Implicit crowdsourcing for identifying abusive behavior in online social networks

A Osho, E Tucker, G Amariucai - arXiv preprint arXiv:2006.11456, 2020 - arxiv.org
users interacting with it. We demonstrate that the difference in users’ interactions with abusive
posts can be leveragedLarge scale crowdsourcing and characterization of twitter abusive …

Analysis of and defense against crowd-retweeting based spam in social networks

B Liu, Z Ni, J Luo, J Cao, X Ni, B Liu, X Fu - World Wide Web, 2019 - Springer
… algorithms are more effective than other link-based strategies. … a malicious crowdsourcing
system can be built upon social … : leveraging friend invitation graph to defend against social

Characterizing and detecting malicious accounts in privacy-centric mobile social networks: A case study

Z Xia, C Liu, NZ Gong, Q Li, Y Cui, D Song - Proceedings of the 25th …, 2019 - dl.acm.org
… We observe that malicious users leverage a more diverse set of … is effective at detecting
malicious accounts in the real mobile … We conducted a large-scale measurement study over a …

Co-Detection of crowdturfing microblogs and spammers in online social networks

B Liu, X Sun, Z Ni, J Cao, J Luo, B Liu, X Fu - World Wide Web, 2020 - Springer
… , we characterize the essence of the crowdsourcing … on their microblog contents and leveraged
the topic distribution to … One of the clearest manifestations for following links is malicious

Combining crowd and machine intelligence to detect false news on social media

X Wei, Z Zhang, M Zhang, W Chen, DD Zeng - Mis Quarterly, 2022 - papers.ssrn.com
… include crowd intelligence and crowdsourcing, social media analytics, … -oriented fact-checking)
are not applicable in large-scale … To leverage such information, we propose learning prior …

Mitigating colluding attacks in online social networks and crowdsourcing platforms

GAK Kamhoua - 2019 - digitalcommons.fiu.edu
malicious users in online social networks and crowdsourcing … OSNs, research has leveraged
the social graph structurebased … They allow for large scale distribution of tasks to human …

Rogue people: on adversarial crowdsourcing in the context of cyber security

M Moradi, Q Li - Journal of Information, Communication and Ethics in …, 2021 - emerald.com
… to leveraging people's power, as the dark side of crowdsourcing, … -effective ones – are
usually used to target social media and … -mediated large-scale malware propagation. Moreover, …

Effectiveness of Malicious Behavior and Its Impact on Crowdsourcing

X Ding, Z Zhang, Z Yuan, T Han, H Gu… - … Work and Social …, 2022 - Springer
… of crowdsourcing platforms are anonymous, they could use third part social network or other
… Thus, for random submission, if we take indifferential pricing policy, it is effective malicious

Recruitment From Social Networks for the Cold Start Problem in Mobile Crowdsourcing

P Wang, Z Li, S Long, J Wang, Z Tan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
… this issue by leveraging social networks for user recruitment; … However, in the context of
large-scale crowdsourcing, … social networkbased trust method to identify malicious users

TDSRC: A Task‐Distributing System of Crowdsourcing Based on Social Relation Cognition

Z Peng, X Gui, J An, R Gui, Y Ji - Mobile Information Systems, 2019 - Wiley Online Library
… to allocate large-scale tasks to a crowd and obtaining results by leveraging mass wisdom.
A … The social network in this study refers to any social network. A requester is the center of a …