期刊文献+

Finding the Hidden Hands:A Case Study of Detecting Organized Posters and Promoters in SINA Weibo 被引量:1

Finding the Hidden Hands:A Case Study of Detecting Organized Posters and Promoters in SINA Weibo
下载PDF
导出
摘要 With the development of online social networks,a special group of online users named organized posters(or Internet water army,Internet paid posters in some literatures) have fl ooded the social network communities. They are organized in groups to post with specific purposes and sometimes even confuse or mislead normal users.In this paper,we study the individual and group characteristics of organized posters. A classifier is constructed based on the individual and group characteristics to detect them. Extensive experimental results on three real datasets demonstrate that our method based on individual and group characteristics using SVM model(IGCSVM) is effective in detecting organized posters and better than existing methods. We take a first look at finding the promoters based on the detected organized posters of our IGCSVM method. Our experiments show that it is effective in detecting promoters. With the development of online social networks,a special group of online users named organized posters(or Internet water army,Internet paid posters in some literatures) have fl ooded the social network communities. They are organized in groups to post with specific purposes and sometimes even confuse or mislead normal users.In this paper,we study the individual and group characteristics of organized posters. A classifier is constructed based on the individual and group characteristics to detect them. Extensive experimental results on three real datasets demonstrate that our method based on individual and group characteristics using SVM model(IGCSVM) is effective in detecting organized posters and better than existing methods. We take a first look at finding the promoters based on the detected organized posters of our IGCSVM method. Our experiments show that it is effective in detecting promoters.
出处 《China Communications》 SCIE CSCD 2015年第11期143-155,共13页 中国通信(英文版)
基金 supported by 973 Program of China(Grant No.2013CB329601, 2013CB329602,2013CB329604) NSFC of China(Grant No.60933005,91124002) 863 Program of China(Grant No.2012AA01A401, 2012AA01A402) National Key Technology RD Program of China(Grant No.2012BAH38B04, 2012BAH38B06)
关键词 organized posters internet water army online paid posters promoter MICROBLOGGING organized posters internet waterarmy online paid promoter micro-blogging
  • 相关文献

参考文献28

  • 1Cheng Chen, KuiWu, VenkateshSrinivasan, and Xudong Zhang. Battling the internet water army: Detection of hidden paid posters. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 116-120. ACM, 2013.
  • 2Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th annual computer security applications conference, pages 21-30. ACM, 2010.
  • 3Nitin Jindal and Bing Liu. Opinion spam and analysis. In Proceedings of the 2008 Internationa Conference on Web Search and Data Mining pages 219-230. ACM, 2008.
  • 4Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T Hancock. Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pages 309-319. Association for Computational Linguistics, 2011.
  • 5Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, pages 71-80. ACM, 2012.
  • 6Chris Grier, Kurt Thomas, Veto Pa~son, and Michael Zhang. @ spare: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security, aaaes 27- 37. ACM )(~1(~.
  • 7Yubao Zhang Xin Ruan Haining Wang Hui Wang. What scale of audience a campaign can reach in what price. In 2014 IEEE International Conference on Computer Communications (InfoCOM'14), 2014.
  • 8Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pages 35- 47. ACM. 2010.
  • 9Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. Design and evaluation of a real- time url spam filtering service. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 447-462. IEEE, 2011.
  • 10Zhaoyun DING, Yan JIA, Bin Zhou, and Yi HAN. Mining topical influencers based on the multi- relational network in micro-blogging sites. China Communications, 10(1):93-104, 2013.

同被引文献7

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部