Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling
ACM SIGKDD Conference on Knowledge Discovery and Data Mining(2017)
摘要
• What is worth of inspections in our data … – Social spam/fake reviews: Twitter, Weibo, Amazon, etc … Meng Jiang, Peng Cui, and Christos Faloutsos. “Suspicious behavior detection: current trends and future … Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, Christos Faloutsos. “Copycatch: stopping group attacks by spotting lockstep behavior in social networks”, WWW 2013 … • “Temporal Bipartite Core”: n users, m pages, ρ … A: One option: Blocks/Staircases caught by LockInfer … Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang. “CatchSync: Catching Synchronized Behavior in Large Directed Graphs”, KDD 2014 Best Paper Finalist … Stringhini et al. NDSS'13; Yang and Wilson … [Faloutsos et al. SIGCOMM'99; Chung et al. PNAS'02] … How We/They Connect to Our/Their … The HITS algorithm. Kleinberg. “Authoritative sources in a hyperlinked environment.”
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络