{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:26:27Z","timestamp":1767338787383,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467094","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:12:05Z","timestamp":1628748725000},"page":"3240-3250","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach"],"prefix":"10.1145","author":[{"given":"Xiao","family":"Liang","sequence":"first","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Duke University &amp; Illinois Institute of Technology, Durham, NC, USA"}]},{"given":"Shaofeng","family":"Hu","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"given":"Zijie","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Dong","family":"Yuan","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Fang","family":"He","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sok: The evolution of sybil defense via social networks","author":"Alvisi Lorenzo","year":"2013","unstructured":"Lorenzo Alvisi , Allen Clement , Alessandro Epasto , and 2013 . Sok: The evolution of sybil defense via social networks . In IEEE S & P. Lorenzo Alvisi, Allen Clement, Alessandro Epasto, and et al. 2013. Sok: The evolution of sybil defense via social networks. In IEEE S & P."},{"key":"e_1_3_2_1_2_1","volume-title":"Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment","author":"Blondel Vincent D","year":"2008","unstructured":"Vincent D Blondel , Jean-Loup Guillaume , Renaud Lambiotte , and Etienne Lefebvre . 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment ( 2008 ). Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment (2008)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Yazan Boshmaf Dionysios Logothetis Georgos Siganos and etal 2016. \u00cdntegro: Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs. Computers & Security (2016).  Yazan Boshmaf Dionysios Logothetis Georgos Siganos and et al. 2016. \u00cdntegro: Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs. Computers & Security (2016).","DOI":"10.1016\/j.cose.2016.05.005"},{"key":"e_1_3_2_1_4_1","unstructured":"Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI.  Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In CCS.  Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In CCS.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_7_1","volume-title":"Sybilinfer: Detecting sybil nodes using social networks.. In NDSS.","author":"Danezis George","year":"2009","unstructured":"George Danezis and Prateek Mittal . 2009 . Sybilinfer: Detecting sybil nodes using social networks.. In NDSS. George Danezis and Prateek Mittal. 2009. Sybilinfer: Detecting sybil nodes using social networks.. In NDSS."},{"key":"e_1_3_2_1_8_1","unstructured":"Manuel Egele Gianluca Stringhini Christopher Kruegel and Giovanni Vigna. 2015. Towards detecting compromised accounts on social networks. In TDSC.  Manuel Egele Gianluca Stringhini Christopher Kruegel and Giovanni Vigna. 2015. Towards detecting compromised accounts on social networks. In TDSC."},{"key":"e_1_3_2_1_9_1","unstructured":"Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns. In Internet measurement.  Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns. In Internet measurement."},{"key":"e_1_3_2_1_10_1","volume-title":"Sanjeev R Kulkarni, Kurt Thomas, and Prateek Mittal.","author":"Gao Peng","year":"2018","unstructured":"Peng Gao , Binghui Wang , Neil Zhenqiang Gong , Sanjeev R Kulkarni, Kurt Thomas, and Prateek Mittal. 2018 . Sybilfuse : Combining local attributes with global structure to perform robust sybil detection. In CNS. Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R Kulkarni, Kurt Thomas, and Prateek Mittal. 2018. Sybilfuse: Combining local attributes with global structure to perform robust sybil detection. In CNS."},{"key":"e_1_3_2_1_11_1","volume-title":"Sybilbelief: A semi-supervised learning approach for structure-based sybil detection. In TIFS.","author":"Gong Neil Zhenqiang","year":"2014","unstructured":"Neil Zhenqiang Gong , Mario Frank , and Prateek Mittal . 2014 . Sybilbelief: A semi-supervised learning approach for structure-based sybil detection. In TIFS. Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. Sybilbelief: A semi-supervised learning approach for structure-based sybil detection. In TIFS."},{"key":"e_1_3_2_1_12_1","unstructured":"Jinyuan Jia Binghui Wang and Neil Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In DSN.  Jinyuan Jia Binghui Wang and Neil Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In DSN."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Abedelaziz Mohaisen Nicholas Hopper and Yongdae Kim. 2011. Keep your friends close: Incorporating trust into social network-based sybil defenses. In INFOCOM.  Abedelaziz Mohaisen Nicholas Hopper and Yongdae Kim. 2011. Keep your friends close: Incorporating trust into social network-based sybil defenses. In INFOCOM.","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna P. Gummadi Alan Mislove and Ansley Post. 2012. Defending against Large-Scale Crawls in Online Social Networks. In CoNEXT.  Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna P. Gummadi Alan Mislove and Ansley Post. 2012. Defending against Large-Scale Crawls in Online Social Networks. In CoNEXT.","DOI":"10.1145\/2413176.2413214"},{"key":"e_1_3_2_1_15_1","unstructured":"Guansong Pang Longbing Cao and Ling Chen. 2016. Outlier Detection in Complex Categorical Data by Modeling the Feature Value Couplings.. In IJCAI.  Guansong Pang Longbing Cao and Ling Chen. 2016. Outlier Detection in Complex Categorical Data by Modeling the Feature Value Couplings.. In IJCAI."},{"volume-title":"Spam filtering in twitter using sender-receiver relationship","author":"Song Jonghyuk","key":"e_1_3_2_1_16_1","unstructured":"Jonghyuk Song , Sangho Lee , and Jong Kim . 2011. Spam filtering in twitter using sender-receiver relationship . In RAID. Springer . Jonghyuk Song, Sangho Lee, and Jong Kim. 2011. Spam filtering in twitter using sender-receiver relationship. In RAID. Springer."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Gianluca Stringhini Wang Gang Manuel Egele and etal 2013. Follow the green: growth and dynamics in twitter follower markets. In IMC.  Gianluca Stringhini Wang Gang Manuel Egele and et al. 2013. Follow the green: growth and dynamics in twitter follower markets. In IMC.","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Gianluca Stringhini and Olivier Thonnard. 2015. That Ain't You: Blocking Spearphishing Through Behavioral Modelling. In DIMVA.  Gianluca Stringhini and Olivier Thonnard. 2015. That Ain't You: Blocking Spearphishing Through Behavioral Modelling. In DIMVA.","DOI":"10.1007\/978-3-319-20550-2_5"},{"volume-title":"Design and evaluation of a real-time url spam filtering service","author":"Thomas Kurt","key":"e_1_3_2_1_19_1","unstructured":"Kurt Thomas , Chris Grier , Justin Ma , Vern Paxson , and Dawn Song . 2011. Design and evaluation of a real-time url spam filtering service . In IEEE S & P. Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. 2011. Design and evaluation of a real-time url spam filtering service. In IEEE S & P."},{"key":"e_1_3_2_1_20_1","unstructured":"Kurt Thomas Damon McCoy Chris Grier Alek Kolcz and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Usenix Security.  Kurt Thomas Damon McCoy Chris Grier Alek Kolcz and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Usenix Security."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Bimal Viswanath Ansley Post Krishna P Gummadi and Alan Mislove. 2011. An analysis of social network-based sybil defenses. In SIGCOMM.  Bimal Viswanath Ansley Post Krishna P Gummadi and Alan Mislove. 2011. An analysis of social network-based sybil defenses. In SIGCOMM.","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_22_1","unstructured":"Alex Hai Wang. 2010. Don't follow me: Spam detection in twitter. In SECRYPT.  Alex Hai Wang. 2010. Don't follow me: Spam detection in twitter. In SECRYPT."},{"key":"e_1_3_2_1_23_1","volume-title":"Neil Zhenqiang Gong, and Hao Fu","author":"Wang Binghui","year":"2017","unstructured":"Binghui Wang , Neil Zhenqiang Gong, and Hao Fu . 2017 a. GANG : Detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In ICDM. Binghui Wang, Neil Zhenqiang Gong, and Hao Fu. 2017a. GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In ICDM."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Jinyuan Jia and Neil Zhenqiang Gong. 2019 a. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. In NDSS.  Binghui Wang Jinyuan Jia and Neil Zhenqiang Gong. 2019 a. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. In NDSS.","DOI":"10.14722\/ndss.2019.23226"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Jinyuan Jia and Neil Zhenqiang Gong. 2021. Semi-Supervised Node Classification on Graphs: Markov Random Fields vs. Graph Neural Networks. In AAAI.  Binghui Wang Jinyuan Jia and Neil Zhenqiang Gong. 2021. Semi-Supervised Node Classification on Graphs: Markov Random Fields vs. Graph Neural Networks. In AAAI.","DOI":"10.1609\/aaai.v35i11.17211"},{"key":"e_1_3_2_1_26_1","volume-title":"2019 b. Structure-based sybil detection in social networks via local rule-based propagation","author":"Wang Binghui","year":"2019","unstructured":"Binghui Wang , Jinyuan Jia , Le Zhang , and Neil Zhenqiang Gong . 2019 b. Structure-based sybil detection in social networks via local rule-based propagation . IEEE TNSE ( 2019 ). Binghui Wang, Jinyuan Jia, Le Zhang, and Neil Zhenqiang Gong. 2019 b. Structure-based sybil detection in social networks via local rule-based propagation. IEEE TNSE (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Le Zhang and Neil Zhenqiang Gong. 2017b. SybilSCAR: Sybil detection in online social networks via local rule based propagation. In INFOCOM.  Binghui Wang Le Zhang and Neil Zhenqiang Gong. 2017b. SybilSCAR: Sybil detection in online social networks via local rule based propagation. In INFOCOM.","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_1_28_1","volume-title":"Sybilblind: Detecting fake users in online social networks without manual labels. In RAID.","author":"Wang Binghui","year":"2018","unstructured":"Binghui Wang , Le Zhang , and Neil Zhenqiang Gong . 2018 . Sybilblind: Detecting fake users in online social networks without manual labels. In RAID. Binghui Wang, Le Zhang, and Neil Zhenqiang Gong. 2018. Sybilblind: Detecting fake users in online social networks without manual labels. In RAID."},{"key":"e_1_3_2_1_29_1","unstructured":"Gang Wang Manish Mohanlal Christo Wilson Xiao Wang Miriam Metzger Haitao Zheng and Ben Y Zhao. 2013. Social turing tests: Crowdsourcing sybil detection. In NDSS.  Gang Wang Manish Mohanlal Christo Wilson Xiao Wang Miriam Metzger Haitao Zheng and Ben Y Zhao. 2013. Social turing tests: Crowdsourcing sybil detection. In NDSS."},{"key":"e_1_3_2_1_30_1","volume-title":"Votetrust: Leveraging friend invitation graph to defend against social network sybils. In INFOCOM.","author":"Xue Jilong","year":"2013","unstructured":"Jilong Xue , Zhi Yang , Xiaoyong Yang , Xiao Wang , Lijiang Chen , and Yafei Dai . 2013 . Votetrust: Leveraging friend invitation graph to defend against social network sybils. In INFOCOM. Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, and Yafei Dai. 2013. Votetrust: Leveraging friend invitation graph to defend against social network sybils. In INFOCOM."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin and Guofei Gu. 2012. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In WWW.  Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin and Guofei Gu. 2012. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In WWW.","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_32_1","volume-title":"Uncovering social network sybils in the wild. ACM TKDD","author":"Yang Zhi","year":"2014","unstructured":"Zhi Yang , Christo Wilson , Xiao Wang , Tingting Gao , Ben Y Zhao , and Yafei Dai . 2014. Uncovering social network sybils in the wild. ACM TKDD ( 2014 ). Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM TKDD (2014)."},{"key":"e_1_3_2_1_33_1","volume-title":"Sybillimit: A near-optimal social network defense against sybil attacks","author":"Yu Haifeng","year":"2008","unstructured":"Haifeng Yu , Phillip B Gibbons , Michael Kaminsky , and Feng Xiao . 2008 . Sybillimit: A near-optimal social network defense against sybil attacks . In IEEE S & P. Haifeng Yu, Phillip B Gibbons, Michael Kaminsky, and Feng Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE S & P."},{"key":"e_1_3_2_1_34_1","unstructured":"Haifeng Yu Michael Kaminsky Phillip B Gibbons and Abraham Flaxman. 2006. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM.  Haifeng Yu Michael Kaminsky Phillip B Gibbons and Abraham Flaxman. 2006. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM."},{"key":"e_1_3_2_1_35_1","volume-title":"Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang.","author":"Yuan Dong","year":"2019","unstructured":"Dong Yuan , Yuanli Miao , Neil Zhenqiang Gong , Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. 2019 . Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In CCS. Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. 2019. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In CCS."}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Virtual Event Singapore","acronym":"KDD '21"},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:04Z","timestamp":1750195684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":35,"alternative-id":["10.1145\/3447548.3467094","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467094","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}