Syntactic clustering of the Web
Selected papers from the sixth international conference on World Wide Web
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Collection statistics for fast duplicate document detection
ACM Transactions on Information Systems (TOIS)
Promoting Recommendations: An Attack on Collaborative Filtering
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Spam, damn spam, and statistics: using statistical analysis to locate spam web pages
Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004
Identifying link farm spam pages
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Finding group shilling in recommendation system
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Discovering large dense subgraphs in massive graphs
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Detecting spam web pages through content analysis
Proceedings of the 15th international conference on World Wide Web
Link spam detection based on mass estimation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Lies and propaganda: detecting spam users in collaborative filtering
Proceedings of the 12th international conference on Intelligent user interfaces
The worst-case time complexity for generating all maximal cliques and computational experiments
Theoretical Computer Science - Computing and combinatorics
Spam Filtering Using Statistical Data Compression Models
The Journal of Machine Learning Research
MapReduce: simplified data processing on large clusters
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Attacking Recommender Systems: A Cost-Benefit Analysis
IEEE Intelligent Systems
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Link analysis for Web spam detection
ACM Transactions on the Web (TWEB)
CSV: visualizing and mining cohesive subgraphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
SpotSigs: robust and efficient near duplicate detection in large web collections
Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval
Introduction to Information Retrieval
Introduction to Information Retrieval
Combating spam in tagging systems: An evaluation
ACM Transactions on the Web (TWEB)
Inaccuracies of Shape Averaging Method Using Dynamic Time Warping for Time Series Data
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007
Email Spam Filtering: A Systematic Review
Foundations and Trends in Information Retrieval
Strategies for Effective Shilling Attacks against Recommender Systems
Privacy, Security, and Trust in KDD
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Unsupervised shilling detection for collaborative filtering
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
The SocialTrust framework for trusted social information management: Architecture and algorithms
Information Sciences: an International Journal
A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduce
FCST '09 Proceedings of the 2009 Fourth International Conference on Frontier of Computer Science and Technology
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
Efficient partial-duplicate detection based on sequence matching
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
You are where you tweet: a content-based approach to geo-locating twitter users
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Detecting product review spammers using rating behaviors
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Proceedings of the 20th international conference companion on World wide web
Information credibility on twitter
Proceedings of the 20th international conference on World wide web
Distortion as a validation criterion in the identification of suspicious reviews
Proceedings of the First Workshop on Social Media Analytics
Dirty jobs: the role of freelance labor in web service abuse
SEC'11 Proceedings of the 20th USENIX conference on Security
Content-driven detection of campaigns in social media
Proceedings of the 20th ACM international conference on Information and knowledge management
Serf and turf: crowdturfing for fun and profit
Proceedings of the 21st international conference on World Wide Web
Hi-index | 0.00 |
In this manuscript, we study the problem of detecting coordinated free text campaigns in large-scale social media. These campaigns—ranging from coordinated spam messages to promotional and advertising campaigns to political astro-turfing—are growing in significance and reach with the commensurate rise in massive-scale social systems. Specifically, we propose and evaluate a content-driven framework for effectively linking free text posts with common “talking points” and extracting campaigns from large-scale social media. Three of the salient features of the campaign extraction framework are: (i) first, we investigate graph mining techniques for isolating coherent campaigns from large message-based graphs; (ii) second, we conduct a comprehensive comparative study of text-based message correlation in message and user levels; and (iii) finally, we analyze temporal behaviors of various campaign types. Through an experimental study over millions of Twitter messages we identify five major types of campaigns—namely Spam, Promotion, Template, News, and Celebrity campaigns—and we show how these campaigns may be extracted with high precision and recall.