Mush: Multi-stimuli hawkes process based sybil attacker detector for user-review social networks
User-Review Social Networks (URSNs) now become the targets of Sybil attacks, where fake
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …
Sybil defense techniques in online social networks: a survey
The problem of malicious activities in online social networks, such as Sybil attacks and
malevolent use of fake identities, can severely affect the social activities in which users …
malevolent use of fake identities, can severely affect the social activities in which users …
An efficient key agreement protocol for Sybil-precaution in online social networks
Identifying malicious users in online social networks (OSNs) is a challenging task that
demands a great deal of skill and knowledge because these users can have multiple forms …
demands a great deal of skill and knowledge because these users can have multiple forms …
SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks
Sybil attacks are increasingly prevalent in online social networks. A malicious user can
generate a huge number of fake accounts to produce spam, impersonate other users …
generate a huge number of fake accounts to produce spam, impersonate other users …
Detecting fake reviews with generative adversarial networks for mobile social networks
With the growth of mobile social networks (MSNs), crowdsourced information could be used
for recommendation to mobile users. However, it is quite vulnerable to Sybil attacks, where …
for recommendation to mobile users. However, it is quite vulnerable to Sybil attacks, where …
[PDF][PDF] Increasing the Accuracy of Sibyl Attack Detection in Social Networks using Hybrid Clustering Method based on a Graph-structure
Sybil attacks are increasingly growing and expanding in social networks. A malicious user
with a fake identity, known as a Sybil attack, can create a large number of fake accounts to …
with a fake identity, known as a Sybil attack, can create a large number of fake accounts to …
Generative Adversarial Networks for Cybersecurity Threat
AC Ojha, A Agarwal, G Swetha - … International Conference on …, 2023 - ieeexplore.ieee.org
We provide a unique method to enhance cybersecurity threat prediction using generative
adversarial networks (GANs). Through competitive training, the generator and discriminator …
adversarial networks (GANs). Through competitive training, the generator and discriminator …
Toward Improving Sybil Node Detection in a Social Media Platform
C Watts - 2021 - search.proquest.com
Users increasingly rely on the trustworthiness of the information available on Online Social
Networks (OSNs). OSNs have always suffered from the creation of fake accounts, especially …
Networks (OSNs). OSNs have always suffered from the creation of fake accounts, especially …
Towards characterization and detection of collusive reputation fraud in crowdsourced opinions
C Xu - 2017 - dr.ntu.edu.sg
Crowdsourced opinion portals allow people to share experiences and assessments about
products or services by posting reviews online, and have become an informative source for …
products or services by posting reviews online, and have become an informative source for …