{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:53:46Z","timestamp":1776394426851,"version":"3.51.2"},"publisher-location":"New York, New York, USA","reference-count":48,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU","award":["654024"],"award-info":[{"award-number":["654024"]}]},{"name":"EU","award":["675320"],"award-info":[{"award-number":["675320"]}]},{"name":"Regione Toscana","award":["SmartNews: Social sensing for Breaking News"],"award-info":[{"award-number":["SmartNews: Social sensing for Breaking News"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3055135","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"963-972","source":"Crossref","is-referenced-by-count":316,"title":["The Paradigm-Shift of Social Spambots"],"prefix":"10.1145","author":[{"given":"Stefano","family":"Cresci","sequence":"first","affiliation":[{"name":"National Research Council & University of Pisa, Pisa, Italy"}]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs & University of Padua, Paris, France"}]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[{"name":"National Research Council, Pisa, Italy"}]},{"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[{"name":"DTU Compute, Copenaghen, Denmark"}]},{"given":"Maurizio","family":"Tesconi","sequence":"additional","affiliation":[{"name":"National Research Council, Pisa, Italy"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3055135-1","unstructured":"M. R. Ackermann, M. M&#228;rtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler. StreamKM : A clustering algorithm for data streams. Experimental Algorithmics, 17:2--4, 2012."},{"key":"key-10.1145\/3041021.3055135-2","doi-asserted-by":"crossref","unstructured":"F. Ahmed and M. Abulaish. A generic statistical approach for spam detection in online social networks. Computer Communications, 36(10):1120--1129, 2013.","DOI":"10.1016\/j.comcom.2013.04.004"},{"key":"key-10.1145\/3041021.3055135-3","doi-asserted-by":"crossref","unstructured":"M. Avvenuti, S. Bellomo, S. Cresci, M. N. La Polla, and M. Tesconi. Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing. In WWW companion. ACM, 2017.","DOI":"10.1145\/3041021.3051155"},{"key":"key-10.1145\/3041021.3055135-4","unstructured":"F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In CEAS, 2010."},{"key":"key-10.1145\/3041021.3055135-5","doi-asserted-by":"crossref","unstructured":"F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gon&#231;alves. Detecting spammers and content promoters in online video social networks. In SIGIR. ACM, 2009.","DOI":"10.1109\/INFCOMW.2009.5072127"},{"key":"key-10.1145\/3041021.3055135-6","doi-asserted-by":"crossref","unstructured":"A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In WWW. ACM, 2013.","DOI":"10.1145\/2488388.2488400"},{"key":"key-10.1145\/3041021.3055135-7","unstructured":"Bot or not? http:\/\/truthy.indiana.edu\/botornot\/, 2014. Accessed: 2016-10-24."},{"key":"key-10.1145\/3041021.3055135-8","doi-asserted-by":"crossref","unstructured":"F. Cao, M. Ester, W. Qian, and A. Zhou. Density-Based Clustering over an Evolving Data Stream with Noise. In SDM. SIAM, 2006.","DOI":"10.1137\/1.9781611972764.29"},{"key":"key-10.1145\/3041021.3055135-9","unstructured":"Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In NSDI. USENIX, 2012."},{"key":"key-10.1145\/3041021.3055135-10","doi-asserted-by":"crossref","unstructured":"Q. Cao, X. Yang, J. Yu, and C. Palow. Uncovering large groups of active malicious accounts in online social networks. In CCS. ACM, 2014.","DOI":"10.1145\/2660267.2660269"},{"key":"key-10.1145\/3041021.3055135-11","doi-asserted-by":"crossref","unstructured":"A. Clauset, M. E. Newman, and C. Moore. Finding community structure in very large networks. Physical review E, 70(6):066111, 2004.","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"key-10.1145\/3041021.3055135-12","doi-asserted-by":"crossref","unstructured":"S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. A Criticism to Society (as seen by Twitter analytics). In DASec. IEEE, 2014.","DOI":"10.1109\/ICDCSW.2014.31"},{"key":"key-10.1145\/3041021.3055135-13","doi-asserted-by":"crossref","unstructured":"S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems, 80:56--71, 2015.","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"key-10.1145\/3041021.3055135-14","doi-asserted-by":"crossref","unstructured":"S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intelligent Systems, 5(31):58--64, 2016.","DOI":"10.1109\/MIS.2016.29"},{"key":"key-10.1145\/3041021.3055135-15","doi-asserted-by":"crossref","unstructured":"C. A. Davis, O. Varol, E. Ferrara, A. Flammini, and F. Menczer. BotOrNot: A system to evaluate social bots. In WWW companion. ACM, 2016.","DOI":"10.1145\/2872518.2889302"},{"key":"key-10.1145\/3041021.3055135-16","doi-asserted-by":"crossref","unstructured":"E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini. The rise of social bots. Commun. ACM, 59(7):96--104, 2016.","DOI":"10.1145\/2818717"},{"key":"key-10.1145\/3041021.3055135-17","unstructured":"H. Gao, Y. Chen, K. Lee, D. Palsetia, and A. N. Choudhary. Towards online spam filtering in social networks. In NDSS. Internet Society, 2012."},{"key":"key-10.1145\/3041021.3055135-18","doi-asserted-by":"crossref","unstructured":"S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the Twitter social network. In WWW. ACM, 2012.","DOI":"10.1145\/2187836.2187846"},{"key":"key-10.1145\/3041021.3055135-19","doi-asserted-by":"crossref","unstructured":"M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali. ND-Sync: Detecting synchronized fraud activities. In PAKDD, pages 201--214. Springer, 2015.","DOI":"10.1007\/978-3-319-18032-8_16"},{"key":"key-10.1145\/3041021.3055135-20","unstructured":"K. L. Gwet. Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters. Advanced Analytics, LLC, 2014."},{"key":"key-10.1145\/3041021.3055135-21","doi-asserted-by":"crossref","unstructured":"X. Hu, J. Tang, and H. Liu. Online social spammer detection. In Artificial Intelligence. AAAI, 2014.","DOI":"10.1609\/aaai.v28i1.8728"},{"key":"key-10.1145\/3041021.3055135-22","doi-asserted-by":"crossref","unstructured":"M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Inferring lockstep behavior from connectivity pattern in large graphs. Knowledge and Information Systems, pages 1--30, 2015.","DOI":"10.1007\/s10115-015-0883-y"},{"key":"key-10.1145\/3041021.3055135-23","unstructured":"M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Catching synchronized behaviors in large networks: A graph mining approach. ACM Trans. Knowl. Discov. Data, 10(4):35:1--35:27, 2016."},{"key":"key-10.1145\/3041021.3055135-24","doi-asserted-by":"crossref","unstructured":"M. Jiang, P. Cui, and C. Faloutsos. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems, 31(1):31--39, 2016.","DOI":"10.1109\/MIS.2016.5"},{"key":"key-10.1145\/3041021.3055135-25","doi-asserted-by":"crossref","unstructured":"K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: social honeypots machine learning. In SIGIR. ACM, 2010.","DOI":"10.1145\/1835449.1835522"},{"key":"key-10.1145\/3041021.3055135-26","unstructured":"K. Lee, B. D. Eoff, and J. Caverlee. Seven months with the devils: A long-term study of content polluters on Twitter. In ICWSM. AAAI, 2011."},{"key":"key-10.1145\/3041021.3055135-27","doi-asserted-by":"crossref","unstructured":"S. Lee and J. Kim. WarningBird: A near real-time detection system for suspicious URLs in Twitter stream. IEEE Trans. Depend. Sec. Comput., 10(3):183--195, 2013.","DOI":"10.1109\/TDSC.2013.3"},{"key":"key-10.1145\/3041021.3055135-28","doi-asserted-by":"crossref","unstructured":"S. Lee and J. Kim. Early filtering of ephemeral malicious accounts on Twitter. Computer Communications, 54:48--57, 2014.","DOI":"10.1016\/j.comcom.2014.08.006"},{"key":"key-10.1145\/3041021.3055135-29","doi-asserted-by":"crossref","unstructured":"H. Liu, J. Han, and H. Motoda. Uncovering deception in social media. Social Network Analysis and Mining, 4(1):1--2, 2014.","DOI":"10.1007\/s13278-014-0162-z"},{"key":"key-10.1145\/3041021.3055135-30","doi-asserted-by":"crossref","unstructured":"Y. Liu, B. Wu, B. Wang, and G. Li. SDHM: A hybrid model for spammer detection in Weibo. In ASONAM. IEEE\/ACM, 2014.","DOI":"10.1109\/ASONAM.2014.6921699"},{"key":"key-10.1145\/3041021.3055135-31","doi-asserted-by":"crossref","unstructured":"Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang. Twitter spammer detection using data stream clustering. Information Sciences, 260:64--73, 2014.","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"key-10.1145\/3041021.3055135-32","doi-asserted-by":"crossref","unstructured":"A. Paradise, R. Puzis, and A. Shabtai. Anti- reconnaissance tools: Detecting targeted socialbots. IEEE Internet Computing, 18(5):11--19, 2014.","DOI":"10.1109\/MIC.2014.81"},{"key":"key-10.1145\/3041021.3055135-33","doi-asserted-by":"crossref","unstructured":"T. Stein, E. Chen, and K. Mangla. Facebook immune system. In SNS. ACM, 2011.","DOI":"10.1145\/1989656.1989664"},{"key":"key-10.1145\/3041021.3055135-34","doi-asserted-by":"crossref","unstructured":"G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: on the underground economy of Twitter followers. In WOSN. ACM, 2012.","DOI":"10.1145\/2342549.2342551"},{"key":"key-10.1145\/3041021.3055135-35","doi-asserted-by":"crossref","unstructured":"G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC. ACM, 2010.","DOI":"10.1145\/1920261.1920263"},{"key":"key-10.1145\/3041021.3055135-36","doi-asserted-by":"crossref","unstructured":"G. Stringhini, G. Wang, M. Egele, C. Kruegel, G. Vigna, H. Zheng, and B. Y. Zhao. Follow the green: growth and dynamics in Twitter follower markets. In IMC. ACM, 2013.","DOI":"10.1145\/2504730.2504731"},{"key":"key-10.1145\/3041021.3055135-37","doi-asserted-by":"crossref","unstructured":"K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time URL spam filtering service. In S&#38;P. IEEE, 2011.","DOI":"10.1109\/SP.2011.25"},{"key":"key-10.1145\/3041021.3055135-38","unstructured":"K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse. In Security Symposium. USENIX, 2013."},{"key":"key-10.1145\/3041021.3055135-39","doi-asserted-by":"crossref","unstructured":"S. M. Van Dongen. Graph clustering via a discrete uncoupling process. SIAM Journal on Matrix Analysis and Applications, 30(1):121--141, 2008.","DOI":"10.1137\/040608635"},{"key":"key-10.1145\/3041021.3055135-40","doi-asserted-by":"crossref","unstructured":"B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget, S. Guha, K. P. Gummadi, A. Kate, and A. Mislove. Strength in numbers: Robust tamper detection in crowd computations. In COSN. ACM, 2015.","DOI":"10.1145\/2817946.2817964"},{"key":"key-10.1145\/3041021.3055135-41","doi-asserted-by":"crossref","unstructured":"B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. Computer Communication Review, 41(4):363--374, 2011.","DOI":"10.1145\/1851275.1851226"},{"key":"key-10.1145\/3041021.3055135-42","unstructured":"G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, and B. Y. Zhao. Social Turing tests: Crowdsourcing sybil detection. In NDSS. Internet Society, 2013."},{"key":"key-10.1145\/3041021.3055135-43","doi-asserted-by":"crossref","unstructured":"Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: early recognition of legitimate users. In CCS. ACM, 2012.","DOI":"10.1145\/2382196.2382235"},{"key":"key-10.1145\/3041021.3055135-44","doi-asserted-by":"crossref","unstructured":"C. Yang, R. Harkreader, and G. Gu. Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans. Inform. Forens. Sec., 8(8):1280--1293, 2013.","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"key-10.1145\/3041021.3055135-45","doi-asserted-by":"crossref","unstructured":"Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. ACM Trans. Knowl. Discov. Data, 8(1):2, 2014.","DOI":"10.1145\/2556609"},{"key":"key-10.1145\/3041021.3055135-46","doi-asserted-by":"crossref","unstructured":"S. Yardi, D. Romero, G. Schoenebeck, et al. Detecting spam in a twitter network. First Monday, 15(1), 2009.","DOI":"10.5210\/fm.v15i1.2793"},{"key":"key-10.1145\/3041021.3055135-47","doi-asserted-by":"crossref","unstructured":"R. Yu, X. He, and Y. Liu. GLAD: Group anomaly detection in social media analysis. ACM Trans. Know. Discov. Data, 10(2):1--22, 2015.","DOI":"10.1145\/2811268"},{"key":"key-10.1145\/3041021.3055135-48","unstructured":"J. Zhang, R. Zhang, Y. Zhang, and G. Yan. The rise of social botnets: Attacks and countermeasures. arXiv preprint arXiv:1603.02714, 2016."}],"event":{"name":"the 26th International Conference","location":"Perth, Australia","acronym":"WWW '17 Companion","number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2017,4,3]]},"end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3055135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3055135&ftid=1865316&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:31Z","timestamp":1750215811000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3055135"}},"subtitle":["Evidence, Theories, and Tools for the Arms Race"],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1145\/3041021.3055135","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}