Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Combating disinformation in a social media age
The creation, dissemination, and consumption of disinformation and fabricated content on
social media is a growing concern, especially with the ease of access to such sources, and …
social media is a growing concern, especially with the ease of access to such sources, and …
The rise of social bots
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
Tranco: A research-oriented top sites ranking hardened against manipulation
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …
Online human-bot interactions: Detection, estimation, and characterization
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …
by autonomous entities known as social bots. In this work we present a framework to detect …
Deep neural networks for bot detection
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …
disguising as human users, has strong implications. For example, bots have been used to …
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race
Recent studies in social media spam and automation provide anecdotal argumentation of
the rise of a new generation of spambots, so-called social spambots. Here, for the first time …
the rise of a new generation of spambots, so-called social spambots. Here, for the first time …
Fraudar: Bounding graph fraud in the face of camouflage
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
Unpacking the social media bot: A typology to guide research and policy
Amid widespread reports of digital influence operations during major elections,
policymakers, scholars, and journalists have become increasingly interested in the political …
policymakers, scholars, and journalists have become increasingly interested in the political …
Xblock-eth: Extracting and exploring blockchain data from ethereum
Blockchain-based cryptocurrencies have received extensive attention recently. Massive data
has been stored on permission-less blockchains. The analysis of massive blockchain data …
has been stored on permission-less blockchains. The analysis of massive blockchain data …
Graphfl: A federated learning framework for semi-supervised node classification on graphs
Graph-based semi-supervised node classification (GraphSSC) has wide applications,
ranging from networking and security to data mining and machine learning, etc. However …
ranging from networking and security to data mining and machine learning, etc. However …