{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:53:44Z","timestamp":1760597624694,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/ifipnetworking.2014.6857080","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T16:16:06Z","timestamp":1406650566000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["A cascading framework for uncovering spammers in social networks"],"prefix":"10.1109","author":[{"given":"Zejia","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jessie Hui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Understanding and Combating Link Farming in the Twitter Social Network","year":"0","author":"ghosh","key":"19"},{"key":"22","first-page":"321","article-title":"Multivariable functional interpolation and adaptive networks","volume":"2","author":"broomhead","year":"1988","journal-title":"Complex Systems"},{"key":"17","article-title":"Probabilistic inference trees for classification and ranking","author":"su","year":"2006","journal-title":"Conference of the Canadian Society for Computational Studies of Intelligence"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102480"},{"key":"18","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1016\/j.patrec.2005.10.013","article-title":"Learning probabilistic decision trees for AUC","volume":"29","author":"zhang","year":"2006","journal-title":"Pattern Recognition Letters"},{"key":"24","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"ho","year":"1998","journal-title":"Transactions on Pattern Analysis and Machine Intelligence"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-4258-6"},{"key":"16","article-title":"Weightily averaged one-dependence estimators","author":"jiang","year":"2006","journal-title":"PRICAI"},{"journal-title":"Detecting Spammers on Twitter","year":"0","author":"benevenuto","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501035"},{"journal-title":"Don't Follow Me Spam Detection on Twitter","year":"0","author":"wang","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994110"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963214"},{"key":"20","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-59119-2_166","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","author":"freund","year":"1995","journal-title":"Proc of the 2nd European Conference on Computational Learning Theory"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"10","article-title":"Sybil-resilient online content voting","author":"tran","year":"2009","journal-title":"NSDI"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923723"},{"year":"2013","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"journal-title":"Analyzing Spammers' Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter","year":"0","author":"yang","key":"4"},{"journal-title":"SybilInfer Detecting Sybil Nodes Using Social Networks","year":"2009","author":"danezis","key":"9"},{"key":"8","article-title":"SybilLimit: A near-optimal social network defense against Sybil attacks","author":"yu","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2014 IFIP Networking Conference","start":{"date-parts":[[2014,6,2]]},"location":"Trondheim, Norway","end":{"date-parts":[[2014,6,4]]}},"container-title":["2014 IFIP Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6850208\/6857077\/06857080.pdf?arnumber=6857080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:31:44Z","timestamp":1498138304000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6857080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2014.6857080","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}