{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:11:10Z","timestamp":1750219870165,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea Internet & Security Agency (KISA)","award":["1781000003"],"award-info":[{"award-number":["1781000003"]}]},{"name":"Institute of Information & communications Technology Planning & evaluation (IITP)","award":["2020-0-00153"],"award-info":[{"award-number":["2020-0-00153"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583475","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2329-2339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RICC: Robust Collective Classification of Sybil Accounts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4234-6830","authenticated-orcid":false,"given":"Dongwon","family":"Shin","sequence":"first","affiliation":[{"name":"School of Computing, KAIST, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8717-6890","authenticated-orcid":false,"given":"Suyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0904-2875","authenticated-orcid":false,"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the USENIX Conference on Networked Systems Design and Implementation. 197\u2013210","author":"Cao Qiang","year":"2012","unstructured":"Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation. 197\u2013210."},{"key":"e_1_3_2_1_6_1","volume-title":"Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos.","author":"Horng\u00a0 Duen","year":"2011","unstructured":"Duen Horng\u00a0\u201cPolo\u201d Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. 2011. Polonium: Tera-Scale Graph Mining and Inference for Malware Detection. In Proceedings of the SIAM International Conference on Data Mining. 131\u2013142."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Conference on Machine Learning. 1115\u20131124","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial Attack on Graph Structured Data. In Proceedings of the International Conference on Machine Learning. 1115\u20131124."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Danezis George","year":"2009","unstructured":"George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_9_1","volume-title":"Batch Virtual Adversarial Training for Graph Convolutional Networks. CoRR abs\/1902.09192","author":"Deng Zhijie","year":"2019","unstructured":"Zhijie Deng, Yinpeng Dong, and Jun Zhu. 2019. Batch Virtual Adversarial Training for Graph Convolutional Networks. CoRR abs\/1902.09192 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the ACM SIGCOMM Conference. 35\u201347","author":"Gao Hongyu","year":"2010","unstructured":"Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben\u00a0Y. Zhao. 2010. Detecting and Characterizing Social Spam Campaigns. In Proceedings of the ACM SIGCOMM Conference. 35\u201347."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433147"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems. 7637\u20137649","author":"Geisler Simon","year":"2021","unstructured":"Simon Geisler, Tobias Schmidt, Hakan \u015eirin, Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2021. Robustness of Graph Neural Networks at Scale. In Proceedings of the Advances in Neural Information Processing Systems. 7637\u20137649."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447556.3447566"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 112\u2013126","author":"Li Zhou","year":"2013","unstructured":"Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and XiaoFeng Wang. 2013. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. In Proceedings of the IEEE Symposium on Security and Privacy. 112\u2013126."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467094"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978319"},{"key":"e_1_3_2_1_21_1","unstructured":"Annie Palmer. 2022. Amazon sues two companies that allegedly help fill the site with fake reviews. https:\/\/www.cnbc.com\/2022\/02\/22\/amazon-sues-alleged-fake-reviews-brokers-appsally-rebatest.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"e_1_3_2_1_23_1","unstructured":"Feliz Solomon. 2016. Alibaba Takes On Fake Reviews in Its Latest Push For More Credibility. https:\/\/fortune.com\/2016\/12\/20\/alibaba-jack-ma-china-fake-reviews\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.56"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23226"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"e_1_3_2_1_30_1","volume-title":"Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR abs\/1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR abs\/1906.04214 (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427245"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_35_1","volume-title":"DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder. CoRR abs\/2006.08900","author":"Zhang Ao","year":"2020","unstructured":"Ao Zhang and Jinwen Ma. 2020. DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder. CoRR abs\/2006.08900 (2020)."},{"key":"e_1_3_2_1_36_1","volume-title":"Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach","author":"Zhang Xiaoying","year":"2022","unstructured":"Xiaoying Zhang, Hong Xie, Pei Yi, and John\u00a0C.S. Lui. 2022. Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_37_1","first-page":"9263","article-title":"GNNGuard: Defending Graph Neural Networks against Adversarial Attacks","volume":"33","author":"Zhang Xiang","year":"2020","unstructured":"Xiang Zhang and Marinka Zitnik. 2020. GNNGuard: Defending Graph Neural Networks against Adversarial Attacks. Proceedings of the Advances in Neural Information Processing Systems 33 (2020), 9263\u20139275.","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23009"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:53Z","timestamp":1750178873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":39,"alternative-id":["10.1145\/3543507.3583475","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583475","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}