Online social networks: threats and solutions

M Fire, R Goldschmidt, Y Elovici - … Communications Surveys & …, 2014 - ieeexplore.ieee.org
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …

[HTML][HTML] Metaverse governance: An empirical analysis of voting within Decentralized Autonomous Organizations

M Goldberg, F Schär - Journal of Business Research, 2023 - Elsevier
In this paper we explore the importance of platform governance. We discuss various
problems of centralized architecture in the context of the metaverse or sharing economy …

The limitations of federated learning in sybil settings

C Fung, CJM Yoon, I Beschastnikh - 23rd International Symposium on …, 2020 - usenix.org
Federated learning over distributed multi-party data is an emerging paradigm that iteratively
aggregates updates from a group of devices to train a globally shared model. Relying on a …

Mitigating sybils in federated learning poisoning

C Fung, CJM Yoon, I Beschastnikh - arxiv preprint arxiv:1808.04866, 2018 - arxiv.org
Machine learning (ML) over distributed multi-party data is required for a variety of domains.
Existing approaches, such as federated learning, collect the outputs computed by a group of …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Fraudar: Bounding graph fraud in the face of camouflage

B Hooi, HA Song, A Beutel, N Shah, K Shin… - Proceedings of the …, 2016 - dl.acm.org
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

TrustChain: A Sybil-resistant scalable blockchain

P Otte, M de Vos, J Pouwelse - Future Generation Computer Systems, 2020 - Elsevier
TrustChain is capable of creating trusted transactions among strangers without central
control. This enables new areas of blockchain use with a focus on building trust between …

Aiding the detection of fake accounts in large scale social online services

Q Cao, M Sirivianos, X Yang, T Pregueiro - 9th USENIX symposium on …, 2012 - usenix.org
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …