4.5 Article

Analysis of and defense against crowd-retweeting based spam in social networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Investigating the deceptive information in Twitter spam

Chao Chen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Proceedings Paper Computer Science, Theory & Methods

Uncovering Crowdsourced Manipulation of Online Reviews

Amir Fayazi et al.

SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (2015)

Article Computer Science, Information Systems

An Analysis of Social Network-Based Sybil Defenses

Bimal Viswanath et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2010)

Article Computer Science, Hardware & Architecture

SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks

Haifeng Yu et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2010)

Article Computer Science, Information Systems

Link Analysis for Web Spam Detection

Luca Becchetti et al.

ACM TRANSACTIONS ON THE WEB (2008)