Random walk based fake account detection in online social networks

J Jia, B Wang, NZ Gong - 2017 47th annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

[PDF][PDF] Random Walk based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - engineering.iastate.edu
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

[引用][C] Random Walk Based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - 2017 47th Annual IEEE/IFIP International …, 2017 - cir.nii.ac.jp
Random Walk Based Fake Account Detection in Online Social Networks | CiNii Research CiNii
国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[PDF][PDF] Random Walk based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - researchgate.net
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

Random Walk Based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - 47th Annual IEEE/IFIP International …, 2017 - pure.psu.edu
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

[PDF][PDF] Random Walk based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - people.duke.edu
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

[PDF][PDF] Random Walk based Fake Account Detection in Online Social Networks

J Jia, B Wang, NZ Gong - people.duke.edu
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …