Author of the publication

Retweet Us, We will Retweet You: Spotting Collusive Retweeters Involved in Blackmarket Services.

, , , and . ASONAM, page 242-249. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing and Detecting Collusive Users Involved in Blackmarket Retweeting Activities., , , , and . ACM Trans. Intell. Syst. Technol., 11 (3): 35:1-35:24 (2020)HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling., , , and . IEEE Trans. Inf. Forensics Secur., (2020)On Good and Bad Intentions behind Anomalous Citation Patterns among Journals in Computer Sciences., , , , and . CoRR, (2018)Revealing the Blackmarket Retweet Game: A Hybrid Approach., and . CONSTRAINT@AAAI, volume 1402 of Communications in Computer and Information Science, page 30-41. Springer, (2021)Detecting and analyzing collusive entities on YouTube., , , and . CoRR, (2020)CoReRank: Ranking to Detect Users Involved in Blackmarket-Based Collusive Retweeting Activities., , , and . WSDM, page 330-338. ACM, (2019)Blackmarket-driven Collusion on Online Media: A Survey., and . CoRR, (2020)Detecting and Analyzing Collusive Entities on YouTube., , , and . ACM Trans. Intell. Syst. Technol., 12 (5): 64:1-64:28 (2021)Hierarchical topology adaptation for distributed convergecast applications., , , and . SAC, page 405-407. ACM, (2014)CRIMP: Here crisis mapping goes offline., , , , , , , , , and . J. Netw. Comput. Appl., (2019)