{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:53:46Z","timestamp":1776394426344,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,25]]},"DOI":"10.1145\/3465336.3475108","type":"proceedings-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:11:41Z","timestamp":1629925901000},"page":"91-100","source":"Crossref","is-referenced-by-count":4,"title":["DECIFE: Detecting Collusive Users Involved in Blackmarket Following Services on Twitter"],"prefix":"10.1145","author":[{"given":"Hridoy Sankar","family":"Dutta","sequence":"first","affiliation":[{"name":"Indraprastha Institute of Information Technology Delhi, New Delhi, India"}]},{"given":"Kartik","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology Delhi, New Delhi, India"}]},{"given":"Tanmoy","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology Delhi, New Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2021,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Anupama Aggarwal Saravana Kumar Kushagra Bhargava and Ponnurangam Kumaraguru. 2018. The follower count fallacy: detecting Twitter users with manipulated follower count. In SAC. ACM 1748--1755.  Anupama Aggarwal Saravana Kumar Kushagra Bhargava and Ponnurangam Kumaraguru. 2018. The follower count fallacy: detecting Twitter users with manipulated follower count. In SAC. ACM 1748--1755.","DOI":"10.1145\/3167132.3167318"},{"key":"e_1_3_2_1_2_1","volume-title":"What they do in shadows: Twitter underground follower market","author":"Aggarwal Anupama"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3380537","article-title":"Analyzing and Detecting Collusive Users Involved in Blackmarket Retweeting Activities","volume":"11","author":"Arora Udit","year":"2020","journal-title":"ACM TIST"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00288"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jacopo Castellini Valentina Poggioni and Giulia Sorbi. 2017. Fake Twitter Followers Detection by Denoising Autoencoder. In WI. 195--202.  Jacopo Castellini Valentina Poggioni and Giulia Sorbi. 2017. Fake Twitter Followers Detection by Denoising Autoencoder. In WI. 195--202.","DOI":"10.1145\/3106426.3106489"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. ACM, 330--338","author":"Chetan Aditya","year":"2019"},{"key":"e_1_3_2_1_7_1","volume-title":"Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi.","author":"Cresci Stefano","year":"2014"},{"key":"e_1_3_2_1_8_1","volume-title":"Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi.","author":"Cresci Stefano","year":"2015"},{"key":"e_1_3_2_1_9_1","volume-title":"11th Nexa Lunch Seminar","volume":"22","author":"Micheli Carlo De","year":"2013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"1935","DOI":"10.1109\/TIFS.2019.2953331","article-title":"Blackmarket-Driven Collusion Among Retweeters--Analysis, Detection, and Characterization","volume":"15","author":"Dutta Hridoy Sankar","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_11_1","volume-title":"Blackmarket-driven collusion on online media: a survey. arXiv preprint arXiv:2008.13102","author":"Dutta Hridoy Sankar","year":"2020"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508801"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2970601"},{"key":"e_1_3_2_1_14_1","volume-title":"2020 b. Detecting and analyzing collusive entities on YouTube. arxiv:2005.06243","author":"Dutta Hridoy Sankar","year":"2020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Shehroze Farooqi Fareed Zaffar Nektarios Leontiadis and Zubair Shafiq. 2017. Measuring and mitigating oauth access token abuse by collusion networks. In IMC. 355--368.  Shehroze Farooqi Fareed Zaffar Nektarios Leontiadis and Zubair Shafiq. 2017. Measuring and mitigating oauth access token abuse by collusion networks. In IMC. 355--368.","DOI":"10.1145\/3131365.3131404"},{"key":"e_1_3_2_1_16_1","volume-title":"The Rise of Social Bots. Commun. ACM","author":"Ferrara Emilio","year":"2016"},{"key":"e_1_3_2_1_17_1","unstructured":"Meng Jiang Peng Cui Alex Beutel Christos Faloutsos and Shiqiang Yang. 2014. Catchsync: catching synchronized behavior in large directed graphs. In ACM SIGKDD .  Meng Jiang Peng Cui Alex Beutel Christos Faloutsos and Shiqiang Yang. 2014. Catchsync: catching synchronized behavior in large directed graphs. In ACM SIGKDD ."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1091--1100","author":"Kwak Haewoon","year":"2011"},{"key":"e_1_3_2_1_19_1","volume-title":"Who will retweet this? detecting strangers from twitter to retweet information. ACM TIST","year":"2015"},{"key":"e_1_3_2_1_20_1","volume-title":"Detecting Campaign Promoters on Twitter Using Markov Random Fields (ICDM '14)","author":"Li Huayi","year":"2014"},{"key":"e_1_3_2_1_21_1","unstructured":"Yuli Liu Yiqun Liu Min Zhang and Shaoping Ma. 2016. Pay Me and I'll Follow You: Detection of Crowdturfing Following Activities in Microblog Environment.. In IJCAI .  Yuli Liu Yiqun Liu Min Zhang and Shaoping Ma. 2016. Pay Me and I'll Follow You: Detection of Crowdturfing Following Activities in Microblog Environment.. In IJCAI ."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the ACL 2012 system demonstrations. 25--30","author":"Lui Marco","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","volume-title":"Detection of fake Twitter followers using graph centrality measures","author":"Mehrotra Ashish","DOI":"10.1109\/IC3I.2016.7918016"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Marti Motoyama Damon McCoy Kirill Levchenko Stefan Savage and Geoffrey M Voelker. 2011. An analysis of underground forums. In ACM SIGCOMM. ACM 71--80.  Marti Motoyama Damon McCoy Kirill Levchenko Stefan Savage and Geoffrey M Voelker. 2011. An analysis of underground forums. In ACM SIGCOMM. ACM 71--80.","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_1_25_1","volume-title":"International conference on machine learning. 4393--4402","author":"Ruff Lukas","year":"2018"},{"key":"e_1_3_2_1_26_1","volume-title":"Spotting suspicious link behavior with fbox: An adversarial perspective","author":"Shah Neil"},{"key":"e_1_3_2_1_27_1","volume-title":"The Many Faces of Link Fraud","author":"Shah Neil"},{"key":"e_1_3_2_1_28_1","volume-title":"Detecting Spammers on Twitter Based on Content and Social Interaction. In 2015 International Conference on Network and Information Systems for Computers. 413--417","author":"Shen H."},{"key":"e_1_3_2_1_29_1","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 596--607","author":"Shen Yi","year":"2014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2016.1237227"},{"key":"e_1_3_2_1_31_1","volume-title":"Crowdtarget: Target-based detection of crowdturfing in online social networks. In ACM SIGSAC. 793--804.","author":"Song Jonghyuk","year":"2015"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377781"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2013 conference on Internet measurement conference. 163--176","author":"Stringhini Gianluca","year":"2013"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481248"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Symposium. 195--210","author":"Thomas Kurt","year":"2013"},{"key":"e_1_3_2_1_36_1","unstructured":"Minjie Wang Lingfan Yu Da Zheng Quan Gan Yu Gai Zihao Ye Mufei Li Jinjing Zhou Qi Huang Chao Ma etal 2019. Deep Graph Library: Towards Efficient and Scalable Deep Learning on Graphs. (2019).  Minjie Wang Lingfan Yu Da Zheng Quan Gan Yu Gai Zihao Ye Mufei Li Jinjing Zhou Qi Huang Chao Ma et al. 2019. Deep Graph Library: Towards Efficient and Scalable Deep Learning on Graphs. (2019)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Janith Weerasinghe Bailey Flanigan Aviel Stein Damon McCoy and Rachel Greenstadt. 2020. The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. In The WebConf. 1874--1884.  Janith Weerasinghe Bailey Flanigan Aviel Stein Damon McCoy and Rachel Greenstadt. 2020. The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. In The WebConf. 1874--1884.","DOI":"10.1145\/3366423.3380256"},{"key":"e_1_3_2_1_38_1","unstructured":"Jamaal Hay Wenpeng Yin and Dan Roth. 2019. Benchmarking Zero-shot Text Classification: Datasets Evaluation and Entailment Approach. In EMNLP. https:\/\/arxiv.org\/abs\/1909.00161  Jamaal Hay Wenpeng Yin and Dan Roth. 2019. Benchmarking Zero-shot Text Classification: Datasets Evaluation and Entailment Approach. In EMNLP. https:\/\/arxiv.org\/abs\/1909.00161"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s13278-016-0324-2","article-title":"Discover millions of fake followers in Weibo","volume":"6","author":"Zhang Yi","year":"2016","journal-title":"Social Network Analysis and Mining"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","volume-title":"Detection of zombie followers in SINA Weibo","author":"Zhang Zhedi","DOI":"10.1109\/CompComm.2016.7925144"},{"key":"e_1_3_2_1_41_1","volume-title":"A New Approach to Detect User Collusion Behavior in Online QA System","author":"Zhi Yang"}],"event":{"name":"HT '21: 32nd ACM Conference on Hypertext and Social Media","location":"Virtual Event USA","acronym":"HT '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 32st ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":41,"alternative-id":["10.1145\/3465336.3475108","10.1145\/3465336"],"URL":"https:\/\/doi.org\/10.1145\/3465336.3475108","relation":{},"subject":[],"published":{"date-parts":[[2021,8,25]]}}}