Author:
Chen Ailin,Yang Pin,Cheng Pengsen
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference29 articles.
1. Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41–67
2. Can U, Alatas B (2019) A new direction in social network analysis: online social network analysis problems and applications. Physica A 535:122372
3. Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp 35–47
4. Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96–104
5. Xiaotao C, Caixia L, Shuxin L (2015) Graph-based features for identifying spammers in microblog networks. Acta Autom Sin 41(9):1533–1541
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献