Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3363198
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Fake Accounts in Online Social Networks at the Time of Registrations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(40 citation statements)
references
References 31 publications
1
38
0
Order By: Relevance
“…We first briefly present registration attributes collected by WeChat. Second, we perform a measurement study that reveals outlier registration patterns for fake accounts and observe similar results to the previous work performed on WeChat datasets [35]. For completeness, we include the detailed measurement results in Appendix.…”
Section: Feature Extractionsupporting
confidence: 68%
See 3 more Smart Citations
“…We first briefly present registration attributes collected by WeChat. Second, we perform a measurement study that reveals outlier registration patterns for fake accounts and observe similar results to the previous work performed on WeChat datasets [35]. For completeness, we include the detailed measurement results in Appendix.…”
Section: Feature Extractionsupporting
confidence: 68%
“…UFA vs. supervised methods. Ianus [35] is the state-of-the-art supervised method using registration accounts. Ianus uses a labeled training set to train a logistic regression classifier and then applies the trained classifier to the testing set to predict and initialize nodes' weights.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, online social networks (OSNs) have been seriously impacted by social bots [14]. A social botnet is a group of social bots created and controlled by a botmaster (acting as a leader among social bots) and performs malicious activities, such as creating multiple fake accounts, spreading spam, manipulating online ratings, and so on [13], [17], [28]. To protect against botnet attacks, existing social botnet detection approaches [9], [1], [29] have mostly focused on the tweet content and social interactions among the participants in the Twitter network.…”
Section: Introductionmentioning
confidence: 99%