{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:36:59Z","timestamp":1776105419269,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380256","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"1874-1884","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse"],"prefix":"10.1145","author":[{"given":"Janith","family":"Weerasinghe","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Bailey","family":"Flanigan","sequence":"additional","affiliation":[{"name":"Drexel University"}]},{"given":"Aviel","family":"Stein","sequence":"additional","affiliation":[{"name":"Drexel University"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"New York University"}]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"News Feed FYI. https:\/\/newsroom.fb.com\/news\/category\/news-feed-fyi\/. [Online","year":"2019"},{"key":"e_1_3_2_1_2_1","unstructured":"Ling Huang Sadia Afroz Anthony D. Joseph J. D.\u00a0Tygar Alex\u00a0Kantchelian Justin\u00a0Ma. 2012. Robust Detection of Comment Spam Using Entropy Rate. (2012).  Ling Huang Sadia Afroz Anthony D. Joseph J. D.\u00a0Tygar Alex\u00a0Kantchelian Justin\u00a0Ma. 2012. Robust Detection of Comment Spam Using Entropy Rate. (2012)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_4_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_5_1","volume-title":"Do Instagram Pods Work? The Truth Behind Instagram\u2019s Latest Engagement Hack. https:\/\/blog.hootsuite.com\/instagram-pods\/. [Online","author":"Brown Emma","year":"2019"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_7_1","volume-title":"Scipy - Linear Sum Assignment. https:\/\/docs.scipy.org\/doc\/scipy-0.18.1\/reference\/generated\/scipy.optimize.linear_sum_assignment.html. [Online","author":"The\u00a0Scipy","year":"2019"},{"key":"e_1_3_2_1_8_1","volume-title":"How Twitter\u2019s algorithm is amplifying extreme political rhetoric. https:\/\/edition.cnn.com\/2019\/03\/22\/tech\/twitter-algorithm-political-rhetoric\/index.html. [Online","author":"Darcy Oliver","year":"2019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278537"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131404"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700171.2791043"},{"key":"e_1_3_2_1_13_1","unstructured":"Alex Kantrowitz. 2018. Facebook Removes 10 Instagram Algorithm-Gaming Groups With Hundreds Of Thousands Of Members. https:\/\/www.buzzfeednews.com\/article\/alexkantrowitz\/facebook-removes-ten-instagram-algorithm-gaming-groups-with. [Online; Accessed 10-May-2019].  Alex Kantrowitz. 2018. Facebook Removes 10 Instagram Algorithm-Gaming Groups With Hundreds Of Thousands Of Members. https:\/\/www.buzzfeednews.com\/article\/alexkantrowitz\/facebook-removes-ten-instagram-algorithm-gaming-groups-with. [Online; Accessed 10-May-2019]."},{"key":"e_1_3_2_1_14_1","unstructured":"David Andrzejewski David\u00a0Buttler Keith\u00a0Stevens Philip\u00a0Kegelmeyer. 2012. Exploring topic coherence over many models and many topics. (2012).  David Andrzejewski David\u00a0Buttler Keith\u00a0Stevens Philip\u00a0Kegelmeyer. 2012. Exploring topic coherence over many models and many topics. (2012)."},{"key":"e_1_3_2_1_15_1","unstructured":"Daniel\u00a0D Lee and H\u00a0Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In Advances in neural information processing systems. 556\u2013562.  Daniel\u00a0D Lee and H\u00a0Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In Advances in neural information processing systems. 556\u2013562."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882972"},{"key":"e_1_3_2_1_17_1","unstructured":"Scott\u00a0M Lundberg Gabriel\u00a0G Erion and Su-In Lee. 2018. Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:1802.03888(2018).  Scott\u00a0M Lundberg Gabriel\u00a0G Erion and Su-In Lee. 2018. Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:1802.03888(2018)."},{"key":"e_1_3_2_1_18_1","first-page":"I","article-title":"A Unified Approach to Interpreting Model Predictions","volume":"30","author":"Lundberg M","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_19_1","first-page":"100","article-title":"Introduction to information retrieval","volume":"16","author":"Manning Christopher","year":"2010","journal-title":"Natural Language Engineering"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274388"},{"key":"e_1_3_2_1_21_1","volume-title":"It\u2019s not over: Russia\u2019s divisive Instagram memes are still racking up likes. https:\/\/www.fastcompany.com\/90283167\/russia-instagram-war-facebook-memes. [Online","author":"Pasternack Alex","year":"2019"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_23_1","unstructured":"Nakatani Shuyo. 2010. Language Detection Library for Java. http:\/\/code.google.com\/p\/language-detection\/  Nakatani Shuyo. 2010. Language Detection Library for Java. http:\/\/code.google.com\/p\/language-detection\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Social Media Statistics 2019: Top Networks By the Numbers. https:\/\/dustinstout.com\/social-media-statistics\/. [Online","author":"Stout Dustin","year":"2019"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_26_1","volume-title":"The Truth About Instagram Pods \u2013 Do They Really Work To Increase Your Engagement?https:\/\/alextooby.com\/instagram-pods\/. [Online","author":"Tooby Alex","year":"2019"},{"key":"e_1_3_2_1_27_1","volume-title":"Towards Detecting Anomalous User Behavior in Online Social Networks. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Viswanath Bimal","year":"2014"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:10Z","timestamp":1750199590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":27,"alternative-id":["10.1145\/3366423.3380256","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380256","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}