• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 147
Next 10 →

Aiding the detection of fake accounts in large scale social online services.

by Qiang Cao , Michael Sirivianos , Xiaowei Yang , Tiago Pregueiro - In NSDI, , 2012
"... Abstract Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their business models on the marketability of this information. However, OSNs suffer from abuse in the form of the creation of fake accounts, which do ..."
Abstract - Cited by 36 (3 self) - Add to MetaCart
Abstract Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their business models on the marketability of this information. However, OSNs suffer from abuse in the form of the creation of fake accounts, which

Abstract The Role of User Profiles for News Filtering

by John F. (jack Duffy, Carolyn Watters, Nitin Gugle
"... Most online news sources are electronic versions of “ink-on-paper ” newspapers. These are versions that have been filtered, from the mass of news produced each day, by an editorial board with a given community profile in mind. As readers, we choose the filter rather than choose the stories. New tech ..."
Abstract - Add to MetaCart
technology, however, provides the potential for personalized versions to be filtered automatically from this mass of news on the basis of user profiles. People read the news for many reasons: to find out “what's going on”, to be knowledgeable members of a community, and because the activity itself

Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy

by Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, Anupam Joshi
"... In today’s world, online social media plays a vital role during real world events, especially crisis events. There are both positive and negative effects of social media coverage of events, it can be used by authorities for effective disaster management or by malicious entities to spread rumors and ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
and fake news. The aim of this paper, is to highlight the role of Twitter, during Hurricane Sandy (2012) to spread fake images about the disaster. We identified 10,350 unique tweets containing fake images that were circulated on Twitter, during Hurricane Sandy. We performed a characterization analysis

FAKE FACE DATABASE AND PRE- PROCESSING

by Aruni Singh, Sanjay Kumar Singh, Shrikant Tiwari
"... Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face tam ..."
Abstract - Add to MetaCart
Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face

Twitter Spammer Profile Detection

by Grace Gee, Hakson Teh , 2010
"... Twitter is a free microblogging service that allows users to post messages, called tweets, up to 140 characters in length. Its value is in its ease of sharing and accessing user-generated content, including opinions, news, and trending topics. Thus, Twitter provides an opportunity to generate large ..."
Abstract - Add to MetaCart
Twitter is a free microblogging service that allows users to post messages, called tweets, up to 140 characters in length. Its value is in its ease of sharing and accessing user-generated content, including opinions, news, and trending topics. Thus, Twitter provides an opportunity to generate large

Detecting Fake Check-Ins in Location-based Social Networks Through Honeypot Venues

by Ke Zhang, Konstantinos Pelechrinis, Prashant Krishnamurthy
"... The proliferation of location-based social networks (LBSNs) has offered many conveniences to its participants, such as place recommendation, tracking of friends, monetary rewards from venues visited and a cheap way of advertisement for local businesses. However, users can misuse the offered features ..."
Abstract - Add to MetaCart
features and the major threat for the service providers is that of fake check-ins. Users can easily manipulate the localization module of the underlying application and declare their presence in a counterfeit location. The incentives for these behaviors can be both earning monetary rewards as well

Event Detection with Common User Interests

by Meishan Hu, Aixin Sun, Ee-peng Lim
"... In this paper, we aim at detecting events of common user interests from huge volume of user-generated content. The degree of interest from common users in an event is evi-denced by a significant surge of event-related queries issued to search for documents (e.g., news articles, blog posts) rel-evant ..."
Abstract - Add to MetaCart
In this paper, we aim at detecting events of common user interests from huge volume of user-generated content. The degree of interest from common users in an event is evi-denced by a significant surge of event-related queries issued to search for documents (e.g., news articles, blog posts) rel

Detecting User Communities Based on Latent and Dynamic Interest on a News Portal

by Marián Hönsch
"... This paper describes our work on identifying communities of individuals based on their interests while browsing the web. A user can belong to several communities at a time, where each community represents parts of his interests. We assume that recommendations coming from such communities are more ac ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
accurate than from communities based on a whole user profile. We describe how to record and identify particular interests for each user. Interests evolve from analysis of the resources that the user has viewed in the past and are defined as cluster of keywords. Based on the time period we model short term

DetectingSocialNetworkProfile Cloning

by Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, Evangelos P. Markatos
"... Abstract—Social networking is one of the most popular Internet activities, with millions of users from around the world. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with a plethora of informat ..."
Abstract - Add to MetaCart
of information that aims at providing a complete and accurate representation of themselves. Attackers may duplicate a user’s online presence in the same or across different social networks and, therefore, fool other users into forming trusting social relations with the fake profile. By abusing that implicit

PHONEY: mimicking user response to detect phishing attacks

by Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu Upadhyaya - In the Proceedings of the 2006 International Symposium on the World of Wireless, Mobile and Multimedia Networks, IEEE Computer Society , 2006
"... Phishing scams pose a serious threat to end-users and commercial institutions alike. Email continues to be the fa-vorite vehicle to perpetrate such scams mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been propo ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
proposed to address this problem. However, phishing techniques, growing in ingenuity as well as so-phistication, render these solutions weak. In this paper we propose a novel approach to detect phishing attacks using fake responses which mimic real users, essentially, revers-ing the role of the victim
Next 10 →
Results 1 - 10 of 147
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University