{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:10:01Z","timestamp":1756995001749,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004699"},{"type":"electronic","value":"9783030004705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_11","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T10:43:19Z","timestamp":1536230599000},"page":"228-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels"],"prefix":"10.1007","author":[{"given":"Binghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Le","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"11_CR1","unstructured":"1 in 10 Twitter accounts is fake. http:\/\/goo.gl\/qTYbyy"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., Panconesi, A.: SoK: the evolution of sybil defense via social networks. In: IEEE S & P (2013)","DOI":"10.1109\/SP.2013.33"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A., Albert, R.: Emergence of scaling in random networks. Science 286, 509\u2013512 (1999)","journal-title":"Science"},{"key":"11_CR4","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: CEAS (2010)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. Stat. Mech.: Theory Exp. (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Boshmaf, Y., Logothetis, D., Siganos, G., Leria, J., Lorenzo, J.: Integro: leveraging victim prediction for robust fake account detection in OSNs. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23260"},{"key":"11_CR7","unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI (2012)"},{"key":"11_CR8","unstructured":"Danezis, G., Mittal, P.: SybilInfer: detecting Sybil nodes using social networks. In: NDSS (2009)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Fu, H., Xie, X., Rui, Y., Gong, N.Z., Sun, G., Chen, E.: Robust spammer detection in microblogs: leveraging user carefulness. ACM Trans. Intell. Syst. Technol. (TIST) (2017)","DOI":"10.1145\/3086637"},{"key":"11_CR10","unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards online spam filtering in social networks. In: NDSS (2012)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Gao, P., Wang, B., Gong, N.Z., Kulkarni, S., Thomas, K., Mittal, P.: SybilFuse: Combining local attributes with global structure to perform robust Sybil detection. In: IEEE CNS (2018)","DOI":"10.1109\/CNS.2018.8433147"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ghosh, S., et al.: Understanding and combating link farming in the Twitter social network. In: WWW (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: CHI (2009)","DOI":"10.1145\/1518701.1518736"},{"issue":"6","key":"11_CR14","first-page":"976","volume":"9","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., Frank, M., Mittal, P.: SybilBelief: a semi-supervised learning approach for structure-based Sybil detection. IEEE TIFS 9(6), 976\u2013987 (2014)","journal-title":"IEEE TIFS"},{"key":"11_CR15","unstructured":"Hacking Election, May 2016. http:\/\/goo.gl\/G8o9x0"},{"key":"11_CR16","unstructured":"Hacking Financial Market, May 2016. http:\/\/goo.gl\/4AkWyt"},{"issue":"301","key":"11_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58(301), 13\u201330 (1963)","journal-title":"J. Am. Stat. Assoc."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Jia, J., Wang, B., Gong, N.Z.: Random walk based fake account detection in online social networks. In: IEEE DSN, pp. 273\u2013284 (2017)","DOI":"10.1109\/DSN.2017.55"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Kontaxis, G., Polakis, I., Ioannidis, S., Markatos, E.P.: Detecting social network profile cloning. In: IEEE PERCOM Workshops (2011)","DOI":"10.1109\/PERCOMW.2011.5766886"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: WWW, pp. 591\u2013600. ACM (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Liu, C., Gao, P., Wright, M., Mittal, P.: Exploiting temporal dynamics in Sybil defenses. In: ACM CCS, pp. 805\u2013816 (2015)","DOI":"10.1145\/2810103.2813693"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in Twitter using sender-receiver relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 301\u2013317. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_16"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time URL spam filtering service. In: IEEE S & P (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"11_CR25","unstructured":"Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.: Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse. In: USENIX Security Symposium (2013)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based Sybil defenses. In: ACM SIGCOMM (2010)","DOI":"10.1145\/1851182.1851226"},{"key":"11_CR27","unstructured":"Wang, A.H.: Don\u2019t follow me - spam detection in Twitter. In: SECRYPT (2010)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Gong, N.Z., Fu, H.: GANG: detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In: IEEE ICDM (2017)","DOI":"10.1109\/ICDM.2017.56"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Wang, B., Jia, J., Zhang, L., Gong, N.Z.: Structure-based Sybil detection in social networks via local rule-based propagation. IEEE Transactions on Network Science and Engineering (2018)","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Wang, B., Zhang, L., Gong, N.Z.: SybilSCAR: Sybil detection in online social networks via local rule based propagation. In: IEEE INFOCOM (2017)","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"11_CR31","unstructured":"Wang, G., Konolige, T., Wilson, C., Wang, X.: You are how you click: clickstream analysis for Sybil detection. In: Usenix Security (2013)"},{"key":"11_CR32","unstructured":"Wang, G., et al.: Social turing tests: crowdsourcing Sybil detection. In: NDSS (2013)"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Wei, W., Xu, F., Tan, C., Li, Q.: SybilDefender: defend against Sybil attacks in large social networks. In: IEEE INFOCOM (2012)","DOI":"10.1109\/INFCOM.2012.6195572"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P., Zhao, B.Y.: User interactions in social networks and their implications. In: EuroSys (2009)","DOI":"10.1145\/1519065.1519089"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318\u2013337. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_17"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammer\u2019s social networks for fun and profit. In: WWW (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. In: IMC (2011)","DOI":"10.1145\/2068816.2068841"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. In: IEEE S & P (2008)","DOI":"10.1109\/SP.2008.13"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman., A.: SybilGuard: defending against Sybil attacks via social networks. In: ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159945"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T20:51:30Z","timestamp":1661979090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}