The rise of social bots

E Ferrara, O Varol, C Davis, F Menczer… - Communications of the …, 2016 - dl.acm.org
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …

Evolutionary network analysis: A survey

C Aggarwal, K Subbian - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Evolutionary network analysis has found an increasing interest in the literature because of
the importance of different kinds of dynamic social networks, email networks, biological …

Online human-bot interactions: Detection, estimation, and characterization

O Varol, E Ferrara, C Davis, F Menczer… - Proceedings of the …, 2017 - ojs.aaai.org
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …

Csi: A hybrid deep model for fake news detection

N Ruchansky, S Seo, Y Liu - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
The topic of fake news has drawn attention both from the public and the academic
communities. Such misinformation has the potential of affecting public opinion, providing an …

False information on web and social media: A survey

S Kumar, N Shah - arxiv preprint arxiv:1804.08559, 2018 - arxiv.org
False information can be created and spread easily through the web and social media
platforms, resulting in widespread real-world impact. Characterizing how false information …

Deep neural networks for bot detection

S Kudugunta, E Ferrara - Information Sciences, 2018 - Elsevier
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

S Cresci, R Di Pietro, M Petrocchi… - Proceedings of the 26th …, 2017 - dl.acm.org
Recent studies in social media spam and automation provide anecdotal argumentation of
the rise of a new generation of spambots, so-called social spambots. Here, for the first time …

Fraudar: Bounding graph fraud in the face of camouflage

B Hooi, HA Song, A Beutel, N Shah, K Shin… - Proceedings of the …, 2016 - dl.acm.org
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …

Rumor gauge: Predicting the veracity of rumors on Twitter

S Vosoughi, MN Mohsenvand, D Roy - ACM transactions on knowledge …, 2017 - dl.acm.org
The spread of malicious or accidental misinformation in social media, especially in time-
sensitive situations, such as real-world emergencies, can have harmful effects on individuals …

Uncovering large groups of active malicious accounts in online social networks

Q Cao, X Yang, J Yu, C Palow - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
The success of online social networks has attracted a constant interest in attacking and
exploiting them. Attackers usually control malicious accounts, including both fake and …