Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 2017
DOI: 10.1145/3110025.3110068
|View full text |Cite
|
Sign up to set email alerts
|

Revealing and Detecting Malicious Retweeter Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 15 publications
1
20
0
Order By: Relevance
“…Creating unique content or running every single account separately to hide the similarity among the group would greatly increase the costs and time to administer these accounts; therefore, researchers have suggested several systems and strategies expose various types of malicious accounts at the campaign level. For instance, a study [14] proposed examining the social graph between users and pages to reveal Fake-Likes campaigns on Facebook, and several studies have used the synchronized behavior and timing of social spammers' fraud activities, fake Twitter followers, and malicious retweeter groups to expose their accounts on Twitter [15], [16], [17], [18], [19]. Besides, a variety of analysis studies have been carried out to understand the various aspects of social spammers.…”
Section: A Malicious Campaign Studiesmentioning
confidence: 99%
“…Creating unique content or running every single account separately to hide the similarity among the group would greatly increase the costs and time to administer these accounts; therefore, researchers have suggested several systems and strategies expose various types of malicious accounts at the campaign level. For instance, a study [14] proposed examining the social graph between users and pages to reveal Fake-Likes campaigns on Facebook, and several studies have used the synchronized behavior and timing of social spammers' fraud activities, fake Twitter followers, and malicious retweeter groups to expose their accounts on Twitter [15], [16], [17], [18], [19]. Besides, a variety of analysis studies have been carried out to understand the various aspects of social spammers.…”
Section: A Malicious Campaign Studiesmentioning
confidence: 99%
“…To complement the existing approaches, [5] recently proposed an algorithm called Attractor, which is based on dynamic distance between linked nodes. This algorithm has been investigated and extended in [6], [16]. Despite Attractor's high precision, it was less efficient, requiring many iterations to converge [6].…”
Section: Related Workmentioning
confidence: 99%
“…Each reduce instance receives a list of star graph (u, Γ(u)) routed by the sorted key (i, j, k) of subgraph G ijk , which can be viewed as an adjacent list representation of subgraph G ijk . From lines [8][9][10][11][12][13] in Algorithm 3, we find set S M of main edges (u, v, d(u, v)) ∈ E ijk , which are used for computing DI, CI and EI in Lines [14][15][16][17][18][19][20][21][22][23][24][25][26]. After computing DI, CI and EI of every non-converged main edge in G ijk , each reduce instance will emit key-value pairs where key is a main edge (u, v) and value is the aggregated DI, CI and EI of edge (u, v).…”
Section: Algorithm 3 Mr2: Decgp -Computing 3 Types Interactionsmentioning
confidence: 99%
See 1 more Smart Citation
“…(P2) How can we stimulate them to disseminate fact-checked news/information? To deal with the first problem (P1), we may deploy bots [26,48] to disseminate information but it may violate terms of services of online platforms due to abusing behavior. Another approach is to hire crowd workers [28] and cyber troops to shape public opinion [5].…”
Section: Introductionmentioning
confidence: 99%