{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:54Z","timestamp":1750220934551,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316704","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"1063-1070","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["CrowdGuard: Characterization and Early Detection of Collective Content Polluters in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Ke","family":"Li","sequence":"first","affiliation":[{"name":"Northwestern Polytechnical University Xi'an, Shaanxi, China"}]},{"given":"Bin","family":"Guo","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University Xi'an, Shaanxi, China"}]},{"given":"Qiuyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University Xi'an, Shaanxi, China"}]},{"given":"Jianping","family":"Yuan","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University Xi'an, Shaanxi, China"}]},{"given":"Zhiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University Xi'an, Shaanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.50"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488443"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2482465"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0321-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191574"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2656635"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554894"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Semi-supervised detection of collective anomalies with an application in high energy particle physics","author":"Vatanen Tommi","year":"2012","unstructured":"Tommi Vatanen , Mikael Kuusela , Eric Malmi , Tapani Raiko , Timo Aaltonen , and Yoshikazu Nagai . 2012 . Semi-supervised detection of collective anomalies with an application in high energy particle physics . In IJCNN , 1 - 8 . Tommi Vatanen, Mikael Kuusela, Eric Malmi, Tapani Raiko, Timo Aaltonen, and Yoshikazu Nagai. 2012. Semi-supervised detection of collective anomalies with an application in high energy particle physics. In IJCNN, 1-8.","journal-title":"IJCNN"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_1_17_1","unstructured":"Onur Varol Emilio Ferrara Clayton A. Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. arXiv: 1703.03107. Retrieved from https:\/\/arxiv.org\/abs\/1703.03107  Onur Varol Emilio Ferrara Clayton A. Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. arXiv: 1703.03107. Retrieved from https:\/\/arxiv.org\/abs\/1703.03107"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2681672"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_3_2_1_21_1","unstructured":"Tu Ngoc Nguyen Cheng Li and Claudia Nieder\u00e9e. 2017. On Early-stage Debunking Rumors on Twitter: Leveraging the Wisdom of Weak Learners. arXiv: 1709.04402. Retrieved from https:\/\/arxiv.org\/abs\/1703.04402  Tu Ngoc Nguyen Cheng Li and Claudia Nieder\u00e9e. 2017. On Early-stage Debunking Rumors on Twitter: Leveraging the Wisdom of Weak Learners. arXiv: 1709.04402. Retrieved from https:\/\/arxiv.org\/abs\/1703.04402"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3118756.3119011"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402272"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2794400"},{"key":"e_1_3_2_1_27_1","first-page":"412","article-title":"A comparative study on feature selection in text categorization","volume":"97","author":"Yang Yiming","year":"1997","unstructured":"Yiming Yang and Jan O. Pedersen . 1997 . A comparative study on feature selection in text categorization . In Icml , 97 , 412 - 420 . Yiming Yang and Jan O. Pedersen. 1997. A comparative study on feature selection in text categorization. In Icml, 97, 412-420.","journal-title":"Icml"},{"issue":"510","key":"e_1_3_2_1_28_1","first-page":"126","article-title":"A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models","volume":"4","author":"Bilmes Jeffrey A.","year":"1998","unstructured":"Jeffrey A. Bilmes . 1998 . A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models . International Computer Science Institute , 4 ( 510 ), 126 . Jeffrey A. Bilmes. 1998. A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models. International Computer Science Institute, 4(510), 126.","journal-title":"International Computer Science Institute"},{"volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"Bishop Christopher M.","key":"e_1_3_2_1_29_1","unstructured":"Christopher M. Bishop . 2006. Pattern Recognition and Machine Learning (Information Science and Statistics) . Springer-Verlag , Berlin, Heidelberg . Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag, Berlin, Heidelberg."},{"key":"e_1_3_2_1_30_1","first-page":"185","article-title":"Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter","author":"Lee Kyumin","year":"2011","unstructured":"Kyumin Lee , Brian David , and James Caverlee . 2011 . Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter . In ICWSM , 185 - 192 . Kyumin Lee, Brian David, and James Caverlee. 2011. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In ICWSM, 185-192.","journal-title":"ICWSM"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465541"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2479616"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"e_1_3_2_1_35_1","first-page":"241","volume-title":"Proceedings of the 22nd USENIX conference on Security (SEC'13)","author":"Wang Gang","unstructured":"Gang Wang , Tristan Konolige , Christo Wilson , Xiao Wang , Haitao Zheng , and Ben Y. Zhao . 2013. You are how you click: clickstream analysis for Sybil detection . In Proceedings of the 22nd USENIX conference on Security (SEC'13) . USENIX Association, Berkeley, CA, USA , 241 - 256 . Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y. Zhao. 2013. You are how you click: clickstream analysis for Sybil detection. In Proceedings of the 22nd USENIX conference on Security (SEC'13). USENIX Association, Berkeley, CA, USA, 241-256."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_37_1","first-page":"223","volume-title":"Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14)","author":"Viswanath Bimal","year":"2014","unstructured":"Bimal Viswanath , M. Ahmad Bashir , Mark Crovella , Saikat Guha , Krishna P. Gummadi , Balachander Krishnamurthy , and Alan Mislove . 2014 . Towards detecting anomalous user behavior in online social networks . In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14) . USENIX Association, Berkeley, CA, USA , 223 - 238 . Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA, 223-238."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110163"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:24Z","timestamp":1750204404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":38,"alternative-id":["10.1145\/3308560.3316704","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316704","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}