Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Hamidreza Alvari, Elham Shaabani, Paulo Shakarian

Erschienen in: Identification of Pathogenic Social Media Accounts

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent years have witnessed an exponential growth of online platforms such as online social networks (OSNs) and microblogging websites. These platforms play a major role in online communication and information sharing as they have become large-scale and real-time communication tools. This leads to massive user-generated data produced on a daily basis and via different forms that are rich sources of information and can be used in different tasks from marketing to research. On the negative side, online platforms have become widespread tools exploited by various malicious actors who orchestrate societal-significant threats leading to numerous security and privacy issues.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat H. Alvari, P. Shakarian, Hawkes process for understanding the influence of pathogenic social media accounts, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), pp. 36–42, June 2019 H. Alvari, P. Shakarian, Hawkes process for understanding the influence of pathogenic social media accounts, in 2019 2nd International Conference on Data Intelligence and Security (ICDIS), pp. 36–42, June 2019
2.
Zurück zum Zitat H. Alvari, S. Hashemi, A. Hamzeh, Detecting overlapping communities in social networks by game theory and structural equivalence concept, in International Conference on Artificial Intelligence and Computational Intelligence (Springer, 2011), pp. 620–630 H. Alvari, S. Hashemi, A. Hamzeh, Detecting overlapping communities in social networks by game theory and structural equivalence concept, in International Conference on Artificial Intelligence and Computational Intelligence (Springer, 2011), pp. 620–630
3.
Zurück zum Zitat H. Alvari, A. Hajibagheri, G. Sukthankar, K. Lakkaraju, Identifying community structures in dynamic networks. Soc. Netw. Anal. Min. 6(1), 77 (2016) H. Alvari, A. Hajibagheri, G. Sukthankar, K. Lakkaraju, Identifying community structures in dynamic networks. Soc. Netw. Anal. Min. 6(1), 77 (2016)
4.
Zurück zum Zitat H. Alvari, P. Shakarian, J. Snyder, A non-parametric learning approach to identify online human trafficking, in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 133–138 (2016) H. Alvari, P. Shakarian, J. Snyder, A non-parametric learning approach to identify online human trafficking, in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 133–138 (2016)
5.
Zurück zum Zitat H. Alvari, E. Shaabani, P. Shakarian, Early identification of pathogenic social media accounts. IEEE Intelligent and Security Informatics (2018). arXiv:1809.09331 H. Alvari, E. Shaabani, P. Shakarian, Early identification of pathogenic social media accounts. IEEE Intelligent and Security Informatics (2018). arXiv:1809.09331
6.
Zurück zum Zitat H. Alvari, S. Sarkar, P. Shakarian, Detection of violent extremists in social media, in IEEE Conference on Data Intelligence and Security (2019) H. Alvari, S. Sarkar, P. Shakarian, Detection of violent extremists in social media, in IEEE Conference on Data Intelligence and Security (2019)
7.
Zurück zum Zitat H. Alvari, E. Shaabani, S. Sarkar, G. Beigi, P. Shakarian, Less is more: Semi-supervised causal inference for detecting pathogenic users in social media, in Companion Proceedings of The 2019 World Wide Web Conference (ACM, 2019), pp. 154–161 H. Alvari, E. Shaabani, S. Sarkar, G. Beigi, P. Shakarian, Less is more: Semi-supervised causal inference for detecting pathogenic users in social media, in Companion Proceedings of The 2019 World Wide Web Conference (ACM, 2019), pp. 154–161
8.
Zurück zum Zitat E. Bacry, T. Jaisson, J.-F. Muzy, Estimation of slowly decreasing Hawkes kernels: application to high-frequency order book dynamics. Quantitative Finance 16(8), 1179–1201 (2016)MathSciNetCrossRef E. Bacry, T. Jaisson, J.-F. Muzy, Estimation of slowly decreasing Hawkes kernels: application to high-frequency order book dynamics. Quantitative Finance 16(8), 1179–1201 (2016)MathSciNetCrossRef
9.
Zurück zum Zitat G. Beigi, H. Liu, Similar but different: Exploiting users’ congruity for recommendation systems, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, 2018), pp. 129–140 G. Beigi, H. Liu, Similar but different: Exploiting users’ congruity for recommendation systems, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, 2018), pp. 129–140
10.
Zurück zum Zitat G. Beigi, H. Liu, A survey on privacy in social media: Identification, mitigation, and applications. ACM Trans. Data Sci. 1(1), 1–38 (2020)CrossRef G. Beigi, H. Liu, A survey on privacy in social media: Identification, mitigation, and applications. ACM Trans. Data Sci. 1(1), 1–38 (2020)CrossRef
11.
Zurück zum Zitat G. Beigi, M. Jalili, H. Alvari, G. Sukthankar, Leveraging community detection for accurate trust prediction, in In ASE International Conference on Social Computing, Palo Alto, CA (May 2014) G. Beigi, M. Jalili, H. Alvari, G. Sukthankar, Leveraging community detection for accurate trust prediction, in In ASE International Conference on Social Computing, Palo Alto, CA (May 2014)
12.
Zurück zum Zitat G. Beigi, K. Shu, Y. Zhang, H. Liu, Securing social media user data-an adversarial approach, in Proceedings of the 29th on Hypertext and Social Media, pp. 156–173 (2018) G. Beigi, K. Shu, Y. Zhang, H. Liu, Securing social media user data-an adversarial approach, in Proceedings of the 29th on Hypertext and Social Media, pp. 156–173 (2018)
13.
Zurück zum Zitat G. Beigi, R. Guo, A. Nou, Y. Zhang, H. Liu, Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles, in Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (ACM, 2019), pp. 213–221 G. Beigi, R. Guo, A. Nou, Y. Zhang, H. Liu, Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles, in Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (ACM, 2019), pp. 213–221
14.
Zurück zum Zitat G. Beigi, K. Shu, R. Guo, S. Wang, H. Liu, Privacy preserving text representation learning, in Proceedings of the 30th ACM Conference on Hypertext and Social Media, pp. 275–276 (2019) G. Beigi, K. Shu, R. Guo, S. Wang, H. Liu, Privacy preserving text representation learning, in Proceedings of the 30th ACM Conference on Hypertext and Social Media, pp. 275–276 (2019)
15.
Zurück zum Zitat G. Beigi, A. Mosallanezhad, R. Guo, H. Alvari, A. Nou, H. Liu, Privacy-aware recommendation with private-attribute protection using adversarial learning, in Proceedings of the Thirteenth ACM International Conference on Web Search and Data Mining (ACM, 2020) G. Beigi, A. Mosallanezhad, R. Guo, H. Alvari, A. Nou, H. Liu, Privacy-aware recommendation with private-attribute protection using adversarial learning, in Proceedings of the Thirteenth ACM International Conference on Web Search and Data Mining (ACM, 2020)
16.
Zurück zum Zitat G. Beigi, J. Tang, H. Liu, Social science–guided feature engineering: A novel approach to signed link analysis. ACM Trans. Intell. Syst. Technol. 11(1), 1–27 (Jan. 2020) G. Beigi, J. Tang, H. Liu, Social science–guided feature engineering: A novel approach to signed link analysis. ACM Trans. Intell. Syst. Technol. 11(1), 1–27 (Jan. 2020)
18.
Zurück zum Zitat D.A. Broniatowski, A.M. Jamison, S. Qi, L. AlKulaib, T. Chen, A. Benton, S.C. Quinn, M. Dredze, Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108(10), 1378–1384 (2018)CrossRef D.A. Broniatowski, A.M. Jamison, S. Qi, L. AlKulaib, T. Chen, A. Benton, S.C. Quinn, M. Dredze, Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108(10), 1378–1384 (2018)CrossRef
19.
Zurück zum Zitat Q. Cao, X. Yang, J. Yu, C. Palow, Uncovering large groups of active malicious accounts in online social networks, in CCS (2014) Q. Cao, X. Yang, J. Yu, C. Palow, Uncovering large groups of active malicious accounts in online social networks, in CCS (2014)
20.
Zurück zum Zitat C. Chen, K. Wu, S. Venkatesh, X. Zhang, Battling the internet water army: Detection of hidden paid posters. CoRR, abs/1111.4297 (2011) C. Chen, K. Wu, S. Venkatesh, X. Zhang, Battling the internet water army: Detection of hidden paid posters. CoRR, abs/1111.4297 (2011)
21.
Zurück zum Zitat C. Chen, K. Wu, S. Venkatesh, R.K. Bharadwaj, The best answers? think twice: online detection of commercial campaigns in the CQA forums, in ASONAM (2013) C. Chen, K. Wu, S. Venkatesh, R.K. Bharadwaj, The best answers? think twice: online detection of commercial campaigns in the CQA forums, in ASONAM (2013)
22.
Zurück zum Zitat Z. Chu, S. Gianvecchio, H. Wang, S. Jajodia, Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811–824 (2012)CrossRef Z. Chu, S. Gianvecchio, H. Wang, S. Jajodia, Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811–824 (2012)CrossRef
23.
Zurück zum Zitat P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, S. Yang, Cascading outbreak prediction in networks: A data-driven approach, in KDD (2013) P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, S. Yang, Cascading outbreak prediction in networks: A data-driven approach, in KDD (2013)
24.
Zurück zum Zitat D.J. Daley, D. Vere-Jones, An Introduction to the Theory of Point Processes: Volume II: General Theory and Structure (Springer Science & Business Media, 2007) D.J. Daley, D. Vere-Jones, An Introduction to the Theory of Point Processes: Volume II: General Theory and Structure (Springer Science & Business Media, 2007)
25.
Zurück zum Zitat J.P. Dickerson, V. Kagan, V.S. Subrahmanian, Using sentiment to detect bots on twitter: Are humans more opinionated than bots? in ASONAM (2014) J.P. Dickerson, V. Kagan, V.S. Subrahmanian, Using sentiment to detect bots on twitter: Are humans more opinionated than bots? in ASONAM (2014)
26.
Zurück zum Zitat E. Ferrara, Disinformation and social bot operations in the run up to the 2017 French presidential election (2017) E. Ferrara, Disinformation and social bot operations in the run up to the 2017 French presidential election (2017)
28.
Zurück zum Zitat A. Goyal, F. Bonchi, L.V. Lakshmanan, Learning influence probabilities in social networks, in WSDM (2010) A. Goyal, F. Bonchi, L.V. Lakshmanan, Learning influence probabilities in social networks, in WSDM (2010)
29.
Zurück zum Zitat T. Green, F. Spezzano, Spam users identification in Wikipedia via editing behavior, in ICWSM (2017) T. Green, F. Spezzano, Spam users identification in Wikipedia via editing behavior, in ICWSM (2017)
30.
Zurück zum Zitat A. Gupta, H. Lamba, P. Kumaraguru, $1.00 per rt #bostonmarathon #prayforboston: Analyzing fake content on twitter, in 2013 APWG eCrime Researchers Summit (2013) A. Gupta, H. Lamba, P. Kumaraguru, $1.00 per rt #bostonmarathon #prayforboston: Analyzing fake content on twitter, in 2013 APWG eCrime Researchers Summit (2013)
31.
Zurück zum Zitat A. Gupta, P. Kumaraguru, C. Castillo, P. Meier, TweetCred: Real-Time Credibility Assessment of Content on Twitter (Springer International Publishing, 2014) A. Gupta, P. Kumaraguru, C. Castillo, P. Meier, TweetCred: Real-Time Credibility Assessment of Content on Twitter (Springer International Publishing, 2014)
32.
Zurück zum Zitat B. Hooi, H.A. Song, A. Beutel, N. Shah, K. Shin, C. Faloutsos, Fraudar: Bounding graph fraud in the face of camouflage, in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2016), pp. 895–904 B. Hooi, H.A. Song, A. Beutel, N. Shah, K. Shin, C. Faloutsos, Fraudar: Bounding graph fraud in the face of camouflage, in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2016), pp. 895–904
33.
Zurück zum Zitat D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in KDD (2003) D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in KDD (2003)
34.
Zurück zum Zitat M. Khader, Combating Violent Extremism and Radicalization in the Digital Era. Advances in Religious and Cultural Studies (IGI Global, 2016) M. Khader, Combating Violent Extremism and Radicalization in the Digital Era. Advances in Religious and Cultural Studies (IGI Global, 2016)
35.
Zurück zum Zitat J. Klausen, C. Marks, T. Zaman, Finding online extremists in social networks. CoRR, abs/1610.06242 (2016) J. Klausen, C. Marks, T. Zaman, Finding online extremists in social networks. CoRR, abs/1610.06242 (2016)
36.
Zurück zum Zitat S. Kleinberg, A logic for causal inference in time series with discrete and continuous variables, in IJCAI (2011) S. Kleinberg, A logic for causal inference in time series with discrete and continuous variables, in IJCAI (2011)
37.
Zurück zum Zitat S. Kleinberg, B. Mishra, The temporal logic of causal structures. CoRR, abs/1205.2634 (2012) S. Kleinberg, B. Mishra, The temporal logic of causal structures. CoRR, abs/1205.2634 (2012)
38.
Zurück zum Zitat T. Konishi, T. Iwata, K. Hayashi, K.-I. Kawarabayashi, Identifying key observers to find popular information in advance, in IJCAI (2016) T. Konishi, T. Iwata, K. Hayashi, K.-I. Kawarabayashi, Identifying key observers to find popular information in advance, in IJCAI (2016)
39.
Zurück zum Zitat S. Pei, L. Muchnik, J.S.A. Jr., Z. Zheng, H.A. Makse, Searching for superspreaders of information in real-world social media. CoRR (2014) S. Pei, L. Muchnik, J.S.A. Jr., Z. Zheng, H.A. Makse, Searching for superspreaders of information in real-world social media. CoRR (2014)
40.
Zurück zum Zitat J.R. Scanlon, M.S. Gerber, Automatic detection of cyber-recruitment by violent extremists. Security Informatics 3(1), 5 (2014) J.R. Scanlon, M.S. Gerber, Automatic detection of cyber-recruitment by violent extremists. Security Informatics 3(1), 5 (2014)
41.
Zurück zum Zitat J.R. Scanlon, M.S. Gerber, Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Sec. 10(11), 2461–2470 (2015)CrossRef J.R. Scanlon, M.S. Gerber, Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Sec. 10(11), 2461–2470 (2015)CrossRef
42.
Zurück zum Zitat E. Shaabani, R. Guo, P. Shakarian, Detecting pathogenic social media accounts without content or network structure, in 2018 1st International Conference on Data Intelligence and Security (ICDIS) (IEEE, 2018), pp. 57–64 E. Shaabani, R. Guo, P. Shakarian, Detecting pathogenic social media accounts without content or network structure, in 2018 1st International Conference on Data Intelligence and Security (ICDIS) (IEEE, 2018), pp. 57–64
43.
Zurück zum Zitat E. Shaabani, A. Sadeghi-Mobarakeh, H. Alvari, P. Shakarian, An end-to-end framework to identify pathogenic social media accounts on twitter, in IEEE Conference on Data Intelligence and Security (2019) E. Shaabani, A. Sadeghi-Mobarakeh, H. Alvari, P. Shakarian, An end-to-end framework to identify pathogenic social media accounts on twitter, in IEEE Conference on Data Intelligence and Security (2019)
44.
Zurück zum Zitat C. Shao, G.L. Ciampaglia, O. Varol, A. Flammini, F. Menczer, The spread of fake news by social bots. Preprint (2017). arXiv:1707.07592 C. Shao, G.L. Ciampaglia, O. Varol, A. Flammini, F. Menczer, The spread of fake news by social bots. Preprint (2017). arXiv:1707.07592
45.
Zurück zum Zitat A. Stanton, A. Thart, A. Jain, P. Vyas, A. Chatterjee, P. Shakarian, Mining for causal relationships: A data-driven study of the Islamic state. CoRR (2015) A. Stanton, A. Thart, A. Jain, P. Vyas, A. Chatterjee, P. Shakarian, Mining for causal relationships: A data-driven study of the Islamic state. CoRR (2015)
46.
Zurück zum Zitat V.S. Subrahmanian, A. Azaria, S. Durst, V. Kagan, A. Galstyan, K. Lerman, L. Zhu, E. Ferrara, A. Flammini, F. Menczer, The DARPA twitter bot challenge (2016) V.S. Subrahmanian, A. Azaria, S. Durst, V. Kagan, A. Galstyan, K. Lerman, L. Zhu, E. Ferrara, A. Flammini, F. Menczer, The DARPA twitter bot challenge (2016)
47.
Zurück zum Zitat L. Tran, M. Farajtabar, L. Song, H. Zha, NetCodec: Community detection from individual activities, in Proceedings of the 2015 SIAM International Conference on Data Mining (SIAM, 2015), pp. 91–99 L. Tran, M. Farajtabar, L. Song, H. Zha, NetCodec: Community detection from individual activities, in Proceedings of the 2015 SIAM International Conference on Data Mining (SIAM, 2015), pp. 91–99
48.
Zurück zum Zitat O. Varol, E. Ferrara, C.A. Davis, F. Menczer, A. Flammini, Online human-bot interactions: Detection, estimation, and characterization, in ICWSM (2017) O. Varol, E. Ferrara, C.A. Davis, F. Menczer, A. Flammini, Online human-bot interactions: Detection, estimation, and characterization, in ICWSM (2017)
49.
Zurück zum Zitat O. Varol, E. Ferrara, F. Menczer, A. Flammini, Early detection of promoted campaigns on social media. EPJ Data Sci. 6, 13 (2017)CrossRef O. Varol, E. Ferrara, F. Menczer, A. Flammini, Early detection of promoted campaigns on social media. EPJ Data Sci. 6, 13 (2017)CrossRef
50.
Zurück zum Zitat L. Weng, F. Menczer, Y.-Y. Ahn, Predicting successful memes using network and community structure, in ICWSM (2014) L. Weng, F. Menczer, Y.-Y. Ahn, Predicting successful memes using network and community structure, in ICWSM (2014)
51.
Zurück zum Zitat Z. Xia, C. Liu, N.Z. Gong, Q. Li, Y. Cui, D. Song, Characterizing and detecting malicious accounts in privacy-centric mobile social networks: A case study, in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (ACM, 2019), pp. 2012–2022 Z. Xia, C. Liu, N.Z. Gong, Q. Li, Y. Cui, D. Song, Characterizing and detecting malicious accounts in privacy-centric mobile social networks: A case study, in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (ACM, 2019), pp. 2012–2022
52.
Zurück zum Zitat S. Xiao, M. Farajtabar, X. Ye, J. Yan, L. Song, H. Zha, Wasserstein learning of deep generative point process models, in Advances in Neural Information Processing Systems, pp. 3247–3257 (2017) S. Xiao, M. Farajtabar, X. Ye, J. Yan, L. Song, H. Zha, Wasserstein learning of deep generative point process models, in Advances in Neural Information Processing Systems, pp. 3247–3257 (2017)
53.
Zurück zum Zitat H. Xu, M. Farajtabar, H. Zha, Learning granger causality for Hawkes processes, in International Conference on Machine Learning, pp. 1717–1726 (2016) H. Xu, M. Farajtabar, H. Zha, Learning granger causality for Hawkes processes, in International Conference on Machine Learning, pp. 1717–1726 (2016)
54.
Zurück zum Zitat X. Zhang, J. Zhu, Q. Wang, H. Zhao, Identifying influential nodes in complex networks with community structure. Know.-Based Syst. 42, 74–84 (2013)CrossRef X. Zhang, J. Zhu, Q. Wang, H. Zhao, Identifying influential nodes in complex networks with community structure. Know.-Based Syst. 42, 74–84 (2013)CrossRef
55.
Zurück zum Zitat K. Zhou, H. Zha, L. Song, Learning social infectivity in sparse low-rank networks using multi-dimensional Hawkes processes. Artif. Intell. Stat. 641–649 (2013) K. Zhou, H. Zha, L. Song, Learning social infectivity in sparse low-rank networks using multi-dimensional Hawkes processes. Artif. Intell. Stat. 641–649 (2013)
56.
Zurück zum Zitat K. Zhu, L. Ying, Information source detection in the sir model: A sample-path-based approach. IEEE/ACM Trans. Netw. 24(1), 408–421 (2016)CrossRef K. Zhu, L. Ying, Information source detection in the sir model: A sample-path-based approach. IEEE/ACM Trans. Netw. 24(1), 408–421 (2016)CrossRef
Metadaten
Titel
Introduction
verfasst von
Hamidreza Alvari
Elham Shaabani
Paulo Shakarian
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-61431-7_1

Premium Partner