C Yang, R Harkreader, J Zhang, S Shin… - Proceedings of the 21st …, 2012 - dl.acm.org
In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community …
Being able to keep the graph scale small while capturing the properties of the original social graph, graph sampling provides an efficient, yet inexpensive solution for social network …
J Echeverria, S Zhou - Proceedings of the 2017 IEEE/ACM international …, 2017 - dl.acm.org
It is known that many Twitter users are bots, which are accounts controlled and sometimes created by computers. Twitter bots can send spam tweets, manipulate public opinion and be …
J Han, Q Chen, X Jin, W Xu, W Yang, S Kumar… - Proceedings of the …, 2021 - dl.acm.org
The rise of social media has changed the nature of the fashion industry. Influence is no longer concentrated in the hands of an elite few: social networks have distributed power …
MI Yousuf, S Kim - Data mining and knowledge discovery, 2020 - Springer
Large real-world graphs claim lots of resources in terms of memory and computational power to study them and this makes their full analysis extremely challenging. In order to …
A large number of Twitter users are bots. They can send spam, manipulate public opinion, and contaminate the Twitter API stream that underline so many research works. One of the …
J Trienes, AT Cano, D Hiemstra - arXiv preprint arXiv:1811.09292, 2018 - arxiv.org
To foster an active and engaged community, social networks employ recommendation algorithms that filter large amounts of contents and provide a user with personalized views of …
HN Le, V Zalyubovskiy, H Choo - … International Conference on …, 2012 - ieeexplore.ieee.org
Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy …