Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Emotional Sequential Influence Modeling on False Information
Intelligent Data Engineering and Automated Learning – IDEAL 2024Pages 97–102https://doi.org/10.1007/978-3-031-77731-8_9AbstractThe extensive dissemination of false information in social networks affects netizen’s social lives, morals, and behaviours. When a neighbour expresses strong emotions (e.g., fear, anger, excitement) based on a false statement, these emotions can ...
- research-articleJanuary 2022
ELM-NeuralWalk: trust evaluation for online social networks
International Journal of Bio-Inspired Computation (IJBIC), Volume 19, Issue 4Pages 199–209https://doi.org/10.1504/ijbic.2022.124322Trust relationship plays an important role in online shopping, recommendation systems, internet of things, etc. The problem of trust evaluation among users in online social network (OSN) has attracted much attention, and has become a hot issue in the ...
- research-articleDecember 2021
Destroying robust steganography in online social networks
Information Sciences: an International Journal (ISCI), Volume 581, Issue CPages 605–619https://doi.org/10.1016/j.ins.2021.10.023Highlights- We proposed a general end-to-end neural network to destroy robust steganography in OSN.
In recent years, some robust steganography approaches for covert transmission in online social networks (OSNs) have been proposed. Some existing image algorithms, such as watermarking removal methods, have been developed to remove the ...
- research-articleNovember 2021
Detecting and Analyzing Collusive Entities on YouTube
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 12, Issue 5Article No.: 64, Pages 1–28https://doi.org/10.1145/3477300YouTube sells advertisements on the posted videos, which in turn enables the content creators to monetize their videos. As an unintended consequence, this has proliferated various illegal activities such as artificial boosting of views, likes, comments, ...
- research-articleAugust 2021
DECIFE: Detecting Collusive Users Involved in Blackmarket Following Services on Twitter
HT '21: Proceedings of the 32nd ACM Conference on Hypertext and Social MediaPages 91–100https://doi.org/10.1145/3465336.3475108The popularity of Twitter has fostered the emergence of various fraudulent user activities - one such activity is to artificially bolster the social reputation of Twitter profiles by gaining a large number of followers within a short time span. Many ...
-
- ArticleDecember 2020
Privacy-Preserving Friend Recommendation in an Integrated Social Environment
Information Systems SecurityPages 117–136https://doi.org/10.1007/978-3-030-65610-2_8AbstractUbiquitous Online Social Networks (OSN)s play a vital role in information creation, propagation and consumption. Given the recent multiplicity of OSNs with specially accumulated knowledge, integration partnerships are formed (without regard to ...
- ArticleSeptember 2020
An Efficient Data Transmission Strategy for Edge-Computing-Based Opportunistic Social Networks
Network and Parallel ComputingPages 323–335https://doi.org/10.1007/978-3-030-79478-1_28AbstractAs wireless network has developed rapidly in recent years, especially with the maturity and wide application of 5G wireless system, millions of mobile users have been able to quickly exchange large amounts of data in social networks. Despite the ...
- research-articleMay 2020
Topic based time-sensitive influence maximization in online social networks
World Wide Web (WWWJ), Volume 23, Issue 3Pages 1831–1859https://doi.org/10.1007/s11280-020-00792-0AbstractWith the exponential expansion of online social networks (OSNs), an extensive research on information diffusion in OSNs has been emerged in recent years. One of the key research is influence maximization (IM). IM is a problem to find a seed set ...
- research-articleApril 2020
Analyzing and Detecting Collusive Users Involved in Blackmarket Retweeting Activities
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 11, Issue 3Article No.: 35, Pages 1–24https://doi.org/10.1145/3380537With the rise in popularity of social media platforms like Twitter, having higher influence on these platforms has a greater value attached to it, since it has the power to influence many decisions in the form of brand promotions and shaping opinions. ...
- research-articleJanuary 2020
Browser simulation-based crawler for online social network profile extraction
International Journal of Web Based Communities (IJWBC), Volume 16, Issue 4Pages 321–342https://doi.org/10.1504/ijwbc.2020.111377The rapid proliferation and extensive use of online social networks (OSNs) like Facebook, Twitter, Instagram, etc., has attracted the attention of academia and industry, since these networks store massive information in them. But, acquiring data from ...
- research-articleJanuary 2020
Fake profile detection in multimedia big data on online social networks
International Journal of Information and Computer Security (IJICS), Volume 12, Issue 2-3Pages 303–331https://doi.org/10.1504/ijics.2020.105181The popularity of online social networks like Facebook and Twitter has become the regular way of communication and interaction. Due to the popularity of such networks, the attackers try to reveal suspicious behaviour in the form of fake profile. To stop ...
- research-articleJanuary 2019
A challenge-response mechanism for securing online social networks against social bots
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 32, Issue 1Pages 1–13https://doi.org/10.1504/ijahuc.2019.101819Social bots is fast becoming a serious security threat to online social networks (OSNs). Social bots are automated software tools able to execute malicious activities in OSNs systems in an automated fashion. It can perform auto-sharing and posting, ...
- research-articleSeptember 2018
A large-scale analysis of YouTube videos depicting everyday thermal camera use
- Matthew Louis Mauriello,
- Brenna McNally,
- Cody Buntain,
- Sapna Bagalkotkar,
- Samuel Kushnir,
- Jon E. Froehlich
MobileHCI '18: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and ServicesArticle No.: 37, Pages 1–12https://doi.org/10.1145/3229434.3229443The emergence of low-cost thermographic cameras for mobile devices provides users with new practical and creative prospects. While recent work has investigated how novices use thermal cameras for energy auditing tasks in structured activities, open ...
- surveyJanuary 2018
Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues
- Mohammed Ali Al-Garadi,
- Kasturi Dewi Varathan,
- Sri Devi Ravana,
- Ejaz Ahmed,
- Ghulam Mujtaba,
- Muhammad Usman Shahid Khan,
- Samee U. Khan
ACM Computing Surveys (CSUR), Volume 51, Issue 1Article No.: 16, Pages 1–37https://doi.org/10.1145/3155897Online social networks (OSNs) are structures that help users to interact, exchange, and propagate new ideas. The identification of the influential users in OSNs is a significant process for accelerating the propagation of information that includes ...
- articleAugust 2017
DST: days spent together using soft sensory information on OSNs--a case study on Facebook
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 21, Issue 15Pages 4227–4238Human activities can be captured in real time using sensors. The rapid growth in sensing technology and its integration with smartphones has instigated a new paradigm of connecting sensors with social networks. These days, users actively migrate their ...
- research-articleApril 2017
Sensing User-Generated Multimedia Traffic
SocialSens'17: Proceedings of the 2nd International Workshop on Social SensingPages 87–92https://doi.org/10.1145/3055601.3055612Internet traffic is increasingly dominated by user-generated content, predominantly by multimedia content (photos and videos). The content is primarily shared in online social networks (OSNs) such as Pinterest, Twitter, and Facebook. In this paper, we ...
- articleJanuary 2016
The predictive role of prejudice: a computational model for using categories
International Journal of Computational Intelligence Studies (IJCIS), Volume 5, Issue 2Pages 121–137https://doi.org/10.1504/IJCISTUDIES.2016.077120Generalised knowledge allows us to know a lot about something/somebody we do not directly know: this is a great cognitive advantage. At a social level this means that I can know a lot of things on people that I never met; it is social 'prejudice' with ...
- research-articleSeptember 2015
Generating brand awareness in Online Social Networks
Computers in Human Behavior (COHB), Volume 50, Issue CPages 600–609https://doi.org/10.1016/j.chb.2015.03.023Display Omitted Virtual interactivity positively affects brand awareness.Reward for activities positively affects brand awareness.System quality positively affects brand awareness.Information quality positively affects brand awareness.Brand awareness ...
- research-articleAugust 2013
Game theoretic attack analysis in online social network (OSN) services
ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 1012–1019https://doi.org/10.1145/2492517.2500257In the social media era, the ever-increasing utility of Online Social Networks (OSN) services provide a variety of benefits to users, organizations, and service providers. However, OSN services also introduce new threats and privacy issues regarding the ...
- ArticleJune 2012
Optimal State Management of Data Sharing in Online Social Network (OSN) Services
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsPages 648–655https://doi.org/10.1109/TrustCom.2012.216Although Online Social Network (OSN) services offer users a variety of benefits, they also bring new threats and privacy issues to the community. In this paper, we first define the data types in OSN services and the states of shared data with respect to ...