-
1
-
-
76149086844
-
Spread of (mis) information in social networks
-
Daron Acemoglu, Asuman Ozdaglar, and Ali ParandehGheibi. Spread of (mis) information in social networks. Games and Economic Behavior, 70(2):194-227, 2010.
-
(2010)
Games and Economic Behavior
, vol.70
, Issue.2
, pp. 194-227
-
-
Acemoglu, D.1
Ozdaglar, A.2
ParandehGheibi, A.3
-
2
-
-
83055161410
-
Information diffusion in social networks: Observing and affecting what society cares about
-
Divyakant Agrawal, Ceren Budak, and Amr El Abbadi. Information diffusion in social networks: observing and affecting what society cares about. In Proceedings of CIKM, pages 2609-2610, 2011.
-
(2011)
Proceedings of CIKM
, pp. 2609-2610
-
-
Agrawal, D.1
Budak, C.2
Abbadi, A.E.3
-
3
-
-
0002657341
-
Wartime rumors of waste and special privilege: Why some people believe them
-
Floyd H Allport and Milton Lepkin. Wartime rumors of waste and special privilege: why some people believe them. The Journal of Abnormal and Social Psychology, 40(1):3, 1945.
-
(1945)
The Journal of Abnormal and Social Psychology
, vol.40
, Issue.1
, pp. 3
-
-
Allport, F.H.1
Lepkin, M.2
-
5
-
-
63049136298
-
Identifying video spammers in online social networks
-
ACM
-
Fabricio Benevenuto, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, Chao Zhang, and Keith Ross. Identifying video spammers in online social networks. In International Workshop on Adversarial Infor mation Retrieval on the Web, pages 45-52. ACM.
-
International Workshop on Adversarial Infor mation Retrieval on the Web
, pp. 45-52
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Zhang, C.5
Ross, K.6
-
7
-
-
77956296152
-
The spread of behavior in an online social network experiment
-
Damon Centola. The spread of behavior in an online social network experiment. Science, 329(5996):1194-1197, 2010.
-
(2010)
Science
, vol.329
, Issue.5996
, pp. 1194-1197
-
-
Centola, D.1
-
8
-
-
84907028967
-
Information and influence propagation in social networks
-
Wei Chen, Laks VS Lakshmanan, and Carlos Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4):1-177, 2013.
-
(2013)
Synthesis Lectures on Data Management
, vol.5
, Issue.4
, pp. 1-177
-
-
Chen, W.1
Lakshmanan, L.V.S.2
Castillo, C.3
-
9
-
-
77956192689
-
Scalable influence maximization for prevalent viral marketing in large-scale social networks
-
ACM
-
Wei Chen, Chi Wang, and Yajun Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, pages 1029-1038. ACM, 2010.
-
(2010)
KDD
, pp. 1029-1038
-
-
Chen, W.1
Wang, C.2
Wang, Y.3
-
11
-
-
0002625860
-
Reining in rumors
-
Nicholas DiFonzo, Prashant Bordia, and Ralph L Rosnow. Reining in rumors. Organizational Dynamics, 23(1):47-62, 1994.
-
(1994)
Organizational Dynamics
, vol.23
, Issue.1
, pp. 47-62
-
-
DiFonzo, N.1
Bordia, P.2
Rosnow, R.L.3
-
12
-
-
84904429895
-
Compa: Detecting compromised accounts on social networks
-
Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. Compa: Detecting compromised accounts on social networks. In NDSS, 2013.
-
(2013)
NDSS
-
-
Egele, M.1
Stringhini, G.2
Kruegel, C.3
Vigna, G.4
-
13
-
-
84922286898
-
Inside a twitter robot factory
-
J Elder. Inside a twitter robot factory. Wall Street Journal, 821400, 2013.
-
(2013)
Wall Street Journal
, pp. 821400
-
-
Elder, J.1
-
14
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
ACM
-
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. Detecting and characterizing social spam campaigns. In Proceed ings of the 10th ACM SIGCOMM Conference on Internet Measurement, pages 35-47. ACM, 2010.
-
(2010)
Proceed ings of the 10th ACM SIGCOMM Conference on Internet Measurement
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
15
-
-
84903747545
-
Ranking metric anomaly in invariant networks
-
Yong Ge, Guofei Jiang, Min Ding, and Hui Xiong. Ranking metric anomaly in invariant networks. ACM Transactions on Knowledge Dis covery from Data (TKDD), 8(2):8, 2014.
-
(2014)
ACM Transactions on Knowledge Dis covery from Data (TKDD)
, vol.8
, Issue.2
, pp. 8
-
-
Ge, Y.1
Jiang, G.2
Ding, M.3
Xiong, H.4
-
17
-
-
84857144698
-
Simpath: An efficient algorithm for influence maximization under the linear threshold model
-
IEEE
-
Amit Goyal, Wei Lu, and Laks VS Lakshmanan. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In Data Mining (ICDM), 2011 IEEE 11th International Conference on, pages 211-220. IEEE, 2011.
-
(2011)
Data Mining (ICDM), 2011 IEEE 11th International Conference on
, pp. 211-220
-
-
Goyal, A.1
Lu, W.2
Lakshmanan, L.V.S.3
-
18
-
-
19944399438
-
Information diffusion through blogspace
-
ACM
-
Daniel Gruhl, Ramanathan Guha, David Liben-Nowell, and Andrew Tomkins. Information diffusion through blogspace. In Proceedings of the 13th International Conference on World Wide Web, pages 491-501. ACM, 2004.
-
(2004)
Proceedings of the 13th International Conference on World Wide Web
, pp. 491-501
-
-
Gruhl, D.1
Guha, R.2
Liben-Nowell, D.3
Tomkins, A.4
-
20
-
-
84893135215
-
Faking sandy: Characterizing and identifying fake images on twit ter during hurricane sandy
-
Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. Faking sandy: Characterizing and identifying fake images on twit ter during hurricane sandy. WWW '13 Companion, pages 729-736, 2013.
-
(2013)
WWW '13 Companion
, pp. 729-736
-
-
Gupta, A.1
Lamba, H.2
Kumaraguru, P.3
Joshi, A.4
-
21
-
-
85052938748
-
-
PhD thesis, Carnegie Mellon Univer sity, Pittsburgh, PA
-
Jingrui He. Rare category analysis. PhD thesis, Carnegie Mellon Univer sity, Pittsburgh, PA, 2010.
-
(2010)
Rare category analysis
-
-
Jingrui, H.1
-
24
-
-
34848911641
-
Social phishing
-
Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer. Social phishing. Communications of the ACM, 50(10):94-100, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
27
-
-
84875330257
-
Plzrt: A social diffusion model of misinformation and disinformation for understanding human information behaviour
-
Natascha Karlova and Karen Fisher. Plzrt: A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research, 18(1), 2013.
-
(2013)
Information Research
, vol.18
, Issue.1
-
-
Karlova, N.1
Fisher, K.2
-
28
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
ACM
-
David Kempe, Jon Kleinberg, and Eva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data, Mining, pages 137-146. ACM, 2003.
-
(2003)
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data, Mining
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
31
-
-
84879770882
-
Whom should i follow?: Identifying relevant users during crises
-
ACM
-
Shamanth Kumar, Fred Morstatter, Reza Zafarani, and Huan Liu. Whom should i follow?: identifying relevant users during crises. In Hypertext, pages 139-147. ACM, 2013.
-
(2013)
Hypertext
, pp. 139-147
-
-
Kumar, S.1
Morstatter, F.2
Zafarani, R.3
Liu, H.4
-
33
-
-
85134438433
-
Seven months with the devils: A long-term study of content polluters on twitter
-
Citeseer
-
Kyumin Lee, Brian David Eoff, and James Caverlee. Seven months with the devils: A long-term study of content polluters on twitter. In ICWSM. Citeseer, 2011.
-
(2011)
ICWSM
-
-
Lee, K.1
Eoff, B.D.2
Caverlee, J.3
-
34
-
-
84946240361
-
Early filtering of ephemeral malicious ac counts on twitter
-
Sangho Lee and Jong Kim. Early filtering of ephemeral malicious ac counts on twitter. Computer Communications, 54:48-57, 2014.
-
(2014)
Computer Communications
, vol.54
, pp. 48-57
-
-
Lee, S.1
Kim, J.2
-
36
-
-
84936952505
-
Spot ting fake reviews via collective positive-unlabeled learning
-
IEEE
-
Huayi Li, Zhiyuan Chen, Bing Liu, Xiaokai Wei, and Jidong Shao. Spot ting fake reviews via collective positive-unlabeled learning. In ICDM, pages 899-904. IEEE, 2014.
-
(2014)
ICDM
, pp. 899-904
-
-
Li, H.1
Chen, Z.2
Liu, B.3
Wei, X.4
Shao, J.5
-
37
-
-
84922061747
-
Social media and disasters: Current uses, future options, and policy considerations
-
Bruce R Lindsay. Social media and disasters: Current uses, future options, and policy considerations. CRS Report for Congress, pages 7-5700, 2011.
-
(2011)
CRS Report for Congress
, pp. 7-5700
-
-
Lindsay, B.R.1
-
38
-
-
84963672827
-
Fear, misinformation, and social media complicate ebola fight
-
Victor Luckerson. Fear, misinformation, and social media complicate ebola fight. Tech Report, 2014.
-
(2014)
Tech Report
-
-
Luckerson, V.1
-
41
-
-
84996526064
-
-
Baharan Mirzasoleiman, Ashwinkumar Badanidiyuru, Amin Karbasi, Jan Vondrak, and Andreas Krause. Lazier than lazy greedy. arXiv preprint arXiv:1409.7938, 2014.
-
(2014)
Lazier than lazy greedy
-
-
Mirzasoleiman, B.1
Badanidiyuru, A.2
Karbasi, A.3
Vondrak, J.4
Krause, A.5
-
42
-
-
84954243630
-
-
Fred Morstatter, Nichola Lubold, Heather Pon-Barry, Jurgen Pfeffer, and Huan Liu. Finding eyewitness tweets during crises. arXiv preprint arXiv:1403.1773, 2014.
-
(2014)
Finding eyewitness tweets during crises
-
-
Morstatter, F.1
Lubold, N.2
Pon-Barry, H.3
Pfeffer, J.4
Liu, H.5
-
43
-
-
84874339922
-
Sources of misinfor mation in online social networks: Who to suspect
-
Dung T Nguyen, Nam P Nguyen, and My T Thai. Sources of misinfor mation in online social networks: who to suspect. In Military Communi cations Conference, MILCOM, pages 1-6, 2012.
-
(2012)
Military Communi cations Conference, MILCOM
, pp. 1-6
-
-
Nguyen, D.T.1
Nguyen, N.P.2
Thai, M.T.3
-
44
-
-
84869059400
-
Containment of misinformation spread in online social networks
-
ACM
-
Nam P Nguyen, Guanhua Yan, My T Thai, and Stephan Eidenbenz. Containment of misinformation spread in online social networks. In Pro ceedings of the 4th Annual ACM Web Science Conference, pages 213-222. ACM, 2012.
-
(2012)
Pro ceedings of the 4th Annual ACM Web Science Conference
, pp. 213-222
-
-
Nguyen, N.P.1
Yan, G.2
Thai, M.T.3
Eidenbenz, S.4
-
45
-
-
84870963741
-
An exploration of social media in extreme events: Rumor theory and twitter during the haiti earthquake
-
Onook Oh, Kyounghee Hazel Kwon, and H Raghav Rao. An exploration of social media in extreme events: Rumor theory and twitter during the haiti earthquake 2010. In ICIS, page 231, 2010.
-
(2010)
ICIS
, pp. 231
-
-
Oh, O.1
Kwon, K.H.2
Raghav Rao, H.3
-
46
-
-
80053291127
-
Rumor has it: Identifying misinformation in microblogs
-
Vahed Qazvinian, Emily Rosengren, Dragomir R Radev, and Qiaozhu Mei. Rumor has it: Identifying misinformation in microblogs. In EMNLP, pages 1589-1599, 2011.
-
(2011)
EMNLP
, pp. 1589-1599
-
-
Qazvinian, V.1
Rosengren, E.2
Radev, D.R.3
Mei, Q.4
-
47
-
-
79955135282
-
Truthy: Map ping the spread of astroturf in microblog streams
-
ACM
-
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Gonffalves, Sne hal Patil, Alessandro Flammini, and Filippo Menczer. Truthy: map ping the spread of astroturf in microblog streams. In Proceedings of the WWW'll, Companion Volume, pages 249-252. ACM, 2011.
-
(2011)
Proceedings of the WWW'll, Companion Volume
, pp. 249-252
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonffalves, B.4
Patil, S.5
Flammini, A.6
Menczer, F.7
-
48
-
-
84893316183
-
Social media users spreading false information about sandy hook massacre could face charges, say police
-
Christine Roberts. Social media users spreading false information about sandy hook massacre could face charges, say police. New York Daily News, 2012.
-
(2012)
New York Daily News
-
-
Roberts, C.1
-
49
-
-
84920076302
-
Isis displaying a deft command of varied media
-
Scott Shane and Ben Hubbard. Isis displaying a deft command of varied media. New York Times, 31, 2014.
-
(2014)
New York Times
, pp. 31
-
-
Shane, S.1
Hubbard, B.2
-
52
-
-
84905594974
-
Backchannels on the front lines: Emergent uses of social media in the 2007 southern california wildfires
-
Washington, DC
-
Jeannette Sutton, Leysia Palen, and Irina Shklovski. Backchannels on the front lines: Emergent uses of social media in the 2007 southern california wildfires. In Proceedings of the 5th International ISCRAM Conference, pages 624-632. Washington, DC, 2008.
-
(2008)
Proceedings of the 5th International ISCRAM Conference
, pp. 624-632
-
-
Sutton, J.1
Palen, L.2
Shklovski, I.3
-
53
-
-
85052929417
-
Preventing misinformation from spreading through social media
-
David Talbot. Preventing misinformation from spreading through social media. MIT Technology Review, 2013.
-
(2013)
MIT Technology Review
-
-
Talbot, D.1
-
54
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
ACM
-
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pages 243-258. ACM, 2011.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
55
-
-
84942067850
-
Twitter as a reporting tool for breaking news: Journalists tweeting the 2011 uk riots
-
Farida Vis. Twitter as a reporting tool for breaking news: Journalists tweeting the 2011 uk riots. Digital Journalism, 1(1):27-47, 2013.
-
(2013)
Digital Journalism
, vol.1
, Issue.1
, pp. 27-47
-
-
Vis, F.1
-
56
-
-
85046419219
-
To tackle the spread of misinformation online we must first understand it
-
Farida Vis. To tackle the spread of misinformation online we must first understand it. Guardian Comment Network, 2014.
-
(2014)
Guardian Comment Network
-
-
Vis, F.1
-
57
-
-
84904794911
-
Social honeypots: Making friends with a spammer near you
-
Steve Webb, James Caverlee, and Calton Pu. Social honeypots: Making friends with a spammer near you. In CEAS, 2008.
-
(2008)
CEAS
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
59
-
-
85052975848
-
10 bits of surprise: Detecting malicious users with minimum information
-
Reza Zafarani and Huan Liu. 10 bits of surprise: Detecting malicious users with minimum information. CIKM'15. ACM.
-
CIKM'15. ACM
-
-
Zafarani, R.1
Liu, H.2
-
60
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum. Botgraph: Large scale spamming botnet detection. In NSDI, volume 9, pages 321-334, 2009.
-
(2009)
NSDI
, vol.9
, pp. 321-334
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
61
-
-
84916925418
-
Discovery of ranking fraud for mobile apps
-
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. Discovery of ranking fraud for mobile apps. Knowledge and Data Engineering, IEEE Transactions on, 27(1):74-87, 2015.
-
(2015)
Knowledge and Data Engineering, IEEE Transactions on
, vol.27
, Issue.1
, pp. 74-87
-
-
Zhu, H.1
Xiong, H.2
Ge, Y.3
Chen, E.4
-
62
-
-
85167431555
-
Discovering spammers in social networks
-
Yin Zhu, Xiao Wang, Erheng Zhong, Nathan Nan Liu, He Li, and Qiang Yang. Discovering spammers in social networks. In AAAI, 2012.
-
(2012)
AAAI
-
-
Zhu, Y.1
Wang, X.2
Zhong, E.3
Liu, N.N.4
Li, H.5
Yang, Q.6
|