Abstract
Bots increasingly tamper with political elections and economic discussions. Tracing trends in detection strategies and key suggestions on how to win the fight.
- Assenmacher, D., Clever, L., Frischlich, L., Quandt, T., Trautmann, H. and Grimme, C. Demystifying Social Bots: On the Intelligence of Automated Social Media Actors. Social Media + Society. SAGE, 2020.Google Scholar
- Chavoshi, N., Hamooni, H., and Mueen, A. DeBot: Twitter bot detection via warped correlation. In The 16th International Conference on Data Mining (2016). IEEE, 817--822.Google ScholarCross Ref
- Chu, Z., Gianvecchio, S., Wang, H., and Jajodia, S. Detecting automation of Twitter accounts: Are you a human, bot, or cyborg? IEEE Trans, Dependable and Secure Computing 9, 6 (2012), 811--824.Google ScholarDigital Library
- Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems 80 (2015), 56--71.Google ScholarDigital Library
- Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th Intern. World Wide Web Conf. Companion (2017). IW3C2.Google ScholarDigital Library
- Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Transactions on Dependable and Secure Computing 15, 4 (2017), 561--576.Google Scholar
- Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., and Tesconi, M. Emergent properties, models, and laws of behavioral similarities within groups of Twitter users. Computer Communications 150 (2020), 47--61.Google ScholarDigital Library
- Cresci, S., Lillo, F., Regoli, D., Tardelli, S., and Tesconi, M. Cashtag piggybacking: Uncovering spam and bot activity in stock microblogs on Twitter. ACM Trans. the Web 13, 2 (2019), 11.Google ScholarDigital Library
- Cresci, S., Petrocchi, M., Spognardi, A., and Tognazzi, S. Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection. In Proceedings of the 11th Intern. Conf. Web Science (2019). ACM.Google ScholarDigital Library
- Da San Martino, G., Cresci, S., Barrón-Cedeño, A., Yu, S., Di Pietro, R., and Nakov, P. 2020. A survey on computational propaganda detection. In Proceedings of the 29th Intern. Joint Conf. Artificial Intelligence (2020).Google Scholar
- Echeverrìa, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Stringhini, G., and Zhou, S. LOBO: Evaluation of generalization deficiencies in Twitter bot classifiers. In Proceedings of the 34th Annual Computer Security Applications Conf. ACM, 137--146.Google Scholar
- Fazil, M. and Abulaish, M. A socialbots analysis-driven graph-based approach for identifying coordinated campaigns in Twitter. J. Intelligent & Fuzzy Systems 38 (2020), 2961--2977.Google ScholarCross Ref
- Ferrara, E., Varol, O., Davis, C., Menczer, F., and Flammini, A. The rise of social bots. Commun, ACM 59, 7 (July 2016), 96--104.Google ScholarDigital Library
- Gallotti, R., Valle, F., Castaldo, N., Sacco, P., and De Domenico, M. Assessing the risks of "infodemics" in response to COVID-19 epidemics, 2020; arXiv:2004.03997 (2020).Google ScholarCross Ref
- Goodfellow, I., McDaniel, P., and Papernot, N. Making machine learning robust against adversarial inputs. Commun, ACM 61, 7 (July 2018).Google ScholarDigital Library
- Gorodnichenko, Y., Pham, T., and Talavera, O. 2018. Social Media, Sentiment and Public Opinions: Evidence from #Brexit and #USElection. Working Paper 24631. National Bureau of Economic Research, 2018.Google Scholar
- Grimme, C., Assenmacher, D., and Adam, L. Changing perspectives: Is it sufficient to detect social bots? In Proceedings of the 10th Intern. Conf. Social Computing and Social Media (2018).Google ScholarDigital Library
- Grimme, C., Preuss, M., Adam, L., and Trautmann, H. Social bots: Human-like by means of human control? Big Data 5, 4 (2017).Google ScholarCross Ref
- Grinberg, N., Joseph, K., Friedland, L., Swire-Thompson, B., and Lazer, D. Fake news on Twitter during the 2016 US presidential election. Science 363, 6425 (2019), 374--378.Google ScholarCross Ref
- Jiang, M., Cui, P., Beutel, A., Faloutsos, C., and Yang, S. Catching synchronized behaviors in large networks: A graph mining approach. ACM Trans. Knowledge Discovery from Data 10, 4 (2016).Google ScholarDigital Library
- Jiang, M., Cui, P., Beutel, A., Faloutsos, C., and Yang, S. Inferring lockstep behavior from connectivity pattern in large graphs. Knowledge and Information Systems 48, 2 (2016), 399--428.Google ScholarDigital Library
- Kollanyi, B. Where do bots come from? An analysis of bot codes shared on GitHub. Intern. J. Communication 10 (2016), 20.Google Scholar
- Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., and Tesconi, M. RTbust: Exploiting temporal patterns for botnet detection on Twitter. In Proceedings of the 11th Intern. Conf. Web Science (2019). ACM.Google ScholarDigital Library
- Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., Tesconi, M., and Ferrara, E. Charting the landscape of online cryptocurrency manipulation. IEEE Access 8 (2020), 113230--113245.Google ScholarCross Ref
- Pacheco, D., Hui, P., Torres-Lugo, C., Tran Truong, B., Flammini, A., and Menczer, F. 2020. Uncovering coordinated networks on social media, 2020; arXiv:2001.05658.Google Scholar
- Ruan, X., Wu, Z., Wang, H., and Jajodia, S. Profiling online social behaviors for compromised account detection. IEEE Trans. Information Forensics and Security 11, 1 (2015), 176--187.Google Scholar
- Shao, C., Luca Ciampaglia, G., Varol, O., Yang, K., Flammini, A., and Menczer, F. The spread of low-credibility content by social bots. Nature commun. 9, 1 (2018), 4787.Google Scholar
- Starbird, K. Disinformation's spread: Bots, trolls and all of us. Nature 571, 7766 (2019), 449--449.Google ScholarCross Ref
- Stella, M., Ferrara, E., and De Domenico, M. Bots increase exposure to negative and inflammatory content in online social systems. In Proceedings of the National Academy of Sciences 115, 49 (2018), 12435--12440.Google ScholarCross Ref
- Stieglitz, S., Brachten, F., Ross, B., and Jung, A. Do social bots dream of electric sheep? A categorization of social media bot accounts. In Proceedings of the 17th Australasian Conf. Information Systems (2017).Google Scholar
- Varol, O., Ferrara, E., Davis, C., Menczer, F., and Flammini, A. Online human-bot interactions: Detection, estimation, and characterization. In Proceedings of the 11th Intern. Conf. Web and Social Media. AAAI, 2017.Google Scholar
- Vosoughi, S., Roy, D., and Aral, S. The spread of true and false news online. Science 359, 6380 (2018), 1146--1151.Google ScholarCross Ref
- Wu, B., Liu, L., Yang, Y., Zheng, K., and Wang, X. Using improved conditional generative adversarial networks to detect social bots on Twitter. IEEE Access 8 (2020), 36664--36680.Google ScholarCross Ref
- Yang, C., Harkreader, R., and Gu, G. Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Information Forensics and Security 8, 8 (2013), 1280--1293.Google ScholarDigital Library
- Yang, K., Varol, O., Davis, C., Ferrara, E., Flammini, A., and Menczer, F. Arming the public with artificial intelligence to counter social bots. Human Behavior and Emerging Technologies 1, 1 (2019), 48--61.Google ScholarCross Ref
- Yang, K., Varol, O., Hui, P., and Menczer, F. Scalable and generalizable social bot detection through data selection. In Proceedings of the 34th AAAI Conf. Artificial Intelligence (2020).Google ScholarCross Ref
- Yardi, S. Detecting spam in a Twitter network. First Monday 15, 1 (2010).Google Scholar
- Zago, M., Nespoli, P., Papamartzivanos, D., Gil Perez, M., Gomez Marmol, F., Kambourakis, G., and Martinez Perez, G. Screening out social bots interference: Are there any silver bullets? IEEE Communications Mag. 57, 8 (2019), 98--104.Google ScholarDigital Library
- Zellers, R., Holtzman, A., Rashkin, H., Bisk, Y., Farhadi, A., Roesner, F., and Choi, Y. Defending against neural fake news. In Proceedings of the 33rd Conf. Neural Information Processing Systems (2019). 9051--9062.Google ScholarDigital Library
- Zhang, J., Zhang, R., Zhang, Y., and Yan, G. The rise of social botnets: Attacks and countermeasures. IEEE Trans. Dependable and Secure Computing 15, 6 (2016), 1068--1082.Google Scholar
Index Terms
- A decade of social bot detection
Recommendations
Bot Detection Based on Social Interactions in MMORPGs
SOCIALCOM '13: Proceedings of the 2013 International Conference on Social ComputingThe objective of this work is to detect the use of automated programs, known as game bots, based on social interactions in MMORPGs. Online games, especially MMORPGs, have become extremely popular among internet users in the recent years. Not only the ...
Bot detection in rhythm games: a physiological approach
ACE '11: Proceedings of the 8th International Conference on Advances in Computer Entertainment TechnologyAs the online game industry expands, detecting and preventing cheating in games is an increasingly important research topic. Some forms of cheating, such as the use of game bots (auto-playing game clients), are particularly challenging to identify ...
Bot Detection in Twitter: An Overview
Flexible Query Answering SystemsAbstractBot detection in social media, particularly on Twitter, has become a crucial issue in recent years due to the increasing use of bots for malicious uses such as the spreading of false information in order to manipulate public opinion. In this paper,...
Comments