A review on social spam detection: Challenges, open issues, and future directions

S Rao, AK Verma, T Bhatia - Expert Systems with Applications, 2021 - Elsevier
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

Social network security: Issues, challenges, threats, and solutions

S Rathore, PK Sharma, V Loia, YS Jeong, JH Park - Information sciences, 2017 - Elsevier
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …

Attacking graph-based classification via manipulating the graph structure

B Wang, NZ Gong - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Graph-based classification methods are widely used for security analytics. Roughly
speaking, graph-based classification methods include collective classification and graph …

{Back-Propagating} system dependency impact for attack investigation

P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang… - 31st USENIX Security …, 2022 - usenix.org
Causality analysis on system auditing data has emerged as an important solution for attack
investigation. Given a POI (Point-Of-Interest) event (eg, an alert fired on a suspicious file …

Random walk based fake account detection in online social networks

J Jia, B Wang, NZ Gong - 2017 47th annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
Online social networks are known to be vulnerable to the so-called Sybil attack, in which an
attacker maintains massive fake accounts (also called Sybils) and uses them to perform …

Friend or faux: Graph-based early detection of fake accounts on social networks

A Breuer, R Eilat, U Weinsberg - Proceedings of The Web Conference …, 2020 - dl.acm.org
In this paper, we study the problem of early detection of fake user accounts on social
networks based solely on their network connectivity with other users. Removing such …

Using latent dirichlet allocation for automatic categorization of software

K Tian, M Revelle, D Poshyvanyk - 2009 6th IEEE international …, 2009 - ieeexplore.ieee.org
In this paper, we propose a technique called LACT for automatically categorizing software
systems in open-source repositories. LACT is based on latent Dirichlet Allocation, an …

Detecting fake accounts in online social networks at the time of registrations

D Yuan, Y Miao, NZ Gong, Z Yang, Q Li… - Proceedings of the …, 2019 - dl.acm.org
Online social networks are plagued by fake information. In particu-lar, using massive fake
accounts (also called Sybils), an attacker can disrupt the security and privacy of benign …

{DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks

J Mink, L Luo, NM Barbosa, O Figueira… - 31st USENIX Security …, 2022 - usenix.org
Fabricated media from deep learning models, or deepfakes, have been recently applied to
facilitate social engineering efforts by constructing a trusted social persona. While existing …