{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T16:09:19Z","timestamp":1774886959707,"version":"3.50.1"},"reference-count":153,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ramanujan Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM\/IMS Trans. Data Sci."],"published-print":{"date-parts":[[2021,11,30]]},"abstract":"<jats:p>Online media platforms have enabled users to connect with individuals and organizations, and share their thoughts. Other than connectivity, these platforms also serve multiple purposes, such as education, promotion, updates, and awareness. Increasing, the reputation of individuals in online media (aka<jats:italic>social reputation<\/jats:italic>) is thus essential these days, particularly for business owners and event managers who are looking to improve their publicity and sales. The natural way of gaining social reputation is a tedious task, which leads to the creation of unfair ways to boost the reputation of individuals artificially. Several online blackmarket services have developed a thriving ecosystem with lucrative offers to attract content promoters for publicizing their content online. These services are operated in such a way that most of their inorganic activities are going unnoticed by the media authorities, and the customers of the blackmarket services are less likely to be spotted. We refer to such unfair ways of bolstering social reputation in online media as<jats:italic>collusion<\/jats:italic>. This survey is the first attempt to provide readers a comprehensive outline of the latest studies dealing with the identification and analysis of blackmarket-driven collusion in online media. We present a broad overview of the problem, definitions of the related problems and concepts, the taxonomy of the proposed approaches, and a description of the publicly available datasets and online tools, and we discuss the outstanding issues. We believe that collusive entity detection is a newly emerging topic in anomaly detection and cyber-security research in general, and the current survey will provide readers with an easy-to-access and comprehensive list of methods, tools, and resources proposed so far for detecting and analyzing collusive entities on online media.<\/jats:p>","DOI":"10.1145\/3517931","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T13:52:21Z","timestamp":1652795541000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Blackmarket-Driven Collusion on Online Media: A Survey"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4254-8299","authenticated-orcid":false,"given":"Hridoy Sankar","family":"Dutta","sequence":"first","affiliation":[{"name":"IIIT Delhi"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0210-0369","authenticated-orcid":false,"given":"Tanmoy","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"IIIT Delhi"}]}],"member":"320","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"e_1_3_2_2_2","article-title":"Identifying fake profiles in LinkedIn","author":"Adikari Shalinda","year":"2020","unstructured":"Shalinda Adikari and Kaushik Dutta. 2020. Identifying fake profiles in LinkedIn. arXiv preprint arXiv:2006.01381 (2020).","journal-title":"arXiv preprint arXiv:2006.01381"},{"key":"e_1_3_2_3_2","article-title":"The follower count fallacy: Detecting Twitter users with manipulated follower count","author":"Aggarwal Anupama","year":"2018","unstructured":"Anupama Aggarwal, Saravana Kumar, Kushagra Bhargava, and Ponnurangam Kumaraguru. 2018. The follower count fallacy: Detecting Twitter users with manipulated follower count. arXiv preprint arXiv:1802.03625 (2018).","journal-title":"arXiv preprint arXiv:1802.03625"},{"key":"e_1_3_2_4_2","article-title":"Followers or phantoms? An anatomy of purchased Twitter followers","author":"Aggarwal Anupama","year":"2014","unstructured":"Anupama Aggarwal and Ponnurangam Kumaraguru. 2014. Followers or phantoms? An anatomy of purchased Twitter followers. arXiv preprint arXiv:1408.1534 (2014).","journal-title":"arXiv preprint arXiv:1408.1534"},{"key":"e_1_3_2_5_2","first-page":"1","volume-title":"Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics, and Mobile Communication Conference (IEMCON\u201916)","author":"Ahsan M. N. Istiaq","year":"2016","unstructured":"M. N. Istiaq Ahsan, Tamzid Nahian, Abdullah All Kafi, Md. Ismail Hossain, and Faisal Muhammad Shah. 2016. Review spam detection using active learning. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics, and Mobile Communication Conference (IEMCON\u201916). IEEE, Los Alamitos, CA, 1\u20137."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"issue":"2","key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1080\/08934210802381862","article-title":"The language of truthful and deceptive denials and confessions","volume":"21","author":"Ali Mohammed","year":"2008","unstructured":"Mohammed Ali and Timothy Levine. 2008. The language of truthful and deceptive denials and confessions. Communication Reports 21, 2 (2008), 82\u201391.","journal-title":"Communication Reports"},{"issue":"1","key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/s13278-015-0273-1","article-title":"Deception detection in Twitter","volume":"5","author":"Alowibdi Jalal S.","year":"2015","unstructured":"Jalal S. Alowibdi, Ugo A. Buy, S. Yu Philip, Sohaib Ghani, and Mohamed Mokbel. 2015. Deception detection in Twitter. Social Network Analysis and Mining 5, 1 (2015), 32.","journal-title":"Social Network Analysis and Mining"},{"key":"e_1_3_2_9_2","first-page":"24","article-title":"Analyzing and detecting collusive users involved in blackmarket retweeting activities","volume":"11","author":"Arora Udit","year":"2020","unstructured":"Udit Arora, Hridoy Sankar Dutta, Brihi Joshi, Aditya Chetan, and Tanmoy Chakraborty. 2020. Analyzing and detecting collusive users involved in blackmarket retweeting activities. ACM Transactions on Intelligent Systems and Technology 11, 3 (April 2020), Article 35, 24 pages.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342934"},{"key":"e_1_3_2_11_2","article-title":"Towards automated Android app collusion detection","author":"Asavoae Irina Mariuca","year":"2016","unstructured":"Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, and Siraj Ahmed Shaikh. 2016. Towards automated Android app collusion detection. arXiv preprint arXiv:1603.02308 (2016).","journal-title":"arXiv preprint arXiv:1603.02308"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12017"},{"key":"e_1_3_2_13_2","first-page":"2365","volume-title":"Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM\u201916)","author":"Satya Prudhvi Ratna Badri","year":"2016","unstructured":"Prudhvi Ratna Badri Satya, Kyumin Lee, Dongwon Lee, Thanh Tran, and Jason Jiasheng Zhang. 2016. Uncovering fake likers in online social networks. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM\u201916). 2365\u20132370."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1935826.1935845","volume-title":"Proceedings of the 4th ACM International Conference on Web Search and Data Mining","author":"Bakshy Eytan","year":"2011","unstructured":"Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. 2011. Everyone\u2019s an influencer: Quantifying influence on Twitter. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining. ACM, New York, NY, 65\u201374."},{"key":"e_1_3_2_15_2","first-page":"12","volume-title":"Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS\u201910)","volume":"6","author":"Benevenuto Fabricio","year":"2010","unstructured":"Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on Twitter. In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS\u201910), Vol. 6. 12."},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/2488388.2488400","volume-title":"Proceedings of the 22nd International Conference on World Wide Web (WWW\u201913)","author":"Beutel Alex","year":"2013","unstructured":"Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. 2013. CopyCatch: Stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd International Conference on World Wide Web (WWW\u201913). ACM, New York, NY, 119\u2013130."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.002"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0296-4"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"key":"e_1_3_2_20_2","first-page":"18","volume-title":"Proceedings of the 5th International AAAI Conference on Weblogs and Social Media","author":"Brown Phil E.","year":"2011","unstructured":"Phil E. Brown and Junlan Feng. 2011. Measuring user influence on Twitter using modified k-shell decomposition. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media. 18\u201323."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217923"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/SmartCloud.2017.40","volume-title":"Proceedings of the 2017 IEEE International Conference on Smart Cloud (SmartCloud\u201917)","author":"Buntain Cody","year":"2017","unstructured":"Cody Buntain and Jennifer Golbeck. 2017. Automatically identifying fake news in popular Twitter threads. In Proceedings of the 2017 IEEE International Conference on Smart Cloud (SmartCloud\u201917). IEEE, Los Alamitos, CA, 208\u2013215."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004887"},{"key":"e_1_3_2_24_2","first-page":"184","volume-title":"Proceedings of the 2018 17th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918)","author":"Carman Mark","year":"2018","unstructured":"Mark Carman, Mark Koerber, Jiuyong Li, Kim-Kwang Raymond Choo, and Helen Ashman. 2018. Manipulating visibility of political and apolitical threads on Reddit via score boosting. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918). IEEE, Los Alamitos, CA, 184\u2013190."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106489"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1109\/ICDM.2016.0096","volume-title":"Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM\u201916)","author":"Chavoshi Nikan","year":"2016","unstructured":"Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter bot detection via warped correlation. In Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM\u201916). 817\u2013822."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3051114"},{"issue":"2","key":"e_1_3_2_28_2","first-page":"44","article-title":"Analysis and detection of fake views in online video services","volume":"11","author":"Chen Liang","year":"2015","unstructured":"Liang Chen, Yipeng Zhou, and Dah Ming Chiu. 2015. Analysis and detection of fake views in online video services. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 2s (2015), 44.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"e_1_3_2_30_2","first-page":"330","volume-title":"Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM\u201919)","author":"Chetan Aditya","year":"2019","unstructured":"Aditya Chetan, Brihi Joshi, Hridoy Sankar Dutta, and Tanmoy Chakraborty. 2019. CoReRank: Ranking to detect users involved in blackmarket-based collusive retweeting activities. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM\u201919). 330\u2013338."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"e_1_3_2_33_2","first-page":"1071","volume-title":"Proceedings of the 2012 International Conference on Advances in Social Networks Analysis, and Mining (ASONAM\u201912)","author":"Conti Mauro","year":"2012","unstructured":"Mauro Conti, Radha Poovendran, and Marco Secchiero. 2012. Fakebook: Detecting fake profiles in on-line social networks. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis, and Mining (ASONAM\u201912). IEEE, Los Alamitos, CA, 1071\u20131078."},{"issue":"1","key":"e_1_3_2_34_2","first-page":"58","article-title":"Twitter deception and influence: Issues of identity, slacktivism, and puppetry","volume":"13","author":"Cook David M.","year":"2014","unstructured":"David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman. 2014. Twitter deception and influence: Issues of identity, slacktivism, and puppetry. Journal of Information Warfare 13, 1 (2014), 58\u201371.","journal-title":"Journal of Information Warfare"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"e_1_3_2_37_2","first-page":"963","volume-title":"Proceedings of the 26th International Conference on World Wide Web Companion","author":"Cresci Stefano","year":"2017","unstructured":"Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th International Conference on World Wide Web Companion. 963\u2013972."},{"issue":"4","key":"e_1_3_2_38_2","first-page":"561","article-title":"Social fingerprinting: Detection of spambot groups through DNA-inspired behavioral modeling","volume":"15","author":"Cresci Stefano","year":"2017","unstructured":"Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. Social fingerprinting: Detection of spambot groups through DNA-inspired behavioral modeling. IEEE Transactions on Dependable and Secure Computing 15, 4 (2017), 561\u2013576.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.31"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/2663716.2663729","volume-title":"Proceedings of the 2014 Internet Measurement Conference (IMC\u201914)","author":"Cristofaro Emiliano De","year":"2014","unstructured":"Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, and M. Zubair Shafiq. 2014. Paying for likes? Understanding facebook like fraud using honeypots. In Proceedings of the 2014 Internet Measurement Conference (IMC\u201914). 129\u2013136."},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"e_1_3_2_43_2","volume-title":"Social Media: An Introduction","author":"Dewing Michael","year":"2010","unstructured":"Michael Dewing. 2010. Social Media: An Introduction. Vol. 1. Library of Parliament, Ottawa, Canada."},{"key":"e_1_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Sarthika Dhawan Siva Charan Reddy Gangireddy Shiv Kumar and Tanmoy Chakraborty. 2019. Spotting collective behaviour of online fraud groups in customer reviews. arXiv:1905.13649 (2019).","DOI":"10.24963\/ijcai.2019\/35"},{"key":"e_1_3_2_45_2","first-page":"620","volume-title":"Proceedings of the 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining","author":"Dickerson John P.","year":"2014","unstructured":"John P. Dickerson, Vadim Kagan, and V. S. Subrahmanian. 2014. Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? In Proceedings of the 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE, Los Alamitos, CA, 620\u2013627."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465336.3475108"},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Hridoy Sankar Dutta Udit Arora and Tanmoy Chakraborty. 2021. ABOME: A multi-platform data repository of artificially boosted online media entities. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201921) . 1000\u20131008. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/18123.","DOI":"10.1609\/icwsm.v15i1.18123"},{"key":"e_1_3_2_48_2","article-title":"Blackmarket-driven collusion among retweeters\u2014Analysis, detection and characterization","author":"Dutta Hridoy Sankar","year":"2019","unstructured":"Hridoy Sankar Dutta and Tanmoy Chakraborty. 2019. Blackmarket-driven collusion among retweeters\u2014Analysis, detection and characterization. IEEE Transactions on Information Forensics and Security PP, 99 (2019), 1.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_49_2","first-page":"242","volume-title":"Proceedings of the International Conference on Advances in Social Network Analysis and Mining (ASONAM\u201918)","author":"Dutta Hridoy Sankar","year":"2018","unstructured":"Hridoy Sankar Dutta, Aditya Chetan, Brihi Joshi, and Tanmoy Chakraborty. 2018. Retweet us, we will retweet you: Spotting collusive retweeters involved in blackmarket services. In Proceedings of the International Conference on Advances in Social Network Analysis and Mining (ASONAM\u201918). 242\u2013249."},{"key":"e_1_3_2_50_2","article-title":"HawkesEye: Detecting fake retweeters using Hawkes process and topic modeling","author":"Dutta Hridoy Sankar","year":"2020","unstructured":"Hridoy Sankar Dutta, Vishal Raj Dutta, Aditya Adhikary, and Tanmoy Chakraborty. 2020. HawkesEye: Detecting fake retweeters using Hawkes process and topic modeling. IEEE Transactions on Information Forensics and Security 15 (2020), 2667\u20132678.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_51_2","article-title":"Detecting and analyzing collusive entities on YouTube","author":"Dutta Hridoy Sankar","year":"2020","unstructured":"Hridoy Sankar Dutta, Mayank Jobanputra, Himani Negi, and Tanmoy Chakraborty. 2020. Detecting and analyzing collusive entities on YouTube. arXiv preprint arXiv:2005.06243 (2020).","journal-title":"arXiv preprint arXiv:2005.06243"},{"issue":"1","key":"e_1_3_2_52_2","first-page":"13","article-title":"Fake account detection in Twitter based on minimum weighted feature set","volume":"10","author":"Azab Ahmed El","year":"2016","unstructured":"Ahmed El Azab, Amira M Idrees, Mahmoud A. Mahmoud, and Hesham Hefny. 2016. Fake account detection in Twitter based on minimum weighted feature set. International Journal of Innovation Science and Research 10, 1 (2016), 13\u201318.","journal-title":"International Journal of Innovation Science and Research"},{"key":"e_1_3_2_53_2","volume-title":"Mining Anomalies Using Static and Dynamic Graphs","author":"Eswaran Dhivya","year":"2020","unstructured":"Dhivya Eswaran. 2020. Mining Anomalies Using Static and Dynamic Graphs. Ph.D. Dissertation. Carnegie Mellon University, Pittsburgh, PA."},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1109\/ICDM.2018.00117","volume-title":"Proceedings of the 2018 IEEE International Conference on Data Mining (ICDM\u201918)","author":"Eswaran Dhivya","year":"2018","unstructured":"Dhivya Eswaran and Christos Faloutsos. 2018. SedanSpot: Detecting anomalies in edge streams. In Proceedings of the 2018 IEEE International Conference on Data Mining (ICDM\u201918). IEEE, Los Alamitos, CA, 953\u2013958."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_57_2","unstructured":"Grace Gee and Hakson Teh. 2010. Twitter Spammer Profile Detection. Retrieved March 8 2022 from https:\/\/cs229.stanford.edu\/proj2010\/GeeTeh-TwitterSpammerProfileDetection.pdf."},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/978-3-319-18038-0_10","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Giatsoglou Maria","year":"2015","unstructured":"Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Retweeting activity on Twitter: Signs of deception. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 122\u2013134."},{"key":"e_1_3_2_59_2","first-page":"37","volume-title":"Proceedings of the 25th International Conference Companion on World Wide Web","author":"Gilani Zafar","year":"2016","unstructured":"Zafar Gilani, Liang Wang, Jon Crowcroft, Mario Almeida, and Reza Farahbakhsh. 2016. Stweeler: A framework for Twitter bot analysis. In Proceedings of the 25th International Conference Companion on World Wide Web. 37\u201338."},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1893"},{"key":"e_1_3_2_61_2","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-319-13734-6_16","volume-title":"Proceedings of the International Conference on Social Informatics","author":"Gupta Aditi","year":"2014","unstructured":"Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. TweetCred: Real-time credibility assessment of content on Twitter. In Proceedings of the International Conference on Social Informatics. 228\u2013243."},{"key":"e_1_3_2_62_2","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1145\/2487788.2488033","volume-title":"Proceedings of the 22nd International Conference on World Wide Web","author":"Gupta Aditi","year":"2013","unstructured":"Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 22nd International Conference on World Wide Web. ACM, New York, NY, 729\u2013736."},{"key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3297001.3297009","volume-title":"Proceedings of the ACM India Joint International Conference on Data Science and Management of Data (CODS-COMAD)","author":"Gupta Sonu","year":"2019","unstructured":"Sonu Gupta, Ponnurangam Kumaraguru, and Tanmoy Chakraborty. 2019. MalReG: Detecting and analyzing malicious retweeter groups. In Proceedings of the ACM India Joint International Conference on Data Science and Management of Data (CODS-COMAD). ACM, New York, NY, 61\u201369."},{"key":"e_1_3_2_64_2","first-page":"9","volume-title":"Proceedings of the 2015 International Conference on Social Media and Society","author":"Gurajala Supraja","year":"2015","unstructured":"Supraja Gurajala, Joshua S. White, Brian Hudson, and Jeanna N. Matthews. 2015. Fake Twitter accounts: Profile characteristics obtained using an activity-based pattern detection approach. In Proceedings of the 2015 International Conference on Social Media and Society. ACM, New York, NY, 9."},{"key":"e_1_3_2_65_2","first-page":"1","volume-title":"Proceedings of the 2014 International Conference on Data and Software Engineering (ICODSE\u201914)","author":"Hakim Man Aris Nur","year":"2014","unstructured":"Man Aris Nur Hakim and Masayu Leylia Khodra. 2014. Predicting information cascade on Twitter using support vector regression. In Proceedings of the 2014 International Conference on Data and Software Engineering (ICODSE\u201914). IEEE, Los Alamitos, CA, 1\u20136."},{"key":"e_1_3_2_66_2","doi-asserted-by":"crossref","DOI":"10.4135\/9781526484246","volume-title":"Understanding Social Media","author":"Hjorth Larissa","year":"2019","unstructured":"Larissa Hjorth and Sam Hinton. 2019. Understanding Social Media. SAGE Publications."},{"key":"e_1_3_2_67_2","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1137\/1.9781611974348.56","volume-title":"Proceedings of the 2016 SIAM International Conference on Data Mining","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi, Neil Shah, Alex Beutel, Stephan G\u00fcnnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. BIRDNEST: Bayesian inference for ratings-fraud detection. In Proceedings of the 2016 SIAM International Conference on Data Mining. 495\u2013503."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.05.002"},{"issue":"4","key":"e_1_3_2_69_2","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/e22040450","article-title":"Identifying influencers in social networks","volume":"22","author":"Huang Xinyu","year":"2020","unstructured":"Xinyu Huang, Dongming Chen, Dongqi Wang, and Tao Ren. 2020. Identifying influencers in social networks. Entropy 22, 4 (2020), 450.","journal-title":"Entropy"},{"key":"e_1_3_2_70_2","article-title":"Lexical analysis of automated accounts on Twitter","author":"Inuwa-Dutse Isa","year":"2018","unstructured":"Isa Inuwa-Dutse, Bello Shehu Bello, and Ioannis Korkontzelos. 2018. Lexical analysis of automated accounts on Twitter. arXiv preprint arXiv:1812.07947 (2018).","journal-title":"arXiv preprint arXiv:1812.07947"},{"key":"e_1_3_2_71_2","first-page":"141","volume-title":"Proceedings of the 12th International AAAI Conference on Web and Social Media","author":"Jaidka Kokil","year":"2018","unstructured":"Kokil Jaidka, Sharath Chandra Guntuku, Anneke Buffone, H. Andrew Schwartz, and Lyle H. Ungar. 2018. Facebook vs. Twitter: Cross-platform differences in self-disclosure and trait prediction. In Proceedings of the 12th International AAAI Conference on Web and Social Media. 141\u2013150."},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2018.12.001"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.01.014"},{"key":"e_1_3_2_74_2","first-page":"8","volume-title":"Proceedings of the 7th Workshop on Social Network Mining and Analysis","author":"Jin Fang","year":"2013","unstructured":"Fang Jin, Edward Dougherty, Parang Saraf, Yang Cao, and Naren Ramakrishnan. 2013. Epidemiological modeling of news and rumors on Twitter. In Proceedings of the 7th Workshop on Social Network Mining and Analysis. ACM, New York, NY, 8."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0296-1"},{"key":"e_1_3_2_77_2","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/UBMK.2017.8093483","volume-title":"Proceedings of the 2017 International Conference on Computer Science and Engineering (UBMK\u201917)","author":"Kantepe M\u00fccahit","year":"2017","unstructured":"M\u00fccahit Kantepe and Murat Can Ganiz. 2017. Preprocessing framework for Twitter bot detection. In Proceedings of the 2017 International Conference on Computer Science and Engineering (UBMK\u201917). IEEE, Los Alamitos, CA, 630\u2013634."},{"key":"e_1_3_2_78_2","first-page":"324","volume-title":"Proceedings of the 11th ACM International Conference on Web Search and Data Mining","author":"Kim Jooyeon","year":"2018","unstructured":"Jooyeon Kim, Behzad Tabibian, Alice Oh, Bernhard Sch\u00f6lkopf, and Manuel Gomez-Rodriguez. 2018. Leveraging the crowd to detect and reduce the spread of fake news and misinformation. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining. 324\u2013332."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"e_1_3_2_80_2","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1145\/3038912.3052677","volume-title":"Proceedings of the 26th International Conference on World Wide Web","author":"Kumar Srijan","year":"2017","unstructured":"Srijan Kumar, Justin Cheng, Jure Leskovec, and V. S. Subrahmanian. 2017. An army of me: Sockpuppets in online discussion communities. In Proceedings of the 26th International Conference on World Wide Web. 857\u2013866."},{"key":"e_1_3_2_81_2","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1145\/3038912.3052677","volume-title":"Proceedings of the 26th International Conference on World Wide Web","author":"Kumar Srijan","year":"2017","unstructured":"Srijan Kumar, Justin Cheng, Jure Leskovec, and V. S. Subrahmanian. 2017. An army of me: Sockpuppets in online discussion communities. In Proceedings of the 26th International Conference on World Wide Web. 857\u2013866."},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","unstructured":"Srijan Kumar Bryan Hooi Disha Makhija Mohit Kumar Christos Faloutsos and V. S. Subrahmanian. 2018. REV2: Fraudulent user prediction in rating platforms. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining (WSDM\u201918) . 333\u2013341.","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_2_83_2","article-title":"False information on web and social media: A survey","author":"Kumar Srijan","year":"2018","unstructured":"Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. arXiv preprint arXiv:1804.08559 (2018).","journal-title":"arXiv preprint arXiv:1804.08559"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398634"},{"issue":"2","key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1111\/j.1475-679X.2012.00450.x","article-title":"Detecting deceptive discussions in conference calls","volume":"50","author":"Larcker David F.","year":"2012","unstructured":"David F. Larcker and Anastasia A. Zakolyukina. 2012. Detecting deceptive discussions in conference calls. Journal of Accounting Research 50, 2 (2012), 495\u2013540.","journal-title":"Journal of Accounting Research"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"e_1_3_2_87_2","first-page":"185","volume-title":"Proceedings of the 5th International AAAI Conference on Weblogs and Social Media","author":"Lee Kyumin","year":"2011","unstructured":"Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media. 185\u2013192."},{"key":"e_1_3_2_88_2","first-page":"90","volume-title":"Proceedings of the 4th International AAAI Conference on Weblogs and Social Media","author":"Lerman Kristina","year":"2010","unstructured":"Kristina Lerman and Rumi Ghosh. 2010. Information contagion: An empirical study of the spread of news on Digg and Twitter social networks. In Proceedings of the 4th International AAAI Conference on Weblogs and Social Media. 90\u201397."},{"key":"e_1_3_2_89_2","first-page":"2488","volume-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence","author":"Li Fangtao Huang","year":"2011","unstructured":"Fangtao Huang Li, Minlie Huang, Yi Yang, and Xiaoyan Zhu. 2011. Learning to identify review spam. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence. 2488\u20132493."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.47"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.59"},{"key":"e_1_3_2_92_2","first-page":"841","volume-title":"Proceedings of the 2013 15th International Conference on Advanced Communications Technology (ICACT\u201913)","author":"Lin Po-Ching","year":"2013","unstructured":"Po-Ching Lin and Po-Min Huang. 2013. A study of effective features for detecting long-surviving Twitter spam accounts. In Proceedings of the 2013 15th International Conference on Advanced Communications Technology (ICACT\u201913). IEEE, Los Alamitos, CA, 841\u2013846."},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133018"},{"key":"e_1_3_2_94_2","first-page":"3789","volume-title":"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI\u201916)","author":"Liu Yuli","year":"2016","unstructured":"Yuli Liu, Yiqun Liu, Min Zhang, and Shaoping Ma. 2016. Pay me and I\u2019ll follow you: Detection of crowdturfing following activities in microblog environment. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI\u201916). 3789\u20133796."},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.5555\/2035700.2035717"},{"key":"e_1_3_2_96_2","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/IC3I.2016.7918016","volume-title":"Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I\u201916)","author":"Mehrotra Ashish","year":"2016","unstructured":"Ashish Mehrotra, Mallidi Sarreddy, and Sanjay Singh. 2016. Detection of fake Twitter followers using graph centrality measures. In Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I\u201916). IEEE, Los Alamitos, CA, 499\u2013504."},{"key":"e_1_3_2_97_2","first-page":"1","volume-title":"Proceedings of the 2017 IEEE International Conference on Communications (ICC\u201917)","author":"Mei Yan","year":"2017","unstructured":"Yan Mei, Weiliang Zhao, and Jian Yang. 2017. Influence maximization on Twitter: A mechanism for effective marketing campaign. In Proceedings of the 2017 IEEE International Conference on Communications (ICC\u201917). IEEE, Los Alamitos, CA, 1\u20136."},{"key":"e_1_3_2_98_2","first-page":"533","volume-title":"Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM\u201916)","author":"Morstatter Fred","year":"2016","unstructured":"Fred Morstatter, Liang Wu, Tahora H. Nazer, Kathleen M. Carley, and Huan Liu. 2016. A new approach to bot detection: Striking the balance between precision and recall. In Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM\u201916). IEEE, Los Alamitos, CA, 533\u2013540."},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_3_2_101_2","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/DSAA.2019.00050","volume-title":"Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics (DSAA\u201919)","author":"Nilforoshan Hamed","year":"2019","unstructured":"Hamed Nilforoshan and Neil Shah. 2019. SliceNDice: Mining suspicious multi-attribute entity groups with multi-view graphs. In Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics (DSAA\u201919). IEEE, Los Alamitos, CA, 351\u2013363."},{"key":"e_1_3_2_102_2","doi-asserted-by":"crossref","unstructured":"Yiangos Papanastasiou. 2018. Fake news propagation and detection: A sequential model. SSRN . Retrieved March 8 2022 from https:\/\/ssrn.com\/abstract=3028354.","DOI":"10.2139\/ssrn.3028354"},{"issue":"9","key":"e_1_3_2_103_2","article-title":"Detecting LinkedIn spammers and its spam nets","volume":"4","author":"Prieto Victor M.","year":"2013","unstructured":"Victor M. Prieto, Manuel Alvarez, and Fidel Cacheda. 2013. Detecting LinkedIn spammers and its spam nets. International Journal of Advanced Computer Science and Applications 4, 9 (2013). https:\/\/scholar.googleusercontent.com\/scholar.bib?q=info:DBLt-ABKljoJ:scholar.google.com\/&output=citation&scisdr=CgUBljosEMm08sD2XwY:AAGBfm0AAAAAYkXwRwYC41Y1th7va6iFhWa_7tuN2eec&scisig=AAGBfm0AAAAAYkXwR4q2devhjXyX2YR0e3-kUK_QnjwN&scisf=4&ct=citation&cd=-1&hl=en.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_104_2","first-page":"65","volume-title":"Proceedings of the Forum on Data Engineering (DE\u201911)","author":"Rattanaritnont Geerajit","year":"2011","unstructured":"Geerajit Rattanaritnont, Masashi Toyoda, and Masaru Kitsuregawa. 2011. A study on characteristics of topic-specific information cascade in Twitter. In Proceedings of the Forum on Data Engineering (DE\u201911). 65\u201370."},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_106_2","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1137\/1.9781611974348.71","volume-title":"Proceedings of the 2016 SIAM International Conference on Data Mining (SDM\u201916)","author":"Rayana Shebuti","year":"2016","unstructured":"Shebuti Rayana and Leman Akoglu. 2016. Collective opinion spam detection using active inference. In Proceedings of the 2016 SIAM International Conference on Data Mining (SDM\u201916). 630\u2013638."},{"key":"e_1_3_2_107_2","first-page":"1","volume-title":"Proceedings of the 26th European Conference on Information Systems (ECIS\u201918)","author":"Ross Bj\u00f6rn","year":"2018","unstructured":"Bj\u00f6rn Ross, Florian Brachten, Stefan Stieglitz, Patrik Wikstrom, Brenda Moon, Felix Victor M\u00fcnch, and Axel Bruns. 2018. Social bots in a commercial context\u2014A case study on SoundCloud. In Proceedings of the 26th European Conference on Information Systems (ECIS\u201918). 1\u201310."},{"key":"e_1_3_2_108_2","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1145\/2631775.2631786","volume-title":"Proceedings of the 25th ACM Conference on Hypertext and Social Media","author":"Saez-Trumper Diego","year":"2014","unstructured":"Diego Saez-Trumper. 2014. Fake tweet buster: A webtool to identify users promoting fake news on Twitter. In Proceedings of the 25th ACM Conference on Hypertext and Social Media. ACM, New York, NY, 316\u2013317."},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0198660"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01854-6_46"},{"key":"e_1_3_2_111_2","first-page":"205","volume-title":"Proceedings of the 10th ACM Conference on Web Science (WebSci\u201918)","author":"Sen Indira","year":"2018","unstructured":"Indira Sen, Anupama Aggarwal, Shiven Mian, Siddharth Singh, Ponnurangam Kumaraguru, and Anwitaman Datta. 2018. Worth its weight in likes: Towards detecting fake likes on Instagram. In Proceedings of the 10th ACM Conference on Web Science (WebSci\u201918). 205\u2013209."},{"key":"e_1_3_2_112_2","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1145\/3038912.3052617","volume-title":"Proceedings of the 26th International Conference on World Wide Web (WWW\u201917)","author":"Shah Neil","year":"2017","unstructured":"Neil Shah. 2017. FLOCK: Combating astroturfing on livestreaming platforms. In Proceedings of the 26th International Conference on World Wide Web (WWW\u201917). 1083\u20131091."},{"key":"e_1_3_2_113_2","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/ICDMW.2016.0053","volume-title":"Proceedings of the 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW\u201916)","author":"Shah Neil","year":"2016","unstructured":"Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Gunnemann, Disha Makhija, Mohit Kumar, and Christos Faloutsos. 2016. EdgeCentric: Anomaly detection in edge-attributed networks. In Proceedings of the 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW\u201916). IEEE, Los Alamitos, CA, 327\u2013334."},{"key":"e_1_3_2_114_2","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/ICDM.2017.140","volume-title":"Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM\u201917)","author":"Shah Neil","year":"2017","unstructured":"Neil Shah, Hemank Lamba, Alex Beutel, and Christos Faloutsos. 2017. The many faces of link fraud. In Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM\u201917). IEEE, Los Alamitos, CA, 1069\u20131074."},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3507"},{"key":"e_1_3_2_117_2","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1007\/978-3-319-06605-9_49","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Shen Yi","year":"2014","unstructured":"Yi Shen, Jianjun Yu, Kejun Dong, and Kai Nan. 2014. Automatic fake followers detection in Chinese micro-blogging system. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 596\u2013607."},{"key":"e_1_3_2_118_2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/ICDM.2016.0058","volume-title":"Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM\u201916)","author":"Shin Kijung","year":"2016","unstructured":"Kijung Shin, Tina Eliassi-Rad, and Christos Faloutsos. 2016. CoreScope: Graph mining using k-core analysis\u2014Patterns, anomalies and algorithms. In Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM\u201916). IEEE, Los Alamitos, CA, 469\u2013478."},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1077-6"},{"key":"e_1_3_2_120_2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-319-46128-1_17","volume-title":"Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"Shin Kijung","year":"2016","unstructured":"Kijung Shin, Bryan Hooi, and Christos Faloutsos. 2016. M-Zoom: Fast dense-block detection in tensors with quality guarantees. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 264\u2013280."},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/3154414"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2017.1412866"},{"key":"e_1_3_2_123_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/BigMM.2019.00-44","volume-title":"Proceedings of the 2019 IEEE 5th International Conference on Multimedia Big Data (BigMM\u201919)","author":"Singhal Shivangi","year":"2019","unstructured":"Shivangi Singhal, Rajiv Ratn Shah, Tanmoy Chakraborty, Ponnurangam Kumaraguru, and Shin\u2019ichi Satoh. 2019. SpotFake: A multi-modal framework for fake news detection. In Proceedings of the 2019 IEEE 5th International Conference on Multimedia Big Data (BigMM\u201919). IEEE, Los Alamitos, CA, 39\u201347."},{"key":"e_1_3_2_124_2","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Proceedings of the International Workshop on Recent Advances in Intrusion Detection","author":"Song Jonghyuk","year":"2011","unstructured":"Jonghyuk Song, Sangho Lee, and Jong Kim. 2011. Spam filtering in Twitter using sender-receiver relationship. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. 301\u2013317."},{"key":"e_1_3_2_125_2","volume-title":"Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity","author":"Stringhini Gianluca","year":"2014","unstructured":"Gianluca Stringhini. 2014. Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity. University of California, Santa Barbara."},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377781"},{"key":"e_1_3_2_127_2","first-page":"563","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Stringhini Gianluca","unstructured":"Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015: EVILCOHORT: Detecting communities of malicious accounts on online services. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 563\u2013578."},{"key":"e_1_3_2_128_2","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1145\/2504730.2504731","volume-title":"Proceedings of the 2013 Internet Measurement Conference","author":"Stringhini Gianluca","year":"2013","unstructured":"Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y. Zhao. 2013. Follow the green: Growth and dynamics in Twitter follower markets. In Proceedings of the 2013 Internet Measurement Conference(IMC\u201913). 163\u2013176."},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_131_2","first-page":"195","volume-title":"Proceedings of the 22nd USENIX Conference on Security","author":"Thomas Kurt","year":"2013","unstructured":"Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse. In Proceedings of the 22nd USENIX Conference on Security. 195\u2013210."},{"key":"e_1_3_2_132_2","first-page":"280","volume-title":"Proceedings of the 11th International AAAI Conference on Web and Social Media","author":"Varol Onur","year":"2017","unstructured":"Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. In Proceedings of the 11th International AAAI Conference on Web and Social Media. 280\u2013289."},{"key":"e_1_3_2_133_2","doi-asserted-by":"crossref","DOI":"10.3390\/fi9010006","article-title":"Automatic detection of online recruitment frauds: Characteristics, methods, and a public dataset","author":"Vidros Sokratis","year":"2017","unstructured":"Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis, and Leman Akoglu. 2017. Automatic detection of online recruitment frauds: Characteristics, methods, and a public dataset. Future Internet 9, 1 (2017), 6.","journal-title":"Future Internet"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_2_135_2","first-page":"1","volume-title":"Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT\u201910)","author":"Wang Alex Hai","year":"2010","unstructured":"Alex Hai Wang. 2010. Don\u2019t follow me: Spam detection in Twitter. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT\u201910). 1\u201310."},{"key":"e_1_3_2_136_2","article-title":"Making the most of tweet-inherent features for social spam detection on Twitter","author":"Wang Bo","year":"2015","unstructured":"Bo Wang, Arkaitz Zubiaga, Maria Liakata, and Rob Procter. 2015. Making the most of tweet-inherent features for social spam detection on Twitter. arXiv preprint arXiv:1503.07405 (2015).","journal-title":"arXiv preprint arXiv:1503.07405"},{"key":"e_1_3_2_137_2","first-page":"250","volume-title":"Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications, and Worksharing","author":"Wang De","year":"2013","unstructured":"De Wang, Shamkant B. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, and Calton Pu. 2013. Click traffic analysis of short URL spam on Twitter. In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications, and Worksharing. IEEE, Los Alamitos, CA, 250\u2013259."},{"key":"e_1_3_2_138_2","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1109\/ICDM.2011.124","volume-title":"Proceedings of the 11th IEEE International Conference on Data Mining (ICDM\u201911)","author":"Wang Guan","year":"2011","unstructured":"Guan Wang, Sihong Xie, Bing Liu, and S. Yu Philip. 2011. Review graph based online store review spammer detection. In Proceedings of the 11th IEEE International Conference on Data Mining (ICDM\u201911). 1242\u20131247."},{"key":"e_1_3_2_139_2","first-page":"1","article-title":"Graph-based review spammer group detection","author":"Wang Zhuo","year":"2018","unstructured":"Zhuo Wang, Songmin Gu, Xiangnan Zhao, and Xiaowei Xu. 2018. Graph-based review spammer group detection. Knowledge and Information Systems 55, 3 (2018), 1\u201327.","journal-title":"Knowledge and Information Systems"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv068"},{"key":"e_1_3_2_141_2","first-page":"1","volume-title":"Proceedings of the 2018 Network Traffic Measurement and Analysis Conference (TMA\u201918)","author":"Wilmet Audrey","year":"2018","unstructured":"Audrey Wilmet, Tiphaine Viard, Matthieu Latapy, and Robin Lamarche-Perrin. 2018. Degree-based outliers detection within IP traffic modelled as a link stream. In Proceedings of the 2018 Network Traffic Measurement and Analysis Conference (TMA\u201918). IEEE, Los Alamitos, CA, 1\u20138."},{"key":"e_1_3_2_142_2","first-page":"1054","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Wu Yongji","year":"2020","unstructured":"Yongji Wu, Defu Lian, Yiheng Xu, Le Wu, and Enhong Chen. 2020. Graph convolutional networks with Markov random field reasoning for social spammer detection. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 1054\u20131061."},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505700"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.081"},{"key":"e_1_3_2_145_2","article-title":"Arming the public with AI to counter social bots","author":"Yang Kai-Cheng","year":"2019","unstructured":"Kai-Cheng Yang, Onur Varol, Clayton A. Davis, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2019. Arming the public with AI to counter social bots. arXiv preprint arXiv:1901.00912 (2019).","journal-title":"arXiv preprint arXiv:1901.00912"},{"issue":"1","key":"e_1_3_2_146_2","article-title":"Detecting spam in a Twitter network","volume":"15","author":"Yardi Sarita","year":"2010","unstructured":"Sarita Yardi, Daniel Romero, Grant Schoenebeck, and Danah Boyd. 2010. Detecting spam in a Twitter network. First Monday 15, 1 (2010). https:\/\/scholar.googleusercontent.com\/scholar.bib?q=info:fowHCxkUnAYJ:scholar.google.com\/&output=citation&scisdr=CgUBljosEMm08sD2lrs:AAGBfm0AAAAAYkXwjrtWVDQgTQs_1JKQplytErVbepWO&scisig=AAGBfm0AAAAAYkXwjlNqy-knKqBIUgMC0EOtgI_etZVL&scisf=4&ct=citation&cd=-1&hl=en.","journal-title":"First Monday"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.5555\/1929326.1929342"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330946"},{"key":"e_1_3_2_149_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/ICNIT.2010.5508552","volume-title":"Proceedings of the 2010 International Conference on Networking and Information Technology","author":"Zeidanloo Hossein Rouhani","year":"2010","unstructured":"Hossein Rouhani Zeidanloo, Azizah Bt Manaf, Payam Vahdani, Farzaneh Tabatabaei, and Mazdak Zamani. 2010. Botnet detection based on traffic monitoring. In Proceedings of the 2010 International Conference on Networking and Information Technology. IEEE, Los Alamitos, CA, 97\u2013101."},{"key":"e_1_3_2_150_2","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-642-19260-9_11","volume-title":"Proceedings of the International Conference on Passive and Active Network Measurement","author":"Zhang Chao Michael","year":"2011","unstructured":"Chao Michael Zhang and Vern Paxson. 2011. Detecting and analyzing automated activity on Twitter. In Proceedings of the International Conference on Passive and Active Network Measurement. 102\u2013111."},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"issue":"1","key":"e_1_3_2_152_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s13278-016-0324-2","article-title":"Discover millions of fake followers in Weibo","volume":"6","author":"Zhang Yi","year":"2016","unstructured":"Yi Zhang and Jianguo Lu. 2016. Discover millions of fake followers in Weibo. Social Network Analysis and Mining 6, 1 (2016), 16.","journal-title":"Social Network Analysis and Mining"},{"issue":"1","key":"e_1_3_2_153_2","first-page":"144","article-title":"Twitter trends manipulation: A first look inside the security of Twitter trending","volume":"12","author":"Zhang Yubao","year":"2016","unstructured":"Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang, and Su He. 2016. Twitter trends manipulation: A first look inside the security of Twitter trending. IEEE Transactions on Information Forensics and Security 12, 1 (2016), 144\u2013156.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_154_2","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1145\/3077136.3080709","volume-title":"Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Zhang Yu","year":"2017","unstructured":"Yu Zhang and Yan Zhang. 2017. Top-K influential nodes in social networks: A game perspective. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. 1029\u20131032."}],"container-title":["ACM\/IMS Transactions on Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:05Z","timestamp":1750182545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":153,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11,30]]}},"alternative-id":["10.1145\/3517931"],"URL":"https:\/\/doi.org\/10.1145\/3517931","relation":{},"ISSN":["2691-1922"],"issn-type":[{"value":"2691-1922","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11,30]]},"assertion":[{"value":"2021-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}