Trust management and reputation systems in mobile participatory sensing applications: A survey

H Mousa, SB Mokhtar, O Hasan, O Younes… - Computer Networks, 2015 - Elsevier
Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use
their computational devices to capture and share sensed data from their surrounding …

VoteTrust: Leveraging friend invitation graph to defend against social network sybils

Z Yang, J Xue, X Yang, X Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Online social networks (OSNs) suffer from the creation of fake accounts that introduce fake
product reviews, malware and spam. Existing defenses focus on using the social graph …

Truetop: A sybil-resilient system for user influence measurement on twitter

J Zhang, R Zhang, J Sun, Y Zhang… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
Influential users have great potential for accelerating information dissemination and
acquisition on Twitter. How to measure the influence of Twitter users has attracted significant …

Survey of sybil attacks in social networks

R Gunturu - arXiv preprint arXiv:1504.05522, 2015 - arxiv.org
This paper reviews the Sybil attack in social networks, which has the potential to
compromise the whole distributed network. In the Sybil attack, the malicious user claims …

Exploiting mobile social behaviors for sybil detection

K Zhang, X Liang, R Lu, K Yang… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
In this paper, we propose a Social-based Mobile Sybil Detection (SMSD) scheme to detect
Sybil attackers from their abnormal contacts and pseudonym changing behaviors …

Discovering missing me edges across social networks

F Buccafurri, G Lax, A Nocera, D Ursino - Information Sciences, 2015 - Elsevier
Distinct social networks are interconnected via membership overlap, which plays a key role
when crossing information is investigated in the context of multiple-social-network analysis …

Exploiting temporal dynamics in sybil defenses

C Liu, P Gao, M Wright, P Mittal - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Sybil attacks present a significant threat to many Internet systems and applications, in which
a single adversary inserts multiple colluding identities in the system to compromise its …

[PDF][PDF] 在线社交网络中异常帐号检测方法研究

张玉清, 吕少卿, 范丹 - 计算机学报, 2015 - cjc.ict.ac.cn
摘要异常帐号检测是在线社交网络安全研究的关键问题之一. 攻击者通过异常帐号传播广告,
钓鱼等恶意消息以及恶意关注, 点赞等行为严重威胁到正常用户的信息安全和社交网络的信用 …

Uncovering the mystery of trust in an online social network

G Liu, Q Yang, H Wang, S Wu… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
Trust is a hidden fabric of online social networks (OSNs) that enables online interactions, eg,
online transactions on Ebay. The fundamental properties of trust in OSNs, however, have not …

A survey on privacy and security in online social networks

I Kayes, A Iamnitchi - arXiv preprint arXiv:1504.03342, 2015 - arxiv.org
Online Social Networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …