{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:39Z","timestamp":1755907719419,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3488013","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"297-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks"],"prefix":"10.1145","author":[{"given":"Zijie","family":"Yang","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, USA"}]},{"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Dong","family":"Yuan","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Zhuotao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, USA"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Berkeley, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Xiao","family":"Liang","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]},{"given":"Shaofeng","family":"Hu","sequence":"additional","affiliation":[{"name":"Tencent Inc., China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sok: The evolution of sybil defense via social networks","author":"Alvisi Lorenzo","year":"2013","unstructured":"Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi. 2013. Sok: The evolution of sybil defense via social networks. In IEEE S&P."},{"key":"e_1_3_2_1_2_1","volume-title":"Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment","author":"Blondel D","year":"2008","unstructured":"Vincent\u00a0D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment (2008)."},{"key":"e_1_3_2_1_3_1","volume-title":"Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. In NDSS.","author":"Boshmaf Yazan","year":"2015","unstructured":"Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Ler\u00eda, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov. 2015. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. In NDSS."},{"key":"e_1_3_2_1_4_1","unstructured":"Zhuhua Cai and Christopher Jermaine. 2012. The latent community model for detecting sybil attacks in social networks. In NDSS."},{"key":"e_1_3_2_1_5_1","unstructured":"Qiang Cao Michael Sirivianos Xiaowei Yang and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In NSDI."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In ACM CCS.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_7_1","volume-title":"Sybilinfer: Detecting sybil nodes using social networks. In NDSS.","author":"Danezis George","year":"2009","unstructured":"George Danezis and Prateek Mittal. 2009. Sybilinfer: Detecting sybil nodes using social networks. In NDSS."},{"key":"e_1_3_2_1_8_1","volume-title":"Towards detecting compromised accounts on social networks","author":"Egele Manuel","year":"2015","unstructured":"Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2015. Towards detecting compromised accounts on social networks. IEEE TDSC (2015)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"David Freeman Sakshi Jain Markus D\u00fcrmuth Battista Biggio and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS.","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_1_10_1","article-title":"Robust spammer detection in microblogs: Leveraging user carefulness","volume":"8","author":"Fu Hao","year":"2017","unstructured":"Hao Fu, Xing Xie, Yong Rui, Neil\u00a0Zhenqiang Gong, Guangzhong Sun, and Enhong Chen. 2017. Robust spammer detection in microblogs: Leveraging user carefulness. ACM Transactions on Intelligent Systems and Technology (TIST) 8, 6(2017).","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_11_1","unstructured":"Hongyu Gao Jun Hu Christo Wilson Zhichun Li Yan Chen and Ben\u00a0Y Zhao. 2010. Detecting and characterizing social spam campaigns. In ACM SIGCOMM."},{"key":"e_1_3_2_1_12_1","volume-title":"Sybilfuse: Combining local attributes with global structure to perform robust sybil detection","author":"Gao Peng","year":"2018","unstructured":"Peng Gao, Binghui Wang, Neil\u00a0Zhenqiang Gong, Sanjeev\u00a0R Kulkarni, Kurt Thomas, and Prateek Mittal. 2018. Sybilfuse: Combining local attributes with global structure to perform robust sybil detection. In IEEE CNS."},{"key":"e_1_3_2_1_13_1","volume-title":"Sybilbelief: A semi-supervised learning approach for structure-based sybil detection","author":"Gong Neil\u00a0Zhenqiang","year":"2014","unstructured":"Neil\u00a0Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. Sybilbelief: A semi-supervised learning approach for structure-based sybil detection. IEEE TIFS (2014)."},{"volume-title":"Random walk based fake account detection in online social networks","author":"Jia Jinyuan","key":"e_1_3_2_1_14_1","unstructured":"Jinyuan Jia, Binghui Wang, and Neil\u00a0Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In IEEE DSN."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Anna Leontjeva Moises Goldszmidt Yinglian Xie Fang Yu and Mart\u00edn Abadi. 2013. Early security classification of skype users via machine learning. In ACM AIsec.","DOI":"10.1145\/2517312.2517322"},{"key":"e_1_3_2_1_16_1","unstructured":"Changchang Liu Peng Gao Matthew Wright and Prateek Mittal. 2015. Exploiting temporal dynamics in sybil defenses. In ACM CCS."},{"volume-title":"Keep your friends close: Incorporating trust into social network-based sybil defenses","author":"Mohaisen Abedelaziz","key":"e_1_3_2_1_17_1","unstructured":"Abedelaziz Mohaisen, Nicholas Hopper, and Yongdae Kim. 2011. Keep your friends close: Incorporating trust into social network-based sybil defenses. In IEEE INFOCOM."},{"key":"e_1_3_2_1_18_1","unstructured":"Jia-Yu Pan Hyung-Jeong Yang Christos Faloutsos and Pinar Duygulu. 2004. Automatic multimedia cross-modal correlation discovery. In ACM SIGKDD."},{"volume-title":"Spam filtering in twitter using sender-receiver relationship","author":"Song Jonghyuk","key":"e_1_3_2_1_19_1","unstructured":"Jonghyuk Song, Sangho Lee, and Jong Kim. 2011. Spam filtering in twitter using sender-receiver relationship. In RAID. Springer."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Gianluca Stringhini Christopher Kruegel and Giovanni Vigna. 2010. Detecting spammers on social networks. In ACSAC.","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_21_1","unstructured":"Gianluca Stringhini Pierre Mourlanne Gregoire Jacob Manuel Egele Christopher Kruegel and Giovanni Vigna. 2015. {EVILCOHORT}: Detecting Communities of Malicious Accounts on Online Services. In USENIX Security."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Kurt Thomas Frank Li Chris Grier and Vern Paxson. 2014. Consequences of connectivity: Characterizing account hijacking on twitter. In ACM CCS.","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Bimal Viswanath Ansley Post Krishna\u00a0P Gummadi and Alan Mislove. 2010. An analysis of social network-based sybil defenses. In ACM SIGCOMM. ACM.","DOI":"10.1145\/1851182.1851226"},{"volume-title":"Don\u2019t follow me: Spam detection in twitter","author":"Wang Alex\u00a0Hai","key":"e_1_3_2_1_24_1","unstructured":"Alex\u00a0Hai Wang. 2010. Don\u2019t follow me: Spam detection in twitter. In SECRYPT. IEEE."},{"key":"e_1_3_2_1_25_1","volume-title":"GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs","author":"Wang Binghui","year":"2017","unstructured":"Binghui Wang, Neil\u00a0Zhenqiang Gong, and Hao Fu. 2017. GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In IEEE ICDM."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2019. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. In NDSS.","DOI":"10.14722\/ndss.2019.23226"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17211"},{"volume-title":"SybilSCAR: Sybil detection in online social networks via local rule based propagation","author":"Wang Binghui","key":"e_1_3_2_1_28_1","unstructured":"Binghui Wang, Le Zhang, and Neil\u00a0Zhenqiang Gong. 2017. SybilSCAR: Sybil detection in online social networks via local rule based propagation. In IEEE INFOCOM."},{"key":"e_1_3_2_1_29_1","unstructured":"Gang Wang Tristan Konolige Christo Wilson Xiao Wang Haitao Zheng and Ben\u00a0Y Zhao. 2013. You are how you click: Clickstream analysis for sybil detection. In USENIX Security."},{"key":"e_1_3_2_1_30_1","unstructured":"Zenghua Xia Chang Liu Neil\u00a0Zhenqiang Gong Qi Li Yong Cui and Dawn Song. 2019. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study. In ACM SIGKDD."},{"key":"e_1_3_2_1_31_1","unstructured":"Yinglian Xie Fang Yu Qifa Ke Martin Abadi Eliot Gillum Krish Vitaldevaria Jason Walter Junxian Huang and Zhuoqing\u00a0Morley Mao. 2012. Innocent by association: early recognition of legitimate users. In ACM CCS."},{"key":"e_1_3_2_1_32_1","volume-title":"Votetrust: Leveraging friend invitation graph to defend against social network sybils","author":"Xue Jilong","year":"2013","unstructured":"Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, and Yafei Dai. 2013. Votetrust: Leveraging friend invitation graph to defend against social network sybils. In IEEE INFOCOM."},{"volume-title":"Analyzing spammers","author":"Yang Chao","key":"e_1_3_2_1_33_1","unstructured":"Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In WWW. ACM."},{"volume-title":"Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers","author":"Yang Chao","key":"e_1_3_2_1_34_1","unstructured":"Chao Yang, Robert\u00a0Chandler Harkreader, and Guofei Gu. 2011. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In RAID. Springer."},{"key":"e_1_3_2_1_35_1","volume-title":"Uncovering social network sybils in the wild. ACM TKDD","author":"Yang Zhi","year":"2014","unstructured":"Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben\u00a0Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM TKDD (2014)."},{"key":"e_1_3_2_1_36_1","volume-title":"Sybillimit: A near-optimal social network defense against sybil attacks","author":"Yu Haifeng","year":"2008","unstructured":"Haifeng Yu, Phillip\u00a0B Gibbons, Michael Kaminsky, and Feng Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE S & P. IEEE."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Dong Yuan Yuanli Miao Neil\u00a0Zhenqiang Gong Zheng Yang Qi Li Dawn Song Qian Wang and Xiao Liang. 2019. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In CCS.","DOI":"10.1145\/3319535.3363198"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Haizhong Zheng Minhui Xue Hao Lu Shuang Hao Haojin Zhu Xiaohui Liang and Keith Ross. 2018. Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks. In NDSS.","DOI":"10.14722\/ndss.2018.23009"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","acronym":"ACSAC '21","location":"Virtual Event USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3488013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3488013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:18:44Z","timestamp":1755890324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3488013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":38,"alternative-id":["10.1145\/3485832.3488013","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3488013","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}