We present, GEM, the first heterogeneous graph neural network approach for detecting malicious accounts at Alipay, one of the world's leading mobile cashless payment platform …
Recommender system is an important component of many web services to help users locate items that match their interests. Several studies showed that recommender systems are …
abstract As the Internet has transformed into a critical infrastructure, society has become more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Training machine learning (ML) models is expensive in terms of computational power, amounts of labeled data and human expertise. Thus, ML models constitute business value …
Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can …
Online meeting tools like Zoom and Google Meet have become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale …
Growing evidence points to recurring influence campaigns on social media, often sponsored by state actors aiming to manipulate public opinion on sensitive political topics. Typically …
D Yuan, Y Miao, NZ Gong, Z Yang, Q Li… - Proceedings of the …, 2019 - dl.acm.org
Online social networks are plagued by fake information. In particu-lar, using massive fake accounts (also called Sybils), an attacker can disrupt the security and privacy of benign …
seek to influence and polarize political topics through massive coordinated efforts. In the process, these efforts leave behind artifacts, which researchers have leveraged to analyze …