{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:14:55Z","timestamp":1745036095768,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icdm.2017.56","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T19:59:29Z","timestamp":1513886369000},"page":"465-474","source":"Crossref","is-referenced-by-count":53,"title":["GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs"],"prefix":"10.1109","author":[{"given":"Binghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398792"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref30","article-title":"Semi-supervised learning using gaussian fields and harmonic functions","author":"zhu","year":"2003","journal-title":"ICML"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"ref11","article-title":"SybilInfer: Detecting Sybil nodes using social networks","author":"danezis","year":"2009","journal-title":"NDSS"},{"key":"ref12","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"2012","journal-title":"NSDI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref14","article-title":"Combating web spam with trustrank","author":"gyongyi","year":"2004","journal-title":"VLDB"},{"key":"ref15","article-title":"Propagating trust and distrust to demote web spam","volume":"190","author":"wu","year":"2006","journal-title":"MTW"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0171792-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718003"},{"journal-title":"Hacking Financial Market","year":"2016","key":"ref3"},{"key":"ref6","article-title":"Sybilframe: A defense-in-depth framework for structure-based sybil detection","author":"gao","year":"2015","journal-title":"CoRR"},{"journal-title":"What Is Twitter A Social Network or A News Media?","year":"2010","author":"kwak","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"journal-title":"Hacking Election","year":"2016","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3086637"},{"journal-title":"Fake Users in Twitter","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","year":"1988","author":"pearl","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.141"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0184-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"ref25","article-title":"Lin-earized and single-pass belief propagation","volume":"8","author":"gatterbauer","year":"2015","journal-title":"PVLDB"}],"event":{"name":"2017 IEEE International Conference on Data Mining (ICDM)","start":{"date-parts":[[2017,11,18]]},"location":"New Orleans, LA","end":{"date-parts":[[2017,11,21]]}},"container-title":["2017 IEEE International Conference on Data Mining (ICDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8211002\/8215462\/08215519.pdf?arnumber=8215519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T17:17:38Z","timestamp":1643131058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8215519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icdm.2017.56","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}