{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T17:16:04Z","timestamp":1712078164040},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11390-015-1602-6","type":"journal-article","created":{"date-parts":[[2015,11,25]],"date-time":"2015-11-25T07:49:50Z","timestamp":1448437790000},"page":"1344-1357","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Understanding Sybil Groups in the Wild"],"prefix":"10.1007","volume":"30","author":[{"given":"Jing","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Zi-Fei","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ya-Fei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,20]]},"reference":[{"issue":"9","key":"1602_CR1","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin L, Chen Y, Wang T, Hui P, Vasilakos A V. Understanding user behavior in online social networks: A survey. IEEE Communications Magazine, 2013, 51(9): 144\u2013150.","journal-title":"IEEE Communications Magazine"},{"key":"1602_CR2","unstructured":"Nazir A, Raza S, Chuah C N, Schipper B. Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications. In Proc. the 3rd Workshop on Online Social Networks, June 2010."},{"key":"1602_CR3","doi-asserted-by":"crossref","unstructured":"Bhat S Y, Abulaish M. Community-based features for identifying spammers in online social networks. In Proc. ASONAM, August 2013, pp.100-107.","DOI":"10.1145\/2492517.2492567"},{"key":"1602_CR4","doi-asserted-by":"crossref","unstructured":"Dai H, Zhu F, Lim E P, Pang H. Mining coherent anomaly collections on web data. In Proc. the 21st CIKM, October 29-November 2, 2012, pp.1557-1561.","DOI":"10.1145\/2396761.2398472"},{"key":"1602_CR5","doi-asserted-by":"crossref","unstructured":"Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao B Y. Detecting and characterizing social spam campaigns. In Proc. the 10th ACM SIGCOMM Internet Measurement Conference, November 2010, pp.35-47.","DOI":"10.1145\/1879141.1879147"},{"key":"1602_CR6","unstructured":"Hu X, Tang J, Zhang Y, Liu H. Social spammer detection in microblogging. In Proc. the 23rd IJCAI, August 2013, pp.2633-2639."},{"key":"1602_CR7","doi-asserted-by":"crossref","unstructured":"Irani D, SteveWebb, Pu C. Study of static classification of social spam profiles in MySpace. In Proc. the 4th ICWSM, May 2010, pp.82-89.","DOI":"10.1609\/icwsm.v4i1.14017"},{"key":"1602_CR8","doi-asserted-by":"crossref","unstructured":"Lumezanu C, Feamster N. Observing common spam in Tweets and email. In Proc. the 12th ACM SIGCOMM IMC, November 2012, pp.461-466.","DOI":"10.1145\/2398776.2398824"},{"key":"1602_CR9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller Z, Dickinson B, Deitrick W, Hua W, Wang A H. Twitter spammer detection using data stream clustering. Information Sciences, 2014, 260: 64\u201373.","journal-title":"Information Sciences"},{"key":"1602_CR10","doi-asserted-by":"crossref","unstructured":"Stringhini G, Kruegel C, Vigna G. Detecting spammers on social networks. In Proc. the 26th Annual Computer Security Applications Conference, December 2010, pp.1-9.","DOI":"10.1145\/1920261.1920263"},{"key":"1602_CR11","doi-asserted-by":"crossref","unstructured":"Thomas K, Grier C, Paxson V, Song D. Suspended accounts in retrospect: An analysis of Twitter spam. In Proc. the 11th ACM SIGCOMM Internet Measurement Conference, November 2011, pp.243-258.","DOI":"10.1145\/2068816.2068840"},{"key":"1602_CR12","doi-asserted-by":"crossref","unstructured":"Wang G, Wilson C, Zhao X, Zhu Y, Mohanlal M, Zheng H, Zhao B Y. Serf and turf: Crowdturfing for fun and profits. In Proc. the 21st WWW, April 2012, pp.679-688.","DOI":"10.1145\/2187836.2187928"},{"key":"1602_CR13","unstructured":"Danezis G, Mittal P. SybilInfer: Detecting sybil nodes using social networks. In Proc. NDSS, February 2009."},{"key":"1602_CR14","unstructured":"Tran N, Min B, Li J, Subramanian L. Sybil-resilient online content voting. In Proc. the 6th NSDI, April 2009, pp.15-28."},{"issue":"12","key":"1602_CR15","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1109\/TPDS.2013.9","volume":"24","author":"W Wei","year":"2013","unstructured":"Wei W, Xu F, Tan C C, Li Q. SybilDefender: A defense mechanism for sybil attacks in large social networks. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(12): 2492\u20132502.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1602_CR16","doi-asserted-by":"crossref","unstructured":"Yu H, Gibbons P B, Kaminsky M, Xiao F. SybilLimit: A near-optimal social network defense against sybil attacks. In Proc. IEEE Symposium on Security and Privacy, May 2008, pp.3-17.","DOI":"10.1109\/SP.2008.13"},{"issue":"3","key":"1602_CR17","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H Yu","year":"2008","unstructured":"Yu H, Kaminsky M, Gibbons P B, Flaxman A D. Sybil-Guard: Defending against sybil attacks via social networks. IEEE\/ACM Transactions on Networking, 2008, 16(3): 576\u2013589.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1602_CR18","doi-asserted-by":"crossref","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S. Who is tweeting on Twitter: Human, bot, or cyborg? In Proc. the 26th Annual Computer Security Applications Conference, December 2010, pp.21-30.","DOI":"10.1145\/1920261.1920265"},{"key":"1602_CR19","doi-asserted-by":"crossref","unstructured":"Lee K, Caverlee J, Webb S. Uncovering social spammers: Social honeypots + machine learning. In Proc. the 33rd SIGIR, July 2010, pp.435-442.","DOI":"10.1145\/1835449.1835522"},{"key":"1602_CR20","unstructured":"Webb S, Caverlee J, Pu C. Social honeypots: Making friends with a spammer near you. In Proc. the 5th CEAS, August 2008."},{"key":"1602_CR21","doi-asserted-by":"crossref","unstructured":"Benevenuto F, Rodrigues T, Almeida V, Almeida J, Gonglves M. Detecting spammers and content promoters in online video social networks. In Proc. the 32nd SIGIR, July 2009, pp.620-627.","DOI":"10.1109\/INFCOMW.2009.5072127"},{"key":"1602_CR22","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V. Detecting spammers on Twitter. In Proc. CEAS, July 2010."},{"issue":"3","key":"1602_CR23","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/s11390-012-1239-7","volume":"27","author":"JY Liu","year":"2012","unstructured":"Liu J Y, Zhao Y H, Zhang Z X, Wang Y H, Yuan X M, Hu L, Dong Z J. Spam short messages detection via mining social networks. Journal of Computer Science and Technology, 2012, 27(3): 506\u2013514.","journal-title":"Journal of Computer Science and Technology"},{"key":"1602_CR24","doi-asserted-by":"crossref","unstructured":"Yang Z, Wilson C, Wang X, Gao T, Zhao B Y, Dai Y. Uncovering social network sybils in the wild. In Proc. the 11th ACM SIGCOMM Internet Measurement Conference, November 2011, pp.259-268.","DOI":"10.1145\/2068816.2068841"},{"key":"1602_CR25","doi-asserted-by":"crossref","unstructured":"Yardi S, Romero D, Schoenebeck G, Boyd D. Detecting spam in a Twitter network. First Monday, 2010, 15(1).","DOI":"10.5210\/fm.v15i1.2793"},{"key":"1602_CR26","doi-asserted-by":"crossref","unstructured":"Jiang J, Shan Z, Sha W, Wang X, Dai Y. Detecting and validating sybil groups in the wild. In Proc. the 32nd ICDCS Workshops, June 2012, pp.127-132.","DOI":"10.1109\/ICDCSW.2012.9"},{"key":"1602_CR27","doi-asserted-by":"crossref","unstructured":"Jiang J, Wilson C, Wang X, Huang P, Sha W, Dai Y, Zhao B Y. Understanding latent interactions in online social networks. In Proc. the 10th ACM Internet Measurement Conference, November 2010, pp.369-382.","DOI":"10.1145\/1879141.1879190"},{"issue":"1","key":"1602_CR28","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1214\/aoms\/1177730491","volume":"18","author":"HB Mann","year":"1947","unstructured":"Mann H B, Whitney D R. On a test of whether one of two random variables is stochastically larger than the other. The Annals of Mathematical Statistics, 1947, 18(1): 50\u201360.","journal-title":"The Annals of Mathematical Statistics"},{"issue":"7136","key":"1602_CR29","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1038\/nature05670","volume":"446","author":"G Palla","year":"2007","unstructured":"Palla G, Barab\u00b4asi A L, Vicsek T. Quantifying social group evolution. Nature, 2007, 446(7136): 664\u2013667.","journal-title":"Nature"},{"key":"1602_CR30","doi-asserted-by":"crossref","unstructured":"Viswanath B, Post A, Gummadi K P, Mislove A. An analysis of social network-based sybil defenses. In Proc. SIGCOMM, August 30-September 3, 2010, pp.363-374.","DOI":"10.1145\/1851182.1851226"},{"key":"1602_CR31","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Tomkins A. Structure and evolution of online social networks. In Proc. the 12th KDD, August 2006, pp.611-617.","DOI":"10.1145\/1150402.1150476"},{"issue":"9","key":"1602_CR32","doi-asserted-by":"crossref","first-page":"2376","DOI":"10.3724\/SP.J.1001.2008.02376","volume":"19","author":"Z Li","year":"2008","unstructured":"Li Z, Chen G, Qiu T. Partition nodes: Topologically-critical nodes of unstructured peer-to-peer networks. Journal of Software, 2008, 19(9): 2376\u20132388. (in Chinese)","journal-title":"Journal of Software"},{"issue":"3","key":"1602_CR33","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s11390-012-1235-y","volume":"27","author":"MG Gong","year":"2012","unstructured":"Gong M G, Zhang L J, Ma J J, Jiao L C. Community detection in dynamic social networks based on multiobjective immune algorithm. Journal of Computer Science and Technology, 2012, 27(3): 455\u2013467.","journal-title":"Journal of Computer Science and Technology"},{"issue":"10","key":"1602_CR34","doi-asserted-by":"crossref","first-page":"10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel V D, Guillaume J L, Lambiotte R, Lefebvre E. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008, 2008(10): P10008.","journal-title":"Journal of Statistical Mechanics: Theory and Experiment"},{"key":"1602_CR35","doi-asserted-by":"crossref","unstructured":"Bastian M, Heymann S, Jacomy M. Gephi: An open source software for exploring and manipulating networks. In Proc. the 3rd International AAAI Conference on Weblogs and Social Media, May 2009, pp.361-362.","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"1602_CR36","doi-asserted-by":"crossref","unstructured":"Xue J, Yang Z, Yang X,Wang X, Chen L, Dai Y. VoteTrust: Leveraging friend invitation graph to defend against social network sybils. In Proc. INFOCOM, April 2013, pp.2400-2408.","DOI":"10.1109\/INFCOM.2013.6567045"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1602-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-015-1602-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-015-1602-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T23:38:23Z","timestamp":1692142703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-015-1602-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1602"],"URL":"https:\/\/doi.org\/10.1007\/s11390-015-1602-6","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11]]}}}