2022
DOI: 10.1109/tnsm.2022.3186513
|View full text |Cite
|
Sign up to set email alerts
|

MUSH: Multi-Stimuli Hawkes Process Based Sybil Attacker Detector for User-Review Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…Hawkes processes, as a type of self-exciting point process, have found increasingly widespread applications in the field of network attack modeling, particularly in financial security and social network security [23][24][25][26]. Dutta et al [23] developed a novel classifier named HawkesEye, which utilizes time windows for prediction.…”
Section: Hawkes Process For Modeling Network Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Hawkes processes, as a type of self-exciting point process, have found increasingly widespread applications in the field of network attack modeling, particularly in financial security and social network security [23][24][25][26]. Dutta et al [23] developed a novel classifier named HawkesEye, which utilizes time windows for prediction.…”
Section: Hawkes Process For Modeling Network Attackmentioning
confidence: 99%
“…This classifier combines Hawkes processes with specific topic models for analyses based on time and textual information. Qu et al [24] proposed a social network witch attack detection model based on multi-stimulus Hawkes processes. This model simulates other users' endorsement behaviors toward a particular user through external stimuli and reflects the user's own reposting and commenting behaviors through internal stimuli, effectively identifying witch attacks in social networks.…”
Section: Hawkes Process For Modeling Network Attackmentioning
confidence: 99%