[PDF][PDF] Coupled-Space Attacks against Random-Walk-based Anomaly Detection

Y Lai, M Waniek, L Li, J Wu, Y Zhu, TP Michalak… - researchgate.net
Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous
patterns in various applications. An intriguing characteristic of RWAD is that the input graph …

Preventing Sybil attacks in chord and Kademlia protocols

Z Trifa - International Journal of Internet Protocol …, 2019 - inderscienceonline.com
Structured p2p overlay networks, such as chord, Kademlia, CAN, pastry and tapastry allow
participant to generate multiple identities on shared physical node. This practice of Sybil …

Check2: A Framework for Fake Check-in Detection

DAA El Moniem, HMO Mokhtar - Intelligent Computing: Proceedings of the …, 2019 - Springer
Location-based social networks (LBSNs) have increased rapidly over the past several years
due to the proliferation of mobile devices. As people continue to use their phones …

Sybil defense using efficient resource burning

D Gupta - 2020 - search.proquest.com
Abstract In 1993, Dwork and Naor proposed using computational puzzles, a resource
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …

A Secure and Optimal Path Hybrid Ant-Based Routing Protocol with Hope Count Minimization for Wireless Sensor Networks

VN Kumar, G Joshi - … : Proceedings of Sixth International Conference on …, 2022 - Springer
In wireless sensor networks (WSNs), particular objectives are achieved by different routing
protocols which are efficient for specific situations. But, some limitations are owned by WSN …

Cloud security and storage space management using DCACrypt

AR Gadekar, MV Sarode… - … and Technology (ICICET …, 2018 - ieeexplore.ieee.org
Cloud Computing is a new computing model that distributes the computing missions on a
resource pool that includes a large amount of computing resources. More and more …

N2TM: a new node to trust matrix method for spam worker defense in crowdsourcing environments

B Ye, Y Wang, M Orgun, QZ Sheng - Service-Oriented Computing: 17th …, 2019 - Springer
To defend against spam workers in crowdsourcing environments, the existing solutions
overlook the fact that a spam worker with guises can easily bypass the defense. To alleviate …

[PDF][PDF] A Comprehensive Framework for Detecting Sybils and Spammers on Social Networks.

L Fu - ICEIS (1), 2018 - scitepress.org
Social media becomes a common platform for millions of people to communicate with one
another online. However, some accounts and computer generated robots can greatly disrupt …

[PDF][PDF] Opinion Formation Modelling in Online Social Networks

R Das - 2018 - scholar.archive.org
A challenging but intriguing problem associated with the modelling of opinion formation
dynamics is the inherent hardness of the abstraction of human behaviours in the presence of …

Trust management in crowdsourcing environments

B Ye - 2022 - figshare.mq.edu.au
As a cost-effective model for solving problems, crowdsourcing has been widely applied in
various human intelligence tasks, such as data labeling, data translation, and prediction …