{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:51:03Z","timestamp":1762015863826,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61872211","61572278","U1736209"],"award-info":[{"award-number":["61872211","61572278","U1736209"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330702","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"2012-2022","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks"],"prefix":"10.1145","author":[{"given":"Zenghua","family":"Xia","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Citadel Securities, Chicago, IL, USA"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fabricio Benevenuto Gabriel Magno Tiago Rodrigues and Virgilio Almeida. 2010. Detecting spammers on twitter. In CEAS.  Fabricio Benevenuto Gabriel Magno Tiago Rodrigues and Virgilio Almeida. 2010. Detecting spammers on twitter. In CEAS."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_5_1","unstructured":"Zhuhua Cai and Christopher Jermaine. 2012. The Latent Community Model for Detecting Sybils in Social Networks. In NDSS .  Zhuhua Cai and Christopher Jermaine. 2012. The Latent Community Model for Detecting Sybils in Social Networks. In NDSS ."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Michael Sirivianos Xiaowei Yang and Kamesh Munagala. 2015. Combating friend spam using social rejections. In ICDCS .  Qiang Cao Michael Sirivianos Xiaowei Yang and Kamesh Munagala. 2015. Combating friend spam using social rejections. In ICDCS .","DOI":"10.1109\/ICDCS.2015.32"},{"key":"e_1_3_2_1_7_1","unstructured":"Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI .   Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_27"},{"key":"e_1_3_2_1_10_1","unstructured":"G. Danezis and P. Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS .  G. Danezis and P. Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS ."},{"key":"e_1_3_2_1_11_1","volume-title":"Compa: Detecting compromised accounts on social networks.. In NDSS .","author":"Egele Manuel","year":"2013","unstructured":"Manuel Egele , Gianluca Stringhini , Christopher Kruegel , and Giovanni Vigna . 2013 . Compa: Detecting compromised accounts on social networks.. In NDSS . Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2013. Compa: Detecting compromised accounts on social networks.. In NDSS ."},{"volume-title":"USENIX Security Symposium .","author":"Bimal","key":"e_1_3_2_1_12_1","unstructured":"Bimal Viswanath et al. 2014. Towards Detecting Anomalous User Behavior in Online Social Networks .. In USENIX Security Symposium . Bimal Viswanath et al. 2014. Towards Detecting Anomalous User Behavior in Online Social Networks.. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"e_1_3_2_1_14_1","unstructured":"Gang Wang et al. 2013a. Social Turing Tests: Crowdsourcing Sybil Detection. In NDSS .  Gang Wang et al. 2013a. Social Turing Tests: Crowdsourcing Sybil Detection. In NDSS ."},{"key":"e_1_3_2_1_15_1","volume-title":"Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In NDSS .","author":"Haizhong Zheng","year":"2018","unstructured":"Haizhong Zheng et al. 2018 . Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In NDSS . Haizhong Zheng et al. 2018. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In NDSS ."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.33"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134055"},{"volume-title":"USENIX Security Symposium .","author":"Wang","key":"e_1_3_2_1_19_1","unstructured":"Wang Gang et al. 2013c. You Are How You Click: Clickstream Analysis for Sybil Detection .. In USENIX Security Symposium . Wang Gang et al. 2013c. You Are How You Click: Clickstream Analysis for Sybil Detection.. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_20_1","volume-title":"Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS .","author":"Yazan Boshmaf","year":"2015","unstructured":"Yazan Boshmaf et al. 2015 . Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS . Yazan Boshmaf et al. 2015. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS ."},{"key":"e_1_3_2_1_21_1","first-page":"488","article-title":"VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils","volume":"13","author":"Z. Yang","year":"2016","unstructured":"Z. Yang et al. 2016 . VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils . IEEE TDSC , Vol. 13 , 4 (2016), 488 -- 501 . Z. Yang et al. 2016. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils. IEEE TDSC , Vol. 13, 4 (2016), 488--501.","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_1_23_1","unstructured":"Hongyu Gao Yan Chen Kathy Lee Diana Palsetia and Alok Choudhary. 2012. Towards online spam filtering in social networks. In NDSS .  Hongyu Gao Yan Chen Kathy Lee Diana Palsetia and Alok Choudhary. 2012. Towards online spam filtering in social networks. In NDSS ."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_27_1","unstructured":"Hacking Election. 2016. http:\/\/goo.gl\/G8o9x0  Hacking Election. 2016. http:\/\/goo.gl\/G8o9x0"},{"key":"e_1_3_2_1_28_1","unstructured":"Hacking Financial Market. 2016. http:\/\/goo.gl\/4AkWyt  Hacking Financial Market. 2016. http:\/\/goo.gl\/4AkWyt"},{"key":"e_1_3_2_1_29_1","unstructured":"Yoon Kyung Kim. 2014. Convolutional Neural Networks for Sentence Classification. In EMNLP .  Yoon Kyung Kim. 2014. Convolutional Neural Networks for Sentence Classification. In EMNLP ."},{"key":"e_1_3_2_1_30_1","unstructured":"Kyumin Lee James Caverlee and Steve Webb. 2010. Uncovering social spammers: social honeypots  Kyumin Lee James Caverlee and Steve Webb. 2010. Uncovering social spammers: social honeypots"},{"key":"e_1_3_2_1_31_1","unstructured":"machine learning. In SIGIR .  machine learning. In SIGIR ."},{"key":"e_1_3_2_1_32_1","volume-title":"Brian David Eoff, and James Caverlee","author":"Lee Kyumin","year":"2011","unstructured":"Kyumin Lee , Brian David Eoff, and James Caverlee . 2011 . Seven Months with the Devils : A Long-Term Study of Content Polluters on Twitter.. In ICWSM . Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter.. In ICWSM ."},{"key":"e_1_3_2_1_33_1","unstructured":"Pengfei Liu Xipeng Qiu and Xuanjing Huang. 2016. Recurrent Neural Network for Text Classification with Multi-Task Learning. In IJCAI .   Pengfei Liu Xipeng Qiu and Xuanjing Huang. 2016. Recurrent Neural Network for Text Classification with Multi-Task Learning. In IJCAI ."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.015"},{"key":"e_1_3_2_1_35_1","volume-title":"ICLR Workshop .","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013 . Efficient estimation of word representations in vector space . In ICLR Workshop . Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. In ICLR Workshop ."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Abedelaziz Mohaisen Nicholas Hopper and Yongdae Kim. 2011. Keep your friends close: Incorporating trust into social network-based Sybil defenses. In INFOCOM .  Abedelaziz Mohaisen Nicholas Hopper and Yongdae Kim. 2011. Keep your friends close: Incorporating trust into social network-based Sybil defenses. In INFOCOM .","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Security Symposium .","author":"Stringhini Gianluca","year":"2015","unstructured":"Gianluca Stringhini , Pierre Mourlanne , Gregoire Jacob , Manuel Egele , Christopher Kruegel , and Giovanni Vigna . 2015 . Evilcohort: detecting communities of malicious accounts on online services . In USENIX Security Symposium . Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. Evilcohort: detecting communities of malicious accounts on online services. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_44_1","volume-title":"SECRYPT 2010 .","author":"Wang Alex Hai","year":"2010","unstructured":"Alex Hai Wang . 2010 . Don't Follow Me - Spam Detection in Twitter . In SECRYPT 2010 . Alex Hai Wang. 2010. Don't Follow Me - Spam Detection in Twitter. In SECRYPT 2010 ."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:10Z","timestamp":1750208530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330702"}},"subtitle":["A Case Study"],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":48,"alternative-id":["10.1145\/3292500.3330702","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330702","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}