{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:05:57Z","timestamp":1774368357856,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363198","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1423-1438","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Detecting Fake Accounts in Online Social Networks at the Time of Registrations"],"prefix":"10.1145","author":[{"given":"Dong","family":"Yuan","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yuanli","family":"Miao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, Durhamn, NC, USA"}]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Xiao","family":"Liang","sequence":"additional","affiliation":[{"name":"Tencent, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"SoK: The Evolution of Sybil Defense via Social Networks","author":"Alvisi Lorenzo"},{"key":"e_1_3_2_2_2_1","unstructured":"Fabricio Benevenuto Gabriel Magno Tiago Rodrigues and Virgilio Almeida. 2010. Detecting spammers on twitter. In CEAS .  Fabricio Benevenuto Gabriel Magno Tiago Rodrigues and Virgilio Almeida. 2010. Detecting spammers on twitter. In CEAS ."},{"key":"e_1_3_2_2_3_1","volume-title":"Us: Automated Identity Theft Attacks on Social Networks. In WWW .","author":"Bilge L.","year":"2009"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_5_1","first-page":"8","article-title":"Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs","volume":"15","author":"Boshmaf Yazan","year":"2015","journal-title":"NDSS"},{"key":"e_1_3_2_2_6_1","volume-title":"Mitchell","author":"Bursztein Elie","year":"2014"},{"key":"e_1_3_2_2_7_1","volume-title":"The Failure of Noise-Based Non-continuous Audio Captchas. In IEEE Symposium on Security and Privacy. 19 -- 31","author":"Bursztein Elie","year":"2011"},{"key":"e_1_3_2_2_8_1","volume-title":"Mitchell","author":"Bursztein Elie","year":"2011"},{"key":"e_1_3_2_2_9_1","unstructured":"Zhuhua Cai and Christopher Jermaine. 2012. The Latent Community Model for Detecting Sybils in Social Networks. In NDSS .  Zhuhua Cai and Christopher Jermaine. 2012. The Latent Community Model for Detecting Sybils in Social Networks. In NDSS ."},{"key":"e_1_3_2_2_10_1","unstructured":"Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI .  Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI ."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In CCS . 477--488.  Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In CCS . 477--488.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_2_12_1","unstructured":"G. Danezis and P. Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS .  G. Danezis and P. Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS ."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"John R. Douceur. 2002. The Sybil Attack. In IPTPS .  John R. Douceur. 2002. The Sybil Attack. In IPTPS .","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_2_14_1","unstructured":"Matthew Edwards Guillermo Suarez-Tangil Claudia Peersman Gianluca Stringhini Awais Rashid and Monica Whitty. 2018. The Geography of Online Dating Fraud. In ConPro .  Matthew Edwards Guillermo Suarez-Tangil Claudia Peersman Gianluca Stringhini Awais Rashid and Monica Whitty. 2018. The Geography of Online Dating Fraud. In ConPro ."},{"key":"e_1_3_2_2_15_1","first-page":"447","article-title":"Towards Detecting Compromised Accounts on Social Networks","volume":"12","author":"Egele Manuel","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"D. Freeman M. D\u00fcrmuth and B. Biggio. 2016. Who are you? A statistical approach to measuring user authenticity. In NDSS .  D. Freeman M. D\u00fcrmuth and B. Biggio. 2016. Who are you? A statistical approach to measuring user authenticity. In NDSS .","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_2_17_1","unstructured":"Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns. In IMC. 35--47.  Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns. In IMC. 35--47."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433147"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_2_20_1","unstructured":"Hacking Financial Market. 2016. http:\/\/goo.gl\/4AkWyt  Hacking Financial Market. 2016. http:\/\/goo.gl\/4AkWyt"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978317"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_2_23_1","unstructured":"Kyumin Lee Prithivi Tamilarasan and James Caverlee. 2013. Crowdturfers Campaigns and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media. In ICWSM .  Kyumin Lee Prithivi Tamilarasan and James Caverlee. 2013. Crowdturfers Campaigns and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media. In ICWSM ."},{"key":"e_1_3_2_2_24_1","volume-title":"The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing. CoRR","author":"Lee Kyumin","year":"2014"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Anna Leontjeva Moises Goldszmidt Yinglian Xie Fang Yu and Mart'in Abadi. 2013. Early security classification of skype users via machine learning. In AISec .  Anna Leontjeva Moises Goldszmidt Yinglian Xie Fang Yu and Mart'in Abadi. 2013. Early security classification of skype users via machine learning. In AISec .","DOI":"10.1145\/2517312.2517322"},{"key":"e_1_3_2_2_26_1","unstructured":"Changchang Liu Peng Gao Matthew Wright and Prateek Mittal. 2015. Exploiting temporal dynamics in Sybil defenses. In CCS. 805--816.  Changchang Liu Peng Gao Matthew Wright and Prateek Mittal. 2015. Exploiting temporal dynamics in Sybil defenses. In CCS. 805--816."},{"key":"e_1_3_2_2_27_1","volume-title":"Keep your friends close: Incorporating trust into social network-based Sybil defenses","author":"Mohaisen Abedelaziz"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Abedelaziz Mohaisen Aaram Yun and Yongdae Kim. 2010. Measuring the mixing time of social graphs. In IMC .  Abedelaziz Mohaisen Aaram Yun and Yongdae Kim. 2010. Measuring the mixing time of social graphs. In IMC .","DOI":"10.1145\/1879141.1879191"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Jonghyuk Song Sangho Lee and Jong Kim. 2011. Spam filtering in Twitter using sender-receiver relationship. In RAID .  Jonghyuk Song Sangho Lee and Jong Kim. 2011. Spam filtering in Twitter using sender-receiver relationship. In RAID .","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Jonghyuk Song Sangho Lee and Jong Kim. 2015. CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. In CCS . 793--804.  Jonghyuk Song Sangho Lee and Jong Kim. 2015. CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. In CCS . 793--804.","DOI":"10.1145\/2810103.2813661"},{"key":"e_1_3_2_2_31_1","volume-title":"Seventh international conference on spoken language processing .","author":"Stolcke Andreas","year":"2002"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Gianluca Stringhini Christopher Kruegel and Giovanni Vigna. 2010. Detecting spammers on social networks. In ACSAC .  Gianluca Stringhini Christopher Kruegel and Giovanni Vigna. 2010. Detecting spammers on social networks. In ACSAC .","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_2_33_1","volume-title":"USENIX Security Symposium. 563--578","author":"Stringhini Gianluca","year":"2015"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","volume-title":"Design and evaluation of a real-time url spam filtering service","author":"Thomas Kurt","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_2_35_1","volume-title":"David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna.","author":"Thomas Kurt","year":"2015"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Kurt Thomas Frank Li Chris Grier and Vern Paxson. 2014. Consequences of connectivity: Characterizing account hijacking on twitter. In CCS . 489--500.  Kurt Thomas Frank Li Chris Grier and Vern Paxson. 2014. Consequences of connectivity: Characterizing account hijacking on twitter. In CCS . 489--500.","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_2_37_1","volume-title":"Usenix Security Symposium . 195--210","author":"Thomas Kurt","year":"2013"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Bimal Viswanath Ansley Post Krishna P. Gummadi and Alan Mislove. 2010. An Analysis of Social Network-Based Sybil Defenses. In ACM SIGCOMM .  Bimal Viswanath Ansley Post Krishna P. Gummadi and Alan Mislove. 2010. An Analysis of Social Network-Based Sybil Defenses. In ACM SIGCOMM .","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_2_39_1","volume-title":"SECRYPT 2010 .","author":"Wang Alex Hai","year":"2010"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.56"},{"key":"e_1_3_2_2_41_1","volume-title":"Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. arXiv preprint arXiv:1812.01661","author":"Wang Binghui","year":"2018"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_2_43_1","volume-title":"USENIX Security Symposium . 241--256","author":"Wang Gang","year":"2013"},{"key":"e_1_3_2_2_44_1","volume-title":"USENIX Security Symposium. 239--254","author":"Wang Gang"},{"key":"e_1_3_2_2_45_1","volume-title":"Zhao","author":"Wang Gang","year":"2012"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330702"},{"key":"e_1_3_2_2_47_1","unstructured":"Yinglian Xie Fang Yu Qifa Ke Mart'in Abadi Eliot Gillum Krish Vitaldevaria Jason Walter Junxian Huang and Z. Morley Mao. 2012. Innocent by Association: Early Recognition of Legitimate Users. In CCS .  Yinglian Xie Fang Yu Qifa Ke Mart'in Abadi Eliot Gillum Krish Vitaldevaria Jason Walter Junxian Huang and Z. Morley Mao. 2012. Innocent by Association: Early Recognition of Legitimate Users. In CCS ."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Chao Yang Robert Harkreader and Guofei Gu. 2011. Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. In RAID .  Chao Yang Robert Harkreader and Guofei Gu. 2011. Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. In RAID .","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin and Guofei Gu. 2012. Analyzing Spammer's Social Networks for Fun and Profit. In WWW .  Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin and Guofei Gu. 2012. Analyzing Spammer's Social Networks for Fun and Profit. In WWW .","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2410792"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243754"},{"key":"e_1_3_2_2_52_1","article-title":"Exploratory undersampling for class-imbalance learning","volume":"39","author":"Liu Xu","year":"2009","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"H. Yu P. B. Gibbons M. Kaminsky and F. Xiao. 2008. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In IEEE S & P .  H. Yu P. B. Gibbons M. Kaminsky and F. Xiao. 2008. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In IEEE S & P .","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"H. Yu M. Kaminsky P. B. Gibbons and A. Flaxman. 2006. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM .  H. Yu M. Kaminsky P. B. Gibbons and A. Flaxman. 2006. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM .","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_2_55_1","unstructured":"Yao Zhao Yinglian Xie Fang Yu Qifa Ke Yuan Yu Yan Chen and Eliot Gillum. 2009. BotGraph: Large Scale Spamming Botnet Detection. In NSDI .  Yao Zhao Yinglian Xie Fang Yu Qifa Ke Yuan Yu Yan Chen and Eliot Gillum. 2009. BotGraph: Large Scale Spamming Botnet Detection. In NSDI ."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23009"},{"key":"e_1_3_2_2_57_1","volume-title":"Uncovering social network Sybils in the wild. Acm Transactions on Knowledge Discovery from Data","author":"Zhi Yang","year":"2011"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":57,"alternative-id":["10.1145\/3319535.3363198","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363198","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}