[1]
Yang Chao, Harkreader R, Gu Guofei, et al. Empirical evaluation and new design for fighting evolving twitter spammers[J]. IEEE Transactions on Information Forensics and Security, 2013,8(8):1280-1293.
[2] Hu Xia, Tang Jiliang, Gao Huiji, et al. Social spammer detection with sentiment information[C]// IEEE International Conference on Data Mining. 2014:180-189.
[3] Hu Xia, Tang Jiliang, Liu Huan. Online social spammer detection[C]// Proceedings of the 28th AAAI Conference on Artificial Intelligence.2014:59-65.
[4] Ghosh S, Viswanath B, Kooti F, et al. Understanding and combating link farming in the twitter social network[C]// Proceedings of the 21st International Conference on World Wide Web. 2012:61-70.
[5] Ahmed F, Abulaish M. A generic statistical approach for spam detection in online social networks[J]. Computer Communications, 2013,36(1011):1120-1129.
[6] 胡俊. 在线社会网络上SPAM行为检测方法研究[D].武汉:华中科技大学, 2011.
[7] Yang Chao, Harkreader R, Zhang Jialong, et al. Analyzing spammers’ social networks for fun and profit: A case study of cyber criminal ecosystem on twitter[C]// Proceedings of the 21st International Conference on World Wide Web. 2012:71-80.
[8] Huang Junxian, Xie Yinglian, Yu Fang, et al. SocialWatch: Detection of online service abuse via largescale social graphs[C]// Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, 2013:143-148.
[9] Shen Hua, Liu Xinyue. Propagating antitrustrank with relationship strength for fighting link farming on twitter[C]// International Seminar on Computation, Communication and Control. 2015:9-12.
[10]马凤龙. Twitter话题影响力用户分析[D]. 大连:大连理工大学, 2013.
[11]Liu Xinyue, Shen Hua, Ma Fenglong, et al. Topical influential user analysis with relationship strength estimation in twitter[C]// IEEE International Conference on Data Mining Workshop. 2014:1012-1019.
[12]McPherson M, SmithLovin L, Cook J M. Birds of a feather: Homophily in social networks[J]. Annual Review of Sociology, 2001,27(1):415-444.
[13]Adali A, Sisenda F, MagdonIsmail M. Actions speak as loud as words: Predicting relationships from social behavior data[C]// Proceedings of the 21st International Conference on World Wide Web. 2012:689-698.
[14]Zhang Xianchao, Wang You, Mo Nan, et al. Propagating both trust and distrust with target differentiation for combating linkbased web spam[C]// Proceedings of the 25th AAAI Conference on Artificial Intelligence. 2011:1292-1297.
[15]Liu Xinyue, Wang You, Zhu Shaoping, et al. Combating Web spam through trustdistrust propagation with confidence[J]. Pattern Recognition Letters, 2013,34(13):1462-1469.
[16]王友. 基于信任和非信任传播的搜索引擎反作弊研究[D]. 大连:大连理工大学, 2011.
[17]Li Rui, Wang Shengjie, Deng Hongbo, et al. Towards social user profiling: Unified and discriminative influence model for inferring homelocations[C]// The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD’12). 2012:1023-1031.
|