{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:36Z","timestamp":1750306836345,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,11,7]],"date-time":"2013-11-07T00:00:00Z","timestamp":1383782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2013,11,7]]},"abstract":"<jats:p>The proliferation of location-based social networks (LBSNs) has offered many conveniences to their participants, such as place recommendation, tracking of friends, monetary rewards from venues visited and a cheap way of advertisement for local businesses. However, users can misuse the offered features and the major threat for the service providers is that of fake check-ins. Users can easily manipulate the localization module of the underlying application and declare their presence in a counterfeit location. The incentives for these behaviors can be both earning monetary rewards as well as virtual rewards. Therefore, while fake check-ins driven from the former motive can cause monetary losses, those aiming in virtual rewards are also harmful. In particular, they can significantly degrade the services offered from the LBSN providers or third parties that make use of these data. In this paper, we propose and analyze a honeypot venue-based solution to tag users who are generating fake spatial information.<\/jats:p>","DOI":"10.1145\/2542095.2542111","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:09Z","timestamp":1384270149000},"page":"29-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ACM HotMobile 2013 poster"],"prefix":"10.1145","volume":"17","author":[{"given":"Ke","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Pittsburgh"}]},{"given":"Konstantinos","family":"Pelechrinis","sequence":"additional","affiliation":[{"name":"University of Pittsburgh"}]},{"given":"Prashant","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Pittsburgh"}]}],"member":"320","published-online":{"date-parts":[[2013,11,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Why people cheat at foursquare: http:\/\/ciaoenrico.com\/2010\/06\/17\/cheating-foursquare\/.  Why people cheat at foursquare: http:\/\/ciaoenrico.com\/2010\/06\/17\/cheating-foursquare\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D. Denning and P. Macdoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security (February):12--16 1996.  D. Denning and P. Macdoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security (February):12--16 1996.","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370426"},{"key":"e_1_2_1_5_1","unstructured":"Foursquare's point system: http:\/\/aboutfoursquare.com\/points-leaderboard\/.  Foursquare's point system: http:\/\/aboutfoursquare.com\/points-leaderboard\/."},{"key":"e_1_2_1_6_1","unstructured":"K. Pelechrinis P. Krishnamurthy and K. Zhang. Gaming the game: Honeypot venues against cheaters in location-based social networks. CoRR arXiv:1210.4517 2012.  K. Pelechrinis P. Krishnamurthy and K. Zhang. Gaming the game: Honeypot venues against cheaters in location-based social networks. CoRR arXiv:1210.4517 2012."}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2542095.2542111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2542095.2542111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:56Z","timestamp":1750234196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2542095.2542111"}},"subtitle":["detecting fake check-ins in location-based social networks through honeypot venues"],"short-title":[],"issued":{"date-parts":[[2013,11,7]]},"references-count":6,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,11,7]]}},"alternative-id":["10.1145\/2542095.2542111"],"URL":"https:\/\/doi.org\/10.1145\/2542095.2542111","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2013,11,7]]},"assertion":[{"value":"2013-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}