Results 1 - 10
of
147
Aiding the detection of fake accounts in large scale social online services.
- In NSDI,
, 2012
"... Abstract Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their business models on the marketability of this information. However, OSNs suffer from abuse in the form of the creation of fake accounts, which do ..."
Abstract
-
Cited by 36 (3 self)
- Add to MetaCart
Abstract Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their business models on the marketability of this information. However, OSNs suffer from abuse in the form of the creation of fake accounts, which
Abstract The Role of User Profiles for News Filtering
"... Most online news sources are electronic versions of “ink-on-paper ” newspapers. These are versions that have been filtered, from the mass of news produced each day, by an editorial board with a given community profile in mind. As readers, we choose the filter rather than choose the stories. New tech ..."
Abstract
- Add to MetaCart
technology, however, provides the potential for personalized versions to be filtered automatically from this mass of news on the basis of user profiles. People read the news for many reasons: to find out “what's going on”, to be knowledgeable members of a community, and because the activity itself
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy
"... In today’s world, online social media plays a vital role during real world events, especially crisis events. There are both positive and negative effects of social media coverage of events, it can be used by authorities for effective disaster management or by malicious entities to spread rumors and ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
and fake news. The aim of this paper, is to highlight the role of Twitter, during Hurricane Sandy (2012) to spread fake images about the disaster. We identified 10,350 unique tweets containing fake images that were circulated on Twitter, during Hurricane Sandy. We performed a characterization analysis
FAKE FACE DATABASE AND PRE- PROCESSING
"... Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face tam ..."
Abstract
- Add to MetaCart
Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face
Twitter Spammer Profile Detection
, 2010
"... Twitter is a free microblogging service that allows users to post messages, called tweets, up to 140 characters in length. Its value is in its ease of sharing and accessing user-generated content, including opinions, news, and trending topics. Thus, Twitter provides an opportunity to generate large ..."
Abstract
- Add to MetaCart
Twitter is a free microblogging service that allows users to post messages, called tweets, up to 140 characters in length. Its value is in its ease of sharing and accessing user-generated content, including opinions, news, and trending topics. Thus, Twitter provides an opportunity to generate large
Detecting Fake Check-Ins in Location-based Social Networks Through Honeypot Venues
"... The proliferation of location-based social networks (LBSNs) has offered many conveniences to its participants, such as place recommendation, tracking of friends, monetary rewards from venues visited and a cheap way of advertisement for local businesses. However, users can misuse the offered features ..."
Abstract
- Add to MetaCart
features and the major threat for the service providers is that of fake check-ins. Users can easily manipulate the localization module of the underlying application and declare their presence in a counterfeit location. The incentives for these behaviors can be both earning monetary rewards as well
Event Detection with Common User Interests
"... In this paper, we aim at detecting events of common user interests from huge volume of user-generated content. The degree of interest from common users in an event is evi-denced by a significant surge of event-related queries issued to search for documents (e.g., news articles, blog posts) rel-evant ..."
Abstract
- Add to MetaCart
In this paper, we aim at detecting events of common user interests from huge volume of user-generated content. The degree of interest from common users in an event is evi-denced by a significant surge of event-related queries issued to search for documents (e.g., news articles, blog posts) rel
Detecting User Communities Based on Latent and Dynamic Interest on a News Portal
"... This paper describes our work on identifying communities of individuals based on their interests while browsing the web. A user can belong to several communities at a time, where each community represents parts of his interests. We assume that recommendations coming from such communities are more ac ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
accurate than from communities based on a whole user profile. We describe how to record and identify particular interests for each user. Interests evolve from analysis of the resources that the user has viewed in the past and are defined as cluster of keywords. Based on the time period we model short term
DetectingSocialNetworkProfile Cloning
"... Abstract—Social networking is one of the most popular Internet activities, with millions of users from around the world. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with a plethora of informat ..."
Abstract
- Add to MetaCart
of information that aims at providing a complete and accurate representation of themselves. Attackers may duplicate a user’s online presence in the same or across different social networks and, therefore, fool other users into forming trusting social relations with the fake profile. By abusing that implicit
PHONEY: mimicking user response to detect phishing attacks
- In the Proceedings of the 2006 International Symposium on the World of Wireless, Mobile and Multimedia Networks, IEEE Computer Society
, 2006
"... Phishing scams pose a serious threat to end-users and commercial institutions alike. Email continues to be the fa-vorite vehicle to perpetrate such scams mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been propo ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
proposed to address this problem. However, phishing techniques, growing in ingenuity as well as so-phistication, render these solutions weak. In this paper we propose a novel approach to detect phishing attacks using fake responses which mimic real users, essentially, revers-ing the role of the victim
Results 1 - 10
of
147