{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:03:48Z","timestamp":1775743428646,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408632, DGE-1623246"],"award-info":[{"award-number":["CNS-1408632, DGE-1623246"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0084"],"award-info":[{"award-number":["FA8750-15-2-0084"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2011"],"award-info":[{"award-number":["N00014-17-1-2011"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["691025"],"award-info":[{"award-number":["691025"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["N008448"],"award-info":[{"award-number":["N008448"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134055","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1159-1174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["POISED"],"prefix":"10.1145","author":[{"given":"Shirin","family":"Nilizadeh","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Francois","family":"Labr\u00e8che","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique de Montr\u00e9al, Montreal, PQ, Canada"}]},{"given":"Alireza","family":"Sedighian","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique de Montr\u00e9al, Montreal, PQ, Canada"}]},{"given":"Ali","family":"Zand","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Jos\u00e9","family":"Fernandez","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique de Montr\u00e9al, Montreal, PQ, Canada"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, England UK"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature09182"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep02216"},{"key":"e_1_3_2_2_3_1","volume-title":"Collaboration, electronic messaging, anti-abuse and spam conference (CEAS)","author":"Benevenuto Fabricio","unstructured":"Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Vol. Vol. 6. 12."},{"key":"e_1_3_2_2_4_1","volume-title":"Bagging classifiers for fighting poisoning attacks in adversarial classification tasks International Workshop on Multiple Classifier Systems","author":"Biggio Battista","unstructured":"Battista Biggio, Igino Corona, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2011. Bagging classifiers for fighting poisoning attacks in adversarial classification tasks International Workshop on Multiple Classifier Systems. Springer, 350--359."},{"key":"e_1_3_2_2_5_1","volume-title":"Pavel Laskov, Giorgio Giacinto, and Fabio Roli.","author":"Biggio Battista","year":"2013","unstructured":"Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim vSrndi\u0107, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 387--402."},{"key":"e_1_3_2_2_6_1","volume-title":"Latent dirichlet allocation. the Journal of machine Learning research","author":"Blei David M","year":"2003","unstructured":"David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. the Journal of machine Learning research Vol. 3 (2003), 993--1022."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.006"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg419"},{"key":"e_1_3_2_2_11_1","volume-title":"The latent community model for detecting sybil attacks in social networks Proc. NDSS","author":"Cai Zhuhua","unstructured":"Zhuhua Cai and Christopher Jermaine 2012. The latent community model for detecting sybil attacks in social networks Proc. NDSS."},{"key":"e_1_3_2_2_12_1","volume-title":"Aiding the detection of fake accounts in large scale social online services Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation","author":"Cao Qiang","unstructured":"Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro 2012. Aiding the detection of fake accounts in large scale social online services Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 15--15."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM 477--488.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.22.50"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10854-8_8"},{"key":"e_1_3_2_2_20_1","first-page":"243","article-title":"How large US companies can use Twitter and other social media to gain business value","volume":"9","author":"Culnan Mary J","year":"2010","unstructured":"Mary J Culnan, Patrick J McHugh, and Jesus I Zubillaga. 2010. How large US companies can use Twitter and other social media to gain business value. MIS Quarterly Executive Vol. 9, 4 (2010), 243--259.","journal-title":"MIS Quarterly Executive"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_2_22_1","volume-title":"SybilInfer: Detecting Sybil Nodes using Social Networks","author":"Danezis George","unstructured":"George Danezis and Prateek Mittal 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. NDSS. San Diego, CA."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i12.2745"},{"key":"e_1_3_2_2_24_1","volume-title":"Google news personalization: scalable online collaborative filtering Proceedings of the 16th international conference on World Wide Web. ACM, 271--280","author":"Das Abhinandan S","unstructured":"Abhinandan S Das, Mayur Datar, Ashutosh Garg, and Shyam Rajaram 2007. Google news personalization: scalable online collaborative filtering Proceedings of the 16th international conference on World Wide Web. ACM, 271--280."},{"key":"e_1_3_2_2_25_1","volume-title":"BotOrNot: A System to Evaluate Social Bots. arXiv preprint arXiv:1602.00975","author":"Davis Clayton A","year":"2016","unstructured":"Clayton A Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. BotOrNot: A System to Evaluate Social Bots. arXiv preprint arXiv:1602.00975 (2016)."},{"key":"e_1_3_2_2_26_1","unstructured":"Eric Eaton and Rachael Mansbach 2012. A Spin-Glass Model for Semi-Supervised Community Detection. AAAI. Citeseer."},{"key":"e_1_3_2_2_27_1","unstructured":"Manuel Egele Gianluca Stringhini Christopher Kruegel and Giovanni Vigna 2013. COMPA: Detecting Compromised Accounts on Social Networks. NDSS."},{"key":"e_1_3_2_2_28_1","volume-title":"Towards Detecting Compromised Accounts on Social Networks. Transactions on Dependable and Secure Computing (TDSC)","author":"Egele Manuel","year":"2015","unstructured":"Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna 2015. Towards Detecting Compromised Accounts on Social Networks. Transactions on Dependable and Secure Computing (TDSC) (2015)."},{"key":"e_1_3_2_2_29_1","volume-title":"The rise of social bots. arXiv preprint arXiv:1407.5225","author":"Ferrara Emilio","year":"2014","unstructured":"Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2014. The rise of social bots. arXiv preprint arXiv:1407.5225 (2014)."},{"key":"e_1_3_2_2_30_1","unstructured":"Chris Fleizach Geoffrey M Voelker and Stefan Savage. 2007. Slicing spam with occam's razor. In CEAS."},{"key":"e_1_3_2_2_31_1","unstructured":"Hongyu Gao Yan Chen Kathy Lee Diana Palsetia and Alok N Choudhary 2012. Towards Online Spam Filtering in Social Networks.. NDSS."},{"key":"e_1_3_2_2_32_1","volume-title":"Detecting and characterizing social spam campaigns Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 35--47","author":"Gao Hongyu","unstructured":"Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 35--47."},{"key":"e_1_3_2_2_33_1","volume-title":"Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, and Krishna Phani Gummadi","author":"Ghosh Saptarshi","year":"2012","unstructured":"Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, and Krishna Phani Gummadi 2012. Understanding and combating link farming in the twitter social network Proceedings of the 21st international conference on World Wide Web. ACM, 61--70."},{"key":"e_1_3_2_2_34_1","volume-title":"Nightmare at Test Time: Robust Learning by Feature Deletion Proceedings of the 23rd International Conference on Machine Learning (ICML '06)","author":"Globerson Amir","unstructured":"Amir Globerson and Sam Roweis 2006. Nightmare at Test Time: Robust Learning by Feature Deletion Proceedings of the 23rd International Conference on Machine Learning (ICML '06). ACM, New York, NY, USA."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390200"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964870"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_2_39_1","volume-title":"Why we twitter: understanding microblogging usage and communities Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis. ACM, 56--65","author":"Java Akshay","unstructured":"Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. 2007. Why we twitter: understanding microblogging usage and communities Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis. ACM, 56--65."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.140"},{"key":"e_1_3_2_2_41_1","volume-title":"A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection Proceedings of the 14th International Joint Conference on Artificial Intelligence -","author":"Kohavi Ron","unstructured":"Ron Kohavi. 1995. A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection Proceedings of the 14th International Joint Conference on Artificial Intelligence - Volume 2 (IJCAI'95). Morgan Kaufmann Publishers Inc."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.016118"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.056117"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.5.011007"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5207-6"},{"key":"e_1_3_2_2_47_1","unstructured":"Sangho Lee and Jong Kim 2012. WarningBird: Detecting Suspicious URLs in Twitter Stream. NDSS."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14021"},{"key":"e_1_3_2_2_49_1","volume-title":"Finding twitter communities with common interests using following links of celebrities Proceedings of the 3rd international workshop on Modeling social media. ACM, 25--32","author":"Lim Kwan Hui","unstructured":"Kwan Hui Lim and Amitava Datta 2012. Finding twitter communities with common interests using following links of celebrities Proceedings of the 3rd international workshop on Modeling social media. ACM, 25--32."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813693"},{"key":"e_1_3_2_2_51_1","volume-title":"A Topic Model Approach. arXiv preprint arXiv:1604.08504","author":"Liu Linqing","year":"2016","unstructured":"Linqing Liu, Yao Lu, Ye Luo, Renxian Zhang, Laurent Itti, and Jianwei Lu. 2016. \"Detecting Smart\" Spammers On Social Network: A Topic Model Approach. arXiv preprint arXiv:1604.08504 (2016)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Daniel Lowd and Christopher Meek 2005. Adversarial learning Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM 641--647.","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_2_53_1","volume-title":"MALLET: A Machine Learning for Language Toolkit$$","author":"McCallum Andrew K","year":"2002","unstructured":"Andrew K McCallum. 2002. MALLET: A Machine Learning for Language Toolkit$$. http:\/\/mallet.cs.umass.edu\/. (2002)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.065709"},{"key":"e_1_3_2_2_56_1","volume-title":"Community structure in time-dependent, multiscale, and multiplex networks. science","author":"Mucha Peter J","year":"2010","unstructured":"Peter J Mucha, Thomas Richardson, Kevin Macon, Mason A Porter, and Jukka-Pekka Onnela 2010. Community structure in time-dependent, multiscale, and multiplex networks. science, Vol. 328, 5980 (2010), 876--878."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.33"},{"key":"e_1_3_2_2_58_1","volume-title":"Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia","author":"Nelson Blaine","year":"2008","unstructured":"Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia 2008. Exploiting Machine Learning to Subvert Your Spam Filter Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.088701"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.036122"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature03607"},{"key":"e_1_3_2_2_63_1","volume-title":"Network structure and minimum degree. Social networks","author":"Seidman Stephen B","year":"1983","unstructured":"Stephen B Seidman. 1983. Network structure and minimum degree. Social networks, Vol. 5, 3 (1983), 269--287."},{"key":"e_1_3_2_2_64_1","unstructured":"Padhraic Smyth Max Welling and Arthur U Asuncion. 2009. Asynchronous distributed learning of topic models. Advances in Neural Information Processing Systems. 81--88."},{"key":"e_1_3_2_2_65_1","volume-title":"Poultry Markets: On the Underground Economy of Twitter Followers Proceedings of the Workshop on Online Social Network (WOSN). ACM","author":"Stringhini G.","unstructured":"G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. 2012. Poultry Markets: On the Underground Economy of Twitter Followers Proceedings of the Workshop on Online Social Network (WOSN). ACM, Helsinki, Finland."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_2_67_1","unstructured":"Gianluca Stringhini Pierre Mourlanne Gregoire Jacob Manuel Egele Christopher Kruegel and Giovanni Vigna 2015. Evilcohort: detecting communities of malicious accounts on online services USENIX Security Symposium."},{"key":"e_1_3_2_2_68_1","unstructured":"Jessica Su and Sen Wu. 2013. Null Models For Social Networks. http:\/\/snap.stanford.edu\/class\/cs224w-2013\/projects2013\/cs224w-003-final.pdf. (2013)."},{"key":"e_1_3_2_2_69_1","volume-title":"The effect of wording on message propagation: Topic-and author-controlled natural experiments on Twitter. arXiv preprint arXiv:1405.1438","author":"Tan Chenhao","year":"2014","unstructured":"Chenhao Tan, Lillian Lee, and Bo Pang 2014. The effect of wording on message propagation: Topic-and author-controlled natural experiments on Twitter. arXiv preprint arXiv:1405.1438 (2014)."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00298ED1V01Y201009DMK003"},{"key":"e_1_3_2_2_71_1","volume-title":"2011 IEEE Symposium on. IEEE, 447--462","author":"Thomas Kurt","year":"2011","unstructured":"Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song 2011. Design and evaluation of a real-time url spam filtering service Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 447--462."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Kurt Thomas Chris Grier Dawn Song and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM 243--258.","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_2_73_1","unstructured":"Oren Tsur Adi Littman and Ari Rappoport 2013. Efficient Clustering of Short Messages into General Domains. ICWSM. Citeseer."},{"key":"e_1_3_2_2_74_1","unstructured":"Twitter 2009. Reporting spam on Twitter. https:\/\/support.twitter.com\/articles\/64986. (2009)."},{"key":"e_1_3_2_2_75_1","unstructured":"Twitter 2015. Twitter usage. https:\/\/about.twitter.com\/company. (2015)."},{"key":"e_1_3_2_2_76_1","volume-title":"Mark Crovella, Saikat Guha, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove","author":"Viswanath Bimal","year":"2014","unstructured":"Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove 2014. Towards Detecting Anomalous User Behavior in Online Social Networks. Usenix Security, Vol. Vol. 14."},{"key":"e_1_3_2_2_77_1","volume-title":"Detecting spam bots in online social networking sites: a machine learning approach","author":"Wang Alex Hai","unstructured":"Alex Hai Wang. 2010. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV. Springer, 335--342."},{"key":"e_1_3_2_2_78_1","volume-title":"Usenix Security","volume":"14","author":"Wang Gang","year":"2013","unstructured":"Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y Zhao. 2013. You Are How You Click: Clickstream Analysis for Sybil Detection. Usenix Security, Vol. Vol. 14."},{"key":"e_1_3_2_2_79_1","volume-title":"Plda: Parallel latent dirichlet allocation for large-scale applications International Conference on Algorithmic Applications in Management","author":"Wang Yi","unstructured":"Yi Wang, Hongjie Bai, Matt Stanton, Wen-Yen Chen, and Edward Y Chang 2009. Plda: Parallel latent dirichlet allocation for large-scale applications International Conference on Algorithmic Applications in Management. Springer, 301--314."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"crossref","unstructured":"Jianshu Weng Ee-Peng Lim Jing Jiang and Qi He. 2010. Twitterrank: finding topic-sensitive influential twitterers Proceedings of the third ACM international conference on Web search and data mining. ACM 261--270.","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep02522"},{"key":"e_1_3_2_2_82_1","volume-title":"Topical trustrank: Using topicality to combat web spam Proceedings of the 15th international conference on World Wide Web. ACM, 63--72","author":"Wu Baoning","unstructured":"Baoning Wu, Vinay Goel, and Brian D Davison 2006. Topical trustrank: Using topicality to combat web spam Proceedings of the 15th international conference on World Wide Web. ACM, 63--72."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920264"},{"key":"e_1_3_2_2_84_1","volume-title":"Robert Chandler Harkreader, and Guofei Gu","author":"Yang Chao","year":"2011","unstructured":"Chao Yang, Robert Chandler Harkreader, and Guofei Gu. 2011. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers Recent Advances in Intrusion Detection (RAID)."},{"key":"e_1_3_2_2_85_1","volume-title":"et almbox","author":"Yardi Sarita","year":"2009","unstructured":"Sarita Yardi, Daniel Romero, Grant Schoenebeck, et almbox. 2009. Detecting spam in a twitter network. First Monday, Vol. 15, 1 (2009)."},{"key":"e_1_3_2_2_86_1","volume-title":"Measuring message propagation and social influence on Twitter","author":"Ye Shaozhi","unstructured":"Shaozhi Ye and S Felix Wu 2010. Measuring message propagation and social influence on Twitter. Springer."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134055","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134055"}},"subtitle":["Spotting Twitter Spam Off the Beaten Paths"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":86,"alternative-id":["10.1145\/3133956.3134055","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134055","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}