{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:54:21Z","timestamp":1770231261536,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599471","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"105-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Preemptive Detection of Fake Accounts on Social Networks via Multi-Class Preferential Attachment Classifiers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5978-1070","authenticated-orcid":false,"given":"Adam","family":"Breuer","sequence":"first","affiliation":[{"name":"Dartmouth, Hanover, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3971-6551","authenticated-orcid":false,"given":"Nazanin","family":"Khosravani","sequence":"additional","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8024-5777","authenticated-orcid":false,"given":"Michael","family":"Tingley","sequence":"additional","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8428-8404","authenticated-orcid":false,"given":"Bradford","family":"Cottel","sequence":"additional","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2656635"},{"key":"e_1_3_2_2_2_1","volume-title":"Statistical mechanics of complex networks. Reviews of modern physics","author":"Albert R\u00e9ka","year":"2002","unstructured":"R\u00e9ka Albert and Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2002. Statistical mechanics of complex networks. Reviews of modern physics , Vol. 74 , 1 ( 2002 ), 47. R\u00e9ka Albert and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2002. Statistical mechanics of complex networks. Reviews of modern physics, Vol. 74, 1 (2002), 47."},{"key":"e_1_3_2_2_3_1","volume-title":"Mixed preferential attachment model: Homophily and minorities in social networks. Physica A: Statistical Mechanics and its Applications","author":"Avin Chen","year":"2020","unstructured":"Chen Avin , Hadassa Daltrophe , Barbara Keller , Zvi Lotker , Claire Mathieu , David Peleg , and Yvonne-Anne Pignolet . 2020. Mixed preferential attachment model: Homophily and minorities in social networks. Physica A: Statistical Mechanics and its Applications , Vol. 555 ( 2020 ), 124723. Chen Avin, Hadassa Daltrophe, Barbara Keller, Zvi Lotker, Claire Mathieu, David Peleg, and Yvonne-Anne Pignolet. 2020. Mixed preferential attachment model: Homophily and minorities in social networks. Physica A: Statistical Mechanics and its Applications, Vol. 555 (2020), 124723."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688073.2688097"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380723"},{"key":"e_1_3_2_2_6_1","volume-title":"Emergence of scaling in random networks. science","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","year":"1999","unstructured":"Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert . 1999. Emergence of scaling in random networks. science , Vol. 286 , 5439 ( 1999 ), 509--512. Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert. 1999. Emergence of scaling in random networks. science, Vol. 286, 5439 (1999), 509--512."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.7090"},{"key":"e_1_3_2_2_8_1","volume-title":"The Structure and Dynamics of Networks","author":"Bollob\u00e1s B\u00e9la","unstructured":"B\u00e9la Bollob\u00e1s , Oliver Riordan , Joel Spencer , and G\u00e1bor Tusn\u00e1dy . 2011. The degree sequence of a scale-free random graph process . In The Structure and Dynamics of Networks . Princeton University Press , 384--395. B\u00e9la Bollob\u00e1s, Oliver Riordan, Joel Spencer, and G\u00e1bor Tusn\u00e1dy. 2011. The degree sequence of a scale-free random graph process. In The Structure and Dynamics of Networks. Princeton University Press, 384--395."},{"key":"e_1_3_2_2_9_1","first-page":"8","article-title":"Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs","volume":"15","author":"Boshmaf Yazan","year":"2015","unstructured":"Yazan Boshmaf , Dionysios Logothetis , Georgos Siganos , Jorge Ler\u00eda , Jose Lorenzo , Matei Ripeanu , and Konstantin Beznosov . 2015 a. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs .. In NDSS , Vol. 15. 8 -- 11 . Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Ler\u00eda, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov. 2015a. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS, Vol. 15. 8--11.","journal-title":"NDSS"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808772"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467321"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_2_14_1","volume-title":"Richard Harris, and Mark Hansen.","author":"Confessore Nicholas","year":"2018","unstructured":"Nicholas Confessore , Gabriel JX Dance , Richard Harris, and Mark Hansen. 2018 . The follower factory. The New York Times , Vol. 27 (2018). Nicholas Confessore, Gabriel JX Dance, Richard Harris, and Mark Hansen. 2018. The follower factory. The New York Times, Vol. 27 (2018)."},{"key":"e_1_3_2_2_15_1","volume-title":"NDSS.","author":"Danezis George","unstructured":"George Danezis and Prateek Mittal . 2009. SybilInfer: Detecting Sybil Nodes using Social Networks .. In NDSS. San Diego, CA , 1--15. George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks.. In NDSS. San Diego, CA, 1--15."},{"key":"e_1_3_2_2_16_1","unstructured":"Facebook. 2021. Community Standards Enforcement Report. https:\/\/transparency.fb.com\/data\/community-standards-enforcement\/  Facebook. 2021. Community Standards Enforcement Report. https:\/\/transparency.fb.com\/data\/community-standards-enforcement\/"},{"key":"e_1_3_2_2_17_1","volume-title":"The New York Times","volume":"7","author":"Fandos Nicholas","year":"2018","unstructured":"Nicholas Fandos and Kevin Roose . 2018 . Facebook identifies an active political influence campaign using fake accounts . The New York Times , Vol. 7 (2018). Nicholas Fandos and Kevin Roose. 2018. Facebook identifies an active political influence campaign using fake accounts. The New York Times, Vol. 7 (2018)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433147"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621913"},{"key":"e_1_3_2_2_23_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}","author":"Kozlov Fedor","year":"2020","unstructured":"Fedor Kozlov , Isabella Yuen , Jakub Kowalczyk , Daniel Bernhardt , David Freeman , Paul Pearce , and Ivan Ivanov . 2020 . Evaluating Changes to Fake Account Verification Systems . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). 135--148. Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, and Ivan Ivanov. 2020. Evaluating Changes to Fake Account Verification Systems. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). 135--148."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_2_26_1","volume-title":"I felt disgusted\": inside Indonesia's fake Twitter account factories. The Guardian [Internet]","author":"Lamb Kate","year":"2018","unstructured":"Kate Lamb . 2018. I felt disgusted\": inside Indonesia's fake Twitter account factories. The Guardian [Internet] ( 2018 ). Kate Lamb. 2018. I felt disgusted\": inside Indonesia's fake Twitter account factories. The Guardian [Internet] (2018)."},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the Eighteenth Intl. Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","author":"Lee Jay","year":"2015","unstructured":"Jay Lee , Manzil Zaheer , Stephan G\u00fcnnemann , and Alex Smola . 2015 . Preferential Attachment in Graphs with Affinities . In Proceedings of the Eighteenth Intl. Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research , Vol. 38), Guy Lebanon and S. V . N. Vishwanathan (Eds.). PMLR, San Diego, California, USA, 571--580. http:\/\/proceedings.mlr.press\/v38\/lee15b.html Jay Lee, Manzil Zaheer, Stephan G\u00fcnnemann, and Alex Smola. 2015. Preferential Attachment in Graphs with Affinities. In Proceedings of the Eighteenth Intl. Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 38), Guy Lebanon and S. V. N. Vishwanathan (Eds.). PMLR, San Diego, California, USA, 571--580. http:\/\/proceedings.mlr.press\/v38\/lee15b.html"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_2_29_1","volume-title":"Bi-Populated Preferential Attachment Model with Applications to Analyzing the Glass Ceiling Effect. arXiv preprint arXiv:2103.12149","author":"Nettasinghe Buddhika","year":"2021","unstructured":"Buddhika Nettasinghe , Nazanin Alipourfard , Vikram Krishnamurthy , and Kristina Lerman . 2021. A Directed , Bi-Populated Preferential Attachment Model with Applications to Analyzing the Glass Ceiling Effect. arXiv preprint arXiv:2103.12149 ( 2021 ). Buddhika Nettasinghe, Nazanin Alipourfard, Vikram Krishnamurthy, and Kristina Lerman. 2021. A Directed, Bi-Populated Preferential Attachment Model with Applications to Analyzing the Glass Ceiling Effect. arXiv preprint arXiv:2103.12149 (2021)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403364"},{"key":"e_1_3_2_2_31_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems, Vol. 32 . Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems, Vol. 32."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630270505"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.05.020"},{"key":"e_1_3_2_2_34_1","volume-title":"Onur Varol, Alessandro Flammini, and Filippo Menczer.","author":"Shao Chengcheng","year":"2017","unstructured":"Chengcheng Shao , Giovanni Luca Ciampaglia , Onur Varol, Alessandro Flammini, and Filippo Menczer. 2017 . The spread of fake news by social bots. arXiv preprint arXiv:1707.07592, Vol. 96 (2017), 104. Chengcheng Shao, Giovanni Luca Ciampaglia, Onur Varol, Alessandro Flammini, and Filippo Menczer. 2017. The spread of fake news by social bots. arXiv preprint arXiv:1707.07592, Vol. 96 (2017), 104."},{"key":"e_1_3_2_2_35_1","volume-title":"Fake news detection on social media. ACM SIGKDD explorations","author":"Shu Kai","year":"2017","unstructured":"Kai Shu , Amy Sliva , Suhang Wang , Jiliang Tang , and Huan Liu . 2017. Fake news detection on social media. ACM SIGKDD explorations , Vol. 19 , 1 ( 2017 ), 22--36. Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake news detection on social media. ACM SIGKDD explorations, Vol. 19, 1 (2017), 22--36."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_2_37_1","volume-title":"Do social bots dream of electric sheep? A categorisation of social media bot accounts. arXiv preprint arXiv:1710.04044","author":"Stieglitz Stefan","year":"2017","unstructured":"Stefan Stieglitz , Florian Brachten , Bj\u00f6rn Ross , and Anna-Katharina Jung . 2017. Do social bots dream of electric sheep? A categorisation of social media bot accounts. arXiv preprint arXiv:1710.04044 ( 2017 ). Stefan Stieglitz, Florian Brachten, Bj\u00f6rn Ross, and Anna-Katharina Jung. 2017. Do social bots dream of electric sheep? A categorisation of social media bot accounts. arXiv preprint arXiv:1710.04044 (2017)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19355"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14874"},{"key":"e_1_3_2_2_42_1","volume-title":"The spread of true and false news online. science","author":"Vosoughi Soroush","year":"2018","unstructured":"Soroush Vosoughi , Deb Roy , and Sinan Aral . 2018. The spread of true and false news online. science , Vol. 359 , 6380 ( 2018 ), 1146--1151. Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. science, Vol. 359, 6380 (2018), 1146--1151."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.56"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2813672"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1987.10478385"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 30th (USENIX) Security Symposium ((USENIX) Security 21)","author":"Xu Teng","year":"2021","unstructured":"Teng Xu , Gerard Goossen , Huseyin Kerem Cevahir , Sara Khodeir , Yingyezhe Jin , Frank Li , Shawn Shan , Sagar Patel , David Freeman , and Paul Pearce . 2021 . Deep Entity Classification: Abusive Account Detection for Online Social Networks . In Proceedings of the 30th (USENIX) Security Symposium ((USENIX) Security 21) . Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, and Paul Pearce. 2021. Deep Entity Classification: Abusive Account Detection for Online Social Networks. In Proceedings of the 30th (USENIX) Security Symposium ((USENIX) Security 21)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567045"},{"key":"e_1_3_2_2_49_1","unstructured":"X Yang Q Cao and M Sirivianos. 2012. SybilRank: Aiding the detection of fake accounts in large scale social online services.  X Yang Q Cao and M Sirivianos. 2012. SybilRank: Aiding the detection of fake accounts in large scale social online services."},{"key":"e_1_3_2_2_50_1","first-page":"689","article-title":"Generalized belief propagation","volume":"13","author":"Yedidia Jonathan S","year":"2000","unstructured":"Jonathan S Yedidia , William T Freeman , Yair Weiss , 2000 . Generalized belief propagation . In NIPS , Vol. 13. 689 -- 695 . Jonathan S Yedidia, William T Freeman, Yair Weiss, et al. 2000. Generalized belief propagation. In NIPS, Vol. 13. 689--695.","journal-title":"NIPS"},{"key":"e_1_3_2_2_51_1","unstructured":"Jonathan S Yedidia William T Freeman Yair Weiss etal 2003. Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium Vol. 8 (2003) 236--239.  Jonathan S Yedidia William T Freeman Yair Weiss et al. 2003. Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium Vol. 8 (2003) 236--239."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23916"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:37Z","timestamp":1750178257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":54,"alternative-id":["10.1145\/3580305.3599471","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599471","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}