The rise of social bots

E Ferrara, O Varol, C Davis, F Menczer… - Communications of the …, 2016 - dl.acm.org
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

Fawkes: Protecting privacy against unauthorized deep learning models

S Shan, E Wenger, J Zhang, H Li, H Zheng… - 29th USENIX security …, 2020 - usenix.org
Today's proliferation of powerful facial recognition systems poses a real threat to personal
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …

Online human-bot interactions: Detection, estimation, and characterization

O Varol, E Ferrara, C Davis, F Menczer… - Proceedings of the …, 2017 - ojs.aaai.org
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …

Deep neural networks for bot detection

S Kudugunta, E Ferrara - Information Sciences, 2018 - Elsevier
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …

Deep learning based inference of private information using embedded sensors in smart devices

Y Liang, Z Cai, J Yu, Q Han, Y Li - IEEE Network, 2018 - ieeexplore.ieee.org
Smart mobile devices and mobile apps have been rolling out at swift speeds over the last
decade, turning these devices into convenient and general-purpose computing platforms …

Poisoning attacks to graph-based recommender systems

M Fang, G Yang, NZ Gong, J Liu - … of the 34th annual computer security …, 2018 - dl.acm.org
Recommender system is an important component of many web services to help users locate
items that match their interests. Several studies showed that recommender systems are …

Data poisoning attacks to deep learning based recommender systems

H Huang, J Mu, NZ Gong, Q Li, B Liu, M Xu - ar** users to find their interested
information in various web services such as Amazon, YouTube, and Google News. Various …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Online social networks: threats and solutions

M Fire, R Goldschmidt, Y Elovici - … Communications Surveys & …, 2014 - ieeexplore.ieee.org
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …