The rise of social bots
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
Fawkes: Protecting privacy against unauthorized deep learning models
Today's proliferation of powerful facial recognition systems poses a real threat to personal
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …
Online human-bot interactions: Detection, estimation, and characterization
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …
by autonomous entities known as social bots. In this work we present a framework to detect …
Deep neural networks for bot detection
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …
disguising as human users, has strong implications. For example, bots have been used to …
Deep learning based inference of private information using embedded sensors in smart devices
Smart mobile devices and mobile apps have been rolling out at swift speeds over the last
decade, turning these devices into convenient and general-purpose computing platforms …
decade, turning these devices into convenient and general-purpose computing platforms …
Poisoning attacks to graph-based recommender systems
Recommender system is an important component of many web services to help users locate
items that match their interests. Several studies showed that recommender systems are …
items that match their interests. Several studies showed that recommender systems are …
Data poisoning attacks to deep learning based recommender systems
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
Online social networks: threats and solutions
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …
exist in these networks, including privacy violations, identity theft, and sexual harassment …