共 15 条
[1]
Castillo C., 2011, P 20 INT C WORLD WID, DOI DOI 10.1145/1963405.1963500
[2]
Leveraging Careful Microblog Users for Spammer Detection
[J].
WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB,
2015,
:419-429
[3]
Gupta A, 2013, ECRIM RES SUM
[4]
Assessment of Tweet Credibility with LDA Features
[J].
WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB,
2015,
:953-958
[5]
Prominent Features of Rumor Propagation in Online Social Media
[J].
2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM),
2013,
:1103-1108
[6]
Ma J, 2015, P 24 ACM INT C INF K, P1751, DOI [10.1145/2806416.2806607, DOI 10.1145/2806416.2806607]
[7]
Information Network or Social Network? The Structure of the Twitter Follow Graph
[J].
WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB,
2014,
:493-498
[8]
Credibility in Context: An Analysis of Feature Distributions in Twitter
[J].
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012),
2012,
:293-301
[9]
Weng J, 2010, Proceedings of the third ACM international conference on Web search and data mining, P261, DOI DOI 10.1145/1718487.1718520
[10]
Wu K, 2015, PROC INT CONF DATA, P651, DOI 10.1109/ICDE.2015.7113322