Mush: Multi-stimuli hawkes process based sybil attacker detector for user-review social networks

Z Qu, C Lyu, CH Chi - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
User-Review Social Networks (URSNs) now become the targets of Sybil attacks, where fake
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …

Sybil defense techniques in online social networks: a survey

M Al-Qurishi, M Al-Rakhami, A Alamri… - IEEE …, 2017 - ieeexplore.ieee.org
The problem of malicious activities in online social networks, such as Sybil attacks and
malevolent use of fake identities, can severely affect the social activities in which users …

An efficient key agreement protocol for Sybil-precaution in online social networks

M Al-Qurishi, SMM Rahman, MS Hossain… - Future Generation …, 2018 - Elsevier
Identifying malicious users in online social networks (OSNs) is a challenging task that
demands a great deal of skill and knowledge because these users can have multiple forms …

SybilTrap: A graph‐based semi‐supervised Sybil defense scheme for online social networks

M Al‐Qurishi, SMM Rahman, A Alamri… - Concurrency and …, 2018 - Wiley Online Library
Sybil attacks are increasingly prevalent in online social networks. A malicious user can
generate a huge number of fake accounts to produce spam, impersonate other users …

Detecting fake reviews with generative adversarial networks for mobile social networks

Z Qu, Q Jia, C Lyu, J Liu, X Liu… - Security and …, 2022 - Wiley Online Library
With the growth of mobile social networks (MSNs), crowdsourced information could be used
for recommendation to mobile users. However, it is quite vulnerable to Sybil attacks, where …

[PDF][PDF] Increasing the Accuracy of Sibyl Attack Detection in Social Networks using Hybrid Clustering Method based on a Graph-structure

A Shahparastan, A Amini, H Saboohi - Journal of Soft Computing and …, 2023 - jscit.nit.ac.ir
Sybil attacks are increasingly growing and expanding in social networks. A malicious user
with a fake identity, known as a Sybil attack, can create a large number of fake accounts to …

Generative Adversarial Networks for Cybersecurity Threat

AC Ojha, A Agarwal, G Swetha - … International Conference on …, 2023 - ieeexplore.ieee.org
We provide a unique method to enhance cybersecurity threat prediction using generative
adversarial networks (GANs). Through competitive training, the generator and discriminator …

Toward Improving Sybil Node Detection in a Social Media Platform

C Watts - 2021 - search.proquest.com
Users increasingly rely on the trustworthiness of the information available on Online Social
Networks (OSNs). OSNs have always suffered from the creation of fake accounts, especially …

Towards characterization and detection of collusive reputation fraud in crowdsourced opinions

C Xu - 2017 - dr.ntu.edu.sg
Crowdsourced opinion portals allow people to share experiences and assessments about
products or services by posting reviews online, and have become an informative source for …