2006.
-
(2006)
WWW
, pp. 63-72
-
-
Wu, B.1
Goel, V.2
Davison, B.D.3
-
35
-
-
33749256984
-
Using visual features for anti-spam flltering
-
IEEE
-
C.-T. Wu, K.-T. Cheng, Q. Zhu, and Y.-L. Wu. Using visual features for anti-spam flltering. In ICIP, volume 3, pages III-509. IEEE, 2005.
-
(2005)
ICIP
, vol.3
, pp. III-509
-
-
Wu, C.-T.1
Cheng, K.-T.2
Zhu, Q.3
Wu, Y.-L.4
-
36
-
-
84929145888
-
Defining and evaluating network communities based on ground-Truth
-
J. Yang and J. Leskovec. Defining and evaluating network communities based on ground-Truth. Knowledge and Information Systems, 42(1):181-213, 2015.
-
(2015)
Knowledge and Information Systems
, vol.42
, Issue.1
, pp. 181-213
-
-
Yang, J.1
Leskovec, J.2
-
37
-
-
84896964777
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. TKDD, 8(1):2, 2014.
-
(2014)
TKDD
, vol.8
, Issue.1-2
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
|