Computer Science ›› 2018, Vol. 45 ›› Issue (12): 111-116.doi: 10.11896/j.issn.1002-137X.2018.12.017
• Information Security • Previous Articles Next Articles
XIA Chong-huan, LI Hua-kang, SUN Guo-zi
CLC Number:
[1]WANG Y L,ZHANG M.Summary of the Current ResearchStatus of Weibo in China [J].Library Science Research,2014(12):2-8.(in Chinese) 王莹莉,张敏.国内微博研究现状综述[J].图书馆学研究,2014(12):2-8. [2]Wikipedia:Spamming[EB/OL].[2017-03-25].http://en.wik-ipedia.org/wiki/Spamming. [3]CHU Z,GIANVECCHIO S,WANG H N,et al.Detecting Automation of Twitter Accounts:ARE you a human,bot,or cyborg?[J].IEEE Transactions on Dependable and Secure Computing,2012,9(6):811-824. [4]ZHU X,TANG J,LIU H.Leveraging knowledge across media for spammer detection in microbiogging[C]∥Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval.ACM,2014:547-556. [5]WANG A H.Don’t follow me:Spam detection in Twitter[C]∥Secrypt 2010-Proceedings of the International Conference on Security and Cryptography.2010:1-10. [6]ZHENG X,ZENG Z,CHEN Z,et al.Detecting spammers on social networks[J].Neurocomputing,2015,159(C):27-34. [7]ZHANG X Y,CHE X,TIAN X Y.A Malicious User Identification Method Based on Weibo User Behavior [J].Natural Science Journal of Heilongjiang University,2014,10(1):250-254.(in Chinese) 张锡英,车鑫,田宪允.一种基于微博用户行为的恶意用户识别方法[J].黑龙江大学自然科学学报,2014,10(1):250-254. [8]CHU Z,GIANVECCHIO S,WANG H,et al.Who is tweeting on twitter:human,bot,or cyborg?[C]∥Twenty-Sixth Computer Security Applications Conference.2011:21-30. [9]LI G C.Weibo spam user behavior modeling and screening [D].Beijing:Beijing University of Posts and Telecommunications,2014.(in Chinese) 李冠辰.微博垃圾用户行为建模和甄别[D].北京:北京邮电大学,2014. [10]MCCORD M,CHUAH M.Spam detection on twitter using traditional classifiers [C]∥International Conference on Autonomic and Trusted Computing.2011:175-186. [11]ANTONAKAKI D,POLAKIS I,ATHANASOPOULOS E,etal.Social Network Analysis and Mining[J].International Journal of Advanced Computer Science & Applications,2016,6(1):48. [12]PERVEEN N,MISSEN M S,RASOOL Q,et al.SentimentBased Twitter Spam Detection[J].International Journal of Advanced Computer Science & Applications,2016,7(7):568-573. [13]FU H,XIE X,RUI Y.Leveraging Careful Microblog Users for Spammer Detection[C]∥Proceedings of the 24th International Conference on World Wide Web Companion.International World Wide Web Conferences Steering Committee,2015:419-429. [14]MOH T S,MURMANN A J.Can you judge a man by hisfriends?-enhancing spammer detection on the twitter microblogging platform using friends and followers [M]∥Information Systems,Technology and Management.Springer Berlin Heidelberg,2010:210-220. [15]BECCHETTI L,BOLDI P,CASTILLO C,et al.Efficient semi-streaming algorithms for local triangle counting in massive graphs[C]∥Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2008:16-24. [16]HU X,TANG J,ZHANG Y,et al.Social spammer detection in microblogging[C]∥Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence.AAAI Press,2013:2633-2639. [17]ZHANG X,LI Z,ZHU S,et al.Detecting Spam and Promoting Campaigns in Twitter[J].Acm Transactions on the Web,2016,10(1):4-8. [18]BENEVENUTO F,MAGNO G,RODRIGUES T,et al.Detecting spammers on twitter [C]∥International Joint Conference on Artificial Intelligence.2010:1723-1728. [19]HU X,TANG J,ZHANG Y,et al.Social spammer detection in microblogging [C]∥International Joint Conference on Artificial Intelligence.2013:1709-1714. [20]NESTEROV Y.Introductory lectures on convex optimization[M].IEEE Transactions on Dependable and Secure Computing,2007. [21]LIU K,YUAN Y Y,LIU P.A Weibo Bot-users Indentification Model Based on Random Forest [J].Acta Scientiarum Natura-lium Universitatis Pekinensis,2015,10(2):10-13.(in Chinese) 刘勘,哀蕴英,刘萍.基于随机森林分类的微博机器用户识别研究[J].北京大学学报(自然科学版),2015,10(2):10-13. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[3] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[4] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[5] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[6] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[7] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[8] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[9] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[10] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[11] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[12] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[13] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[14] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
[15] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
|