Z Yang, J Xue, X Yang, X Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Online social networks (OSNs) suffer from the creation of fake accounts that introduce fake product reviews, malware and spam. Existing defenses focus on using the social graph …
J Zhang, R Zhang, J Sun, Y Zhang… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
Influential users have great potential for accelerating information dissemination and acquisition on Twitter. How to measure the influence of Twitter users has attracted significant …
R Gunturu - arXiv preprint arXiv:1504.05522, 2015 - arxiv.org
This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims …
In this paper, we propose a Social-based Mobile Sybil Detection (SMSD) scheme to detect Sybil attackers from their abnormal contacts and pseudonym changing behaviors …
Distinct social networks are interconnected via membership overlap, which plays a key role when crossing information is investigated in the context of multiple-social-network analysis …
C Liu, P Gao, M Wright, P Mittal - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromise its …
G Liu, Q Yang, H Wang, S Wu… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
Trust is a hidden fabric of online social networks (OSNs) that enables online interactions, eg, online transactions on Ebay. The fundamental properties of trust in OSNs, however, have not …
I Kayes, A Iamnitchi - arXiv preprint arXiv:1504.03342, 2015 - arxiv.org
Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline …