-
1
-
-
84879463278
-
StreamKM++: A clustering algorithm for data streams
-
M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler. StreamKM++: A clustering algorithm for data streams. Experimental Algorithmics, 17:2-4, 2012.
-
(2012)
Experimental Algorithmics
, vol.17
, pp. 2-4
-
-
Ackermann, M.R.1
Märtens, M.2
Raupach, C.3
Swierkot, K.4
Lammersen, C.5
Sohler, C.6
-
2
-
-
84878359270
-
A generic statistical approach for spam detection in online social networks
-
F. Ahmed and M. Abulaish. A generic statistical approach for spam detection in online social networks. Computer Communications, 36(10):1120-1129, 2013.
-
(2013)
Computer Communications
, vol.36
, Issue.10
, pp. 1120-1129
-
-
Ahmed, F.1
Abulaish, M.2
-
3
-
-
85038368785
-
Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing
-
ACM
-
M. Avvenuti, S. Bellomo, S. Cresci, M. N. La Polla, and M. Tesconi. Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing. In WWW companion. ACM, 2017.
-
(2017)
WWW Companion
-
-
Avvenuti, M.1
Bellomo, S.2
Cresci, S.3
La Polla, M.N.4
Tesconi, M.5
-
5
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves. Detecting spammers and content promoters in online video social networks. In SIGIR. ACM, 2009.
-
(2009)
SIGIR. ACM
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Gonçalves, M.5
-
6
-
-
85015151172
-
CopyCatch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW. ACM, 2013.
-
(2013)
WWW. ACM
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
7
-
-
85060305876
-
-
Accessed: 2016-10-24
-
Bot or not? http://truthy.indiana.edu/botornot/,2014. Accessed: 2016-10-24.
-
(2014)
-
-
-
8
-
-
33745434639
-
Density-based clustering over an evolving data stream with noise
-
F. Cao, M. Ester, W. Qian, and A. Zhou. Density-Based Clustering over an Evolving Data Stream with Noise. In SDM. SIAM, 2006.
-
(2006)
SDM. SIAM
-
-
Cao, F.1
Ester, M.2
Qian, W.3
Zhou, A.4
-
9
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In NSDI. USENIX, 2012.
-
(2012)
NSDI. USENIX
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
10
-
-
85060269717
-
Uncovering large groups of active malicious accounts in online social networks
-
Q. Cao, X. Yang, J. Yu, and C. Palow. Uncovering large groups of active malicious accounts in online social networks. In CCS. ACM, 2014.
-
(2014)
CCS. ACM
-
-
Cao, Q.1
Yang, X.2
Yu, J.3
Palow, C.4
-
11
-
-
41349117788
-
Finding community structure in very large networks
-
A. Clauset, M. E. Newman, and C. Moore. Finding community structure in very large networks. Physical review E, 70(6):066111, 2004.
-
(2004)
Physical Review E
, vol.70
, Issue.6
, pp. 066111
-
-
Clauset, A.1
Newman, M.E.2
Moore, C.3
-
12
-
-
85060291669
-
A Criticism to Society (as seen by Twitter analytics)
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. A Criticism to Society (as seen by Twitter analytics). In DASec. IEEE, 2014.
-
(2014)
DASec. IEEE
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
13
-
-
84945161749
-
Fame for sale: Efficient detection of fake Twitter followers
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems, 80:56-71, 2015.
-
(2015)
Decision Support Systems
, vol.80
, pp. 56-71
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
14
-
-
84991501244
-
DNA-inspired online behavioral modeling and its application to spambot detection
-
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intelligent Systems, 5(31):58-64, 2016.
-
(2016)
IEEE Intelligent Systems
, vol.5
, Issue.31
, pp. 58-64
-
-
Cresci, S.1
Di Pietro, R.2
Petrocchi, M.3
Spognardi, A.4
Tesconi, M.5
-
15
-
-
85125523540
-
Botornot: A system to evaluate social bots
-
ACM
-
C. A. Davis, O. Varol, E. Ferrara, A. Flammini, and F. Menczer. BotOrNot: A system to evaluate social bots. In WWW companion. ACM, 2016.
-
(2016)
WWW Companion
-
-
Davis, C.A.1
Varol, O.2
Ferrara, E.3
Flammini, A.4
Menczer, F.5
-
16
-
-
84977071823
-
The rise of social bots
-
E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini. The rise of social bots. Commun. ACM, 59(7):96-104, 2016.
-
(2016)
Commun. ACM
, vol.59
, Issue.7
, pp. 96-104
-
-
Ferrara, E.1
Varol, O.2
Davis, C.3
Menczer, F.4
Flammini, A.5
-
17
-
-
84871971372
-
Towards online spam filtering in social networks
-
Internet Society
-
H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. N. Choudhary. Towards online spam filtering in social networks. In NDSS. Internet Society, 2012.
-
(2012)
NDSS
-
-
Gao, H.1
Chen, Y.2
Lee, K.3
Palsetia, D.4
Choudhary, A.N.5
-
18
-
-
85060313251
-
Understanding and combating link farming in the Twitter social network
-
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the Twitter social network. In WWW. ACM, 2012.
-
(2012)
WWW. ACM
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, K.P.8
-
19
-
-
84945531564
-
ND-Sync: Detecting synchronized fraud activities
-
Springer
-
M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali. ND-Sync: Detecting synchronized fraud activities. In PAKDD, pages 201-214. Springer, 2015.
-
(2015)
PAKDD
, pp. 201-214
-
-
Giatsoglou, M.1
Chatzakou, D.2
Shah, N.3
Beutel, A.4
Faloutsos, C.5
Vakali, A.6
-
20
-
-
84961265097
-
Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters
-
K. L. Gwet. Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters. Advanced Analytics, LLC, 2014.
-
(2014)
Advanced Analytics, LLC
-
-
Gwet, K.L.1
-
22
-
-
85006746510
-
Inferring lockstep behavior from connectivity pattern in large graphs
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Inferring lockstep behavior from connectivity pattern in large graphs. Knowledge and Information Systems, pages 1-30, 2015.
-
(2015)
Knowledge and Information Systems
, pp. 1-30
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
23
-
-
84978971731
-
Catching synchronized behaviors in large networks: A graph mining approach
-
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Catching synchronized behaviors in large networks: A graph mining approach. ACM Trans. Knowl. Discov. Data, 10(4):35:1-35:27, 2016.
-
(2016)
ACM Trans. Knowl. Discov. Data
, vol.10
, Issue.4
, pp. 351-3527
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
24
-
-
84961880408
-
Suspicious behavior detection: Current trends and future directions
-
M. Jiang, P. Cui, and C. Faloutsos. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems, 31(1):31-39, 2016.
-
(2016)
IEEE Intelligent Systems
, vol.31
, Issue.1
, pp. 31-39
-
-
Jiang, M.1
Cui, P.2
Faloutsos, C.3
-
25
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: social honeypots + machine learning. In SIGIR. ACM, 2010.
-
(2010)
SIGIR. ACM
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
26
-
-
85134438433
-
Seven months with the devils: A long-term study of content polluters on Twitter
-
K. Lee, B. D. Eoff, and J. Caverlee. Seven months with the devils: A long-term study of content polluters on Twitter. In ICWSM. AAAI, 2011.
-
(2011)
ICWSM. AAAI
-
-
Lee, K.1
Eoff, B.D.2
Caverlee, J.3
-
27
-
-
84877300575
-
WarningBird: A near real-time detection system for suspicious URLs in Twitter stream
-
S. Lee and J. Kim. WarningBird: A near real-time detection system for suspicious URLs in Twitter stream. IEEE Trans. Depend. Sec. Comput., 10(3):183-195, 2013.
-
(2013)
IEEE Trans. Depend. Sec. Comput.
, vol.10
, Issue.3
, pp. 183-195
-
-
Lee, S.1
Kim, J.2
-
28
-
-
84946240361
-
Early filtering of ephemeral malicious accounts on Twitter
-
S. Lee and J. Kim. Early filtering of ephemeral malicious accounts on Twitter. Computer Communications, 54:48-57, 2014.
-
(2014)
Computer Communications
, vol.54
, pp. 48-57
-
-
Lee, S.1
Kim, J.2
-
29
-
-
84911211926
-
Uncovering deception in social media
-
H. Liu, J. Han, and H. Motoda. Uncovering deception in social media. Social Network Analysis and Mining, 4(1):1-2, 2014.
-
(2014)
Social Network Analysis and Mining
, vol.4
, Issue.1
, pp. 1-2
-
-
Liu, H.1
Han, J.2
Motoda, H.3
-
30
-
-
84911100037
-
SDHM: A hybrid model for spammer detection in Weibo
-
Y. Liu, B. Wu, B. Wang, and G. Li. SDHM: A hybrid model for spammer detection in Weibo. In ASONAM. IEEE/ACM, 2014.
-
(2014)
ASONAM. IEEE/ACM
-
-
Liu, Y.1
Wu, B.2
Wang, B.3
Li, G.4
-
31
-
-
84891736632
-
Twitter spammer detection using data stream clustering
-
Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang. Twitter spammer detection using data stream clustering. Information Sciences, 260:64-73, 2014.
-
(2014)
Information Sciences
, vol.260
, pp. 64-73
-
-
Miller, Z.1
Dickinson, B.2
Deitrick, W.3
Hu, W.4
Wang, A.H.5
-
32
-
-
84906736685
-
Anti-reconnaissance tools: Detecting targeted socialbots
-
A. Paradise, R. Puzis, and A. Shabtai. Anti-reconnaissance tools: Detecting targeted socialbots. IEEE Internet Computing, 18(5):11-19, 2014.
-
(2014)
IEEE Internet Computing
, vol.18
, Issue.5
, pp. 11-19
-
-
Paradise, A.1
Puzis, R.2
Shabtai, A.3
-
34
-
-
85060280099
-
Poultry markets: On the underground economy of Twitter followers
-
G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: on the underground economy of Twitter followers. In WOSN. ACM, 2012.
-
(2012)
WOSN. ACM
-
-
Stringhini, G.1
Egele, M.2
Kruegel, C.3
Vigna, G.4
-
36
-
-
84910126763
-
Follow the green: Growth and dynamics in Twitter follower markets
-
G. Stringhini, G. Wang, M. Egele, C. Kruegel, G. Vigna, H. Zheng, and B. Y. Zhao. Follow the green: growth and dynamics in Twitter follower markets. In IMC. ACM, 2013.
-
(2013)
IMC. ACM
-
-
Stringhini, G.1
Wang, G.2
Egele, M.3
Kruegel, C.4
Vigna, G.5
Zheng, H.6
Zhao, B.Y.7
-
37
-
-
85060291732
-
Design and evaluation of a real-time URL spam filtering service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time URL spam filtering service. In S&P. IEEE, 2011.
-
(2011)
S&P. IEEE
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
38
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse
-
USENIX
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse. In Security Symposium. USENIX, 2013.
-
(2013)
Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
40
-
-
85050549673
-
Strength in numbers: Robust tamper detection in crowd computations
-
B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget, S. Guha, K. P. Gummadi, A. Kate, and A. Mislove. Strength in numbers: Robust tamper detection in crowd computations. In COSN. ACM, 2015.
-
(2015)
COSN. ACM
-
-
Viswanath, B.1
Bashir, M.A.2
Zafar, M.B.3
Bouget, S.4
Guha, S.5
Gummadi, K.P.6
Kate, A.7
Mislove, A.8
-
41
-
-
84874737209
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. Computer Communication Review, 41(4):363-374, 2011.
-
(2011)
Computer Communication Review
, vol.41
, Issue.4
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
42
-
-
85180412749
-
Social Turing tests: Crowdsourcing sybil detection
-
Internet Society
-
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, and B. Y. Zhao. Social Turing tests: Crowdsourcing sybil detection. In NDSS. Internet Society, 2013.
-
(2013)
NDSS.
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.5
Zheng, H.6
Zhao, B.Y.7
-
43
-
-
85060299442
-
Innocent by association: Early recognition of legitimate users
-
Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: early recognition of legitimate users. In CCS. ACM, 2012.
-
(2012)
CCS. ACM
-
-
Xie, Y.1
Yu, F.2
Ke, Q.3
Abadi, M.4
Gillum, E.5
Vitaldevaria, K.6
Walter, J.7
Huang, J.8
Mao, Z.M.9
-
44
-
-
84880557073
-
Empirical evaluation and new design for fighting evolving Twitter spammers
-
C. Yang, R. Harkreader, and G. Gu. Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans. Inform. Forens. Sec., 8(8):1280-1293, 2013.
-
(2013)
IEEE Trans. Inform. Forens. Sec.
, vol.8
, Issue.8
, pp. 1280-1293
-
-
Yang, C.1
Harkreader, R.2
Gu, G.3
-
45
-
-
84896964777
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data, 8(1):2, 2014.
-
(2014)
ACM Trans. Knowl. Discov. Data
, vol.8
, Issue.1
, pp. 2
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
46
-
-
77950275127
-
Detecting spam in a twitter network
-
S. Yardi, D. Romero, G. Schoenebeck, et al. Detecting spam in a twitter network. First Monday, 15(1), 2009.
-
(2009)
First Monday
, vol.15
, Issue.1
-
-
Yardi, S.1
Romero, D.2
Schoenebeck, G.3
-
47
-
-
84946022328
-
GLAD: Group anomaly detection in social media analysis
-
R. Yu, X. He, and Y. Liu. GLAD: Group anomaly detection in social media analysis. ACM Trans. Know. Discov. Data, 10(2):1-22, 2015.
-
(2015)
ACM Trans. Know. Discov. Data
, vol.10
, Issue.2
, pp. 1-22
-
-
Yu, R.1
He, X.2
Liu, Y.3
|