نتایج جستجو برای: fake accounts

تعداد نتایج: 63918  

2012
Yin Zhu Xiao Wang Erheng Zhong Nathan Nan Liu He Li Qiang Yang

As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social network sites, spammers often disguise themselves by creating fake accounts and hijacking normal users’ accounts for personal gains. Different from the spammers in traditional systems such as SMS and email, spammers in social...

2018
Mehwish Nasim Andrew Nguyen Nick Lothian Robert Cope Lewis Mitchell

Content polluters, or bots that hijack a conversation for political or advertising purposes are a known problem for event prediction, election forecasting and when distinguishing real news from fake news in social media data. Identifying this type of bot is particularly challenging, with state-of-the-art methods utilising large volumes of network data as features for machine learning models. Su...

Journal: :Perform. Eval. 2015
Myung Woo Lee Ganguk Hwang Sumit Roy

This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending Bianchi’s model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput...

Journal: :Mobile Information Systems 2017
Zhanyong Tang Yujie Zhao Lei Yang Shengde Qi Dingyi Fang Xiaojiang Chen Xiaoqing Gong Zheng Wang

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...

Journal: :The Copenhagen Journal of Asian Studies 2021

2007
Henriette Elvang Daniel Z. Freedman

The fake supergravity method is applied to 5-dimensional asymptotically AdS spacetimes containing gravity coupled to a real scalar and an abelian gauge field. The motivation is to obtain bulk solutions with R × S3 symmetry in order to explore the AdS/CFT correspondence when the boundary gauge theory is on R × S3. A fake supergravity action, invariant under local supersymmetry through linear ord...

2015
Stephan Günnemann

How can we tell when accounts are fake or real in a social network? And how can we tell which accounts belong to liberal, conservative or centrist users? Often, we can answer such questions and label nodes in a network based on the labels of their neighbors and appropriate assumptions of homophily (”birds of a feather flock together”) or heterophily (”opposites attract”). One of the most widely...

2016
Ivan Samborskii Andrey Filchenkov Georgiy Korneev Aleksandr Farseev

During the past decade, microblog services have been extensively utilized by millions of business and private users as one of the most powerful information broadcasting tools. For example, Twitter attracted many social science researchers due to its high popularity, constrained format of thought expression, and the ability to reflect actual trends. However, unstructured data from microblogs oft...

2014
Shalinda Adikari Kaushik Dutta

Social networks have become an everyday tool in our lives and different social networks have different target groups. Among them LinkedIn is greatly preferred by the people who are in the professional occupations. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts. Creation of a fake profile becomes such adversary effect which is difficult to...

2000
J. Bernabéu M. C. Bañuls

The conditions to induce appreciable CP-and T-odd effects in neutrino oscillations are discussed. The propagation in matter leads to fake CP-and CPT-odd asymmetries, besides a Bohm-Aharonov type modification of the interference pattern. We study the separation of fake and genuine CP violation by means of energy and distance dependence.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید