메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Social Turing Tests: Crowdsourcing Sybil Detection

Author keywords

[No Author keywords available]

Indexed keywords

CROWDSOURCING; DIGITAL STORAGE; FAKE DETECTION; MALWARE;

EID: 85180412749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (68)

References (33)
  • 1
    • 85180414392 scopus 로고    scopus 로고
    • Thousands of fake profiles on facebook identified
    • June
    • Thousands of fake profiles on facebook identified. Weekly-Blitz.net, June 2011.
    • (2011) Weekly-Blitz.net
  • 2
    • 84860570603 scopus 로고    scopus 로고
    • The socialbot network: When bots socialize for fame and money
    • Y. Boshmaf et al. The socialbot network: When bots socialize for fame and money. In Proc. of ACSAC, 2011.
    • (2011) Proc. of ACSAC
    • Boshmaf, Y.1
  • 3
    • 85015988583 scopus 로고    scopus 로고
    • Aiding the detection of fake accounts in large scale social online services
    • Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In Proc. of NSDI, 2012.
    • (2012) Proc. of NSDI
    • Cao, Q.1    Sirivianos, M.2    Yang, X.3    Pregueiro, T.4
  • 4
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. In Proc. of NDSS, 2009.
    • (2009) Proc. of NDSS
    • Danezis, G.1    Mittal, P.2
  • 7
    • 84996531066 scopus 로고    scopus 로고
    • Who moderates the moderators? crowdsourcing abuse detection in user-generated content
    • A. Ghosh, S. Kale, and P. McAfee. Who moderates the moderators? crowdsourcing abuse detection in user-generated content. In Proc. of EC, 2011.
    • (2011) Proc. of EC
    • Ghosh, A.1    Kale, S.2    McAfee, P.3
  • 8
    • 84891856020 scopus 로고    scopus 로고
    • Facebook tops 900 million users
    • D. Goldman. Facebook tops 900 million users. CNN Money, 2012.
    • (2012) CNN Money
    • Goldman, D.1
  • 9
    • 77956261095 scopus 로고    scopus 로고
    • Crowdsourcing graphical perception: using mechanical turk to assess visualization design
    • J. Heer and M. Bostock. Crowdsourcing graphical perception: using mechanical turk to assess visualization design. In Proc. of CHI, 2010.
    • (2010) Proc. of CHI
    • Heer, J.1    Bostock, M.2
  • 11
    • 79958122721 scopus 로고    scopus 로고
    • Analyzing the amazon mechanical turk marketplace
    • Dec
    • P. G. Ipeirotis. Analyzing the amazon mechanical turk marketplace. XRDS, 17:16-21, Dec. 2010.
    • (2010) XRDS , vol.17 , pp. 16-21
    • Ipeirotis, P. G.1
  • 14
    • 84866611009 scopus 로고    scopus 로고
    • Understanding latent interactions in online social networks
    • J. Jiang et al. Understanding latent interactions in online social networks. In Proc. of IMC, 2010.
    • (2010) Proc. of IMC
    • Jiang, J.1
  • 15
  • 16
    • 67650081604 scopus 로고    scopus 로고
    • Crowdsourcing user studies with mechanical turk
    • A. Kittur, H. Chi, and B. Suh. Crowdsourcing user studies with mechanical turk. In Proc. of CHI, 2008.
    • (2008) Proc. of CHI
    • Kittur, A.1    Chi, H.2    Suh, B.3
  • 19
    • 70449657723 scopus 로고    scopus 로고
    • Financial Incentives and the “Performance of Crowds
    • W. Mason and D. J. Watts. Financial Incentives and the “Performance of Crowds”. In Proc. of KDD-HCOMP, 2009.
    • (2009) Proc. of KDD-HCOMP
    • Mason, W.1    Watts, D. J.2
  • 20
    • 78650907130 scopus 로고    scopus 로고
    • Measuring the Mixing Time of Social Graphs
    • A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In Proc. of IMC, 2010.
    • (2010) Proc. of IMC
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 21
    • 84856151953 scopus 로고    scopus 로고
    • Dirty jobs: The role of freelance labor in web service abuse
    • M. Motoyama et al. Dirty jobs: The role of freelance labor in web service abuse. In Proc. of Usenix Security, 2011.
    • (2011) Proc. of Usenix Security
    • Motoyama, M.1
  • 22
    • 84923421915 scopus 로고    scopus 로고
    • Programmatic gold: Targeted and scalable quality assurance in crowdsourcing
    • D. Oleson et al. Programmatic gold: Targeted and scalable quality assurance in crowdsourcing. In Proc. of Human Computation, 2011.
    • (2011) Proc. of Human Computation
    • Oleson, D.1
  • 23
    • 83255191401 scopus 로고    scopus 로고
    • Finding deceptive opinion spam by any stretch of the imagination
    • M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. In Proc. of ACL, 2011.
    • (2011) Proc. of ACL
    • Ott, M.1    Choi, Y.2    Cardie, C.3    Hancock, J. T.4
  • 24
    • 79957953403 scopus 로고    scopus 로고
    • Who are the crowdworkers?: Shifting demographics in amazon mechanical turk
    • J. Ross et al. Who are the crowdworkers?: Shifting demographics in amazon mechanical turk. In Proc. of CHI, 2010.
    • (2010) Proc. of CHI
    • Ross, J.1
  • 25
    • 80053360508 scopus 로고    scopus 로고
    • Cheap and fast-but is it good?: evaluating non-expert annotations for natural language tasks
    • R. Snow, B. O'Connor, D. Jurafsky, and A. Y. Ng. Cheap and fast-but is it good?: evaluating non-expert annotations for natural language tasks. In Proc. of EMNLP, 2008.
    • (2008) Proc. of EMNLP
    • Snow, R.1    O'Connor, B.2    Jurafsky, D.3    Ng, A. Y.4
  • 26
    • 84898956294 scopus 로고    scopus 로고
    • Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks
    • Y.-A. Sun, S. Roy, and G. Little. Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks. In Proc. of Human Computation, 2011.
    • (2011) Proc. of Human Computation
    • Sun, Y.-A.1    Roy, S.2    Little, G.3
  • 27
    • 82955161550 scopus 로고    scopus 로고
    • Suspended accounts in retrospect: An analysis of twitter spam
    • K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended accounts in retrospect: An analysis of twitter spam. In Proc. of IMC, 2011.
    • (2011) Proc. of IMC
    • Thomas, K.1    Grier, C.2    Paxson, V.3    Song, D.4
  • 32
    • 45749116664 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proc. of IEEE S&P, 2008.
    • (2008) Proc. of IEEE S&P
    • Yu, H.1    Gibbons, P. B.2    Kaminsky, M.3    Xiao, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.