共 33 条
- [1] Addawood Aseel, 2019, ICWSM
- [3] Baumes Jeff, 2004, ICISI
- [4] Uncovering Large Groups of Active Malicious Accounts in Online Social Networks [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 477 - 488
- [5] Daley DJ, 2007, An Introduction to the Theory of Point Processes: Volume II: General Theory and Structure, VII
- [6] Recurrent Marked Temporal Point Processes: Embedding Event History to Vector [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 1555 - 1564
- [8] Gadde Vijaya, 2018, Twitter Blog, V17
- [9] MalReG: Detecting and Analyzing Malicious Retweeter Groups [J]. PROCEEDINGS OF THE 6TH ACM IKDD CODS AND 24TH COMAD, 2019, : 61 - 69
- [10] Hawkins D. M., 1980, IDENTIFICATION OUTLI, V11