Fake profile detection on social networking websites: a comprehensive review
This article aims to summarize the recent advancement in the fake account detection
methodology on social networking websites. Over the past decade, social networking …
methodology on social networking websites. Over the past decade, social networking …
Detecting social bots on twitter: a literature review
Due to the exponential growth in the popularity of online social networks (OSNs), such as
Twitter and Facebook, the number of machine accounts that are designed to mimic human …
Twitter and Facebook, the number of machine accounts that are designed to mimic human …
Spotfake: A multi-modal framework for fake news detection
A rapid growth in the amount of fake news on social media is a very serious concern in our
society. It is usually created by manipulating images, text, audio, and videos. This indicates …
society. It is usually created by manipulating images, text, audio, and videos. This indicates …
Backdoor attacks to graph neural networks
In this work, we propose the first backdoor attack to graph neural networks (GNN).
Specifically, we propose a subgraph based backdoor attack to GNN for graph classification …
Specifically, we propose a subgraph based backdoor attack to GNN for graph classification …
Trends in combating fake news on social media–a survey
Social media following its introduction has witnessed a lot of scholarly attention in recent
years due to its growing popularity. These various social media sites have become the …
years due to its growing popularity. These various social media sites have become the …
Data poisoning attacks to deep learning based recommender systems
Graphfl: A federated learning framework for semi-supervised node classification on graphs
Graph-based semi-supervised node classification (GraphSSC) has wide applications,
ranging from networking and security to data mining and machine learning, etc. However …
ranging from networking and security to data mining and machine learning, etc. However …
Attacking graph-based classification via manipulating the graph structure
Graph-based classification methods are widely used for security analytics. Roughly
speaking, graph-based classification methods include collective classification and graph …
speaking, graph-based classification methods include collective classification and graph …
Hybrid approach for detection of malicious profiles in twitter
SR Sahoo, BB Gupta - Computers & Electrical Engineering, 2019 - Elsevier
Emergence of social media invokes social actors to share their information digitally.
Moreover, it enables them to maintain their links with other people worldwide. Due to its …
Moreover, it enables them to maintain their links with other people worldwide. Due to its …
Friend or faux: Graph-based early detection of fake accounts on social networks
In this paper, we study the problem of early detection of fake user accounts on social
networks based solely on their network connectivity with other users. Removing such …
networks based solely on their network connectivity with other users. Removing such …