skip to main content
10.1145/3243734.3243770acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Fraud De-Anonymization for Fun and Profit

Published: 15 October 2018 Publication History

Abstract

The persistence of search rank fraud in online, peer-opinion systems, made possible by crowdsourcing sites and specialized fraud workers, shows that the current approach of detecting and filtering fraud is inefficient. We introduce a fraud de-anonymization approach to disincentivize search rank fraud: attribute user accounts flagged by fraud detection algorithms in online peer-opinion systems, to the human workers in crowdsourcing sites, who control them. We model fraud de-anonymization as a maximum likelihood estimation problem, and introduce UODA, an unconstrained optimization solution. We develop a graph based deep learning approach to predict ownership of account pairs by the same fraudster and use it to build discriminative fraud de-anonymization (DDA) and pseudonymous fraudster discovery algorithms (PFD). To address the lack of ground truth fraud data and its pernicious impacts on online systems that employ fraud detection, we propose the first cheating-resistant fraud de-anonymization validation protocol, that transforms human fraud workers into ground truth, performance evaluation oracles. In a user study with 16 human fraud workers, UODA achieved a precision of 91%. On ground truth data that we collected starting from other 23 fraud workers, our co-ownership predictor significantly outperformed a state-of-the-art competitor, and enabled DDA and PFD to discover tens of new fraud workers, and attribute thousands of suspicious user accounts to existing and newly discovered fraudsters.

Supplementary Material

MP4 File (p115-hernandez.mp4)

References

[1]
Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects Proceedings of AAAI ICWSM.
[2]
Muhammad AL-Qurishi, Mabrook Alrakhami, Atif Alamri, Majed Alrubaian, Sk Md Mizanur Rahman, and M Hossain. 2017. Sybil Defense Techniques in Online Social Networks: A Survey. Vol. PP (01. 2017), 1--1.
[3]
Mishari Almishari and Gene Tsudik. 2012. Exploring linkability of user reviews. In European Symposium on Research in Computer Security. Springer, 307--324.
[4]
Athanasios Andreou, Oana Goga, and Patrick Loiseau. 2017. Identity vs. Attribute Disclosure Risks for Users with Multiple Social Profiles Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 163--170.
[5]
Michael Backes, Pascal Berrang, Oana Goga, Krishna P Gummadi, and Praveen Manoharan. 2016. On profile linkability despite anonymity in social media systems Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. 25--35.
[6]
Prudhvi Ratna Badri Satya, Kyumin Lee, Dongwon Lee, Thanh Tran, and Jason Jiasheng Zhang. 2016. Uncovering Fake Likers in Online Social Networks. In Proceedings of the ACM CIKM.
[7]
Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. 2013. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In Proceedings of the WWW.
[8]
A. Broder. 1997. On the Resemblance and Containment of Documents. In Proceedings of the Compression and Complexity of Sequences 1997 (SEQUENCES '97). IEEE Computer Society, Washington, DC, USA, 21--. http://dl.acm.org/citation.cfm?id=829502.830043
[9]
Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). USENIX, San Jose, CA, 197--210. https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/cao
[10]
Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. J. Artif. Int. Res. Vol. 16, 1 (June. 2002), 321--357. http://dl.acm.org/citation.cfm?id=1622407.1622416
[11]
Nicholas Confessore, Gabriel Dance, Richard Harris, and Mark Hansen. 2018. The Follower Factory. The New York Times (Jan. 2018). https://www.nytimes.com/interactive/2018/01/27/technology/social-media-bots.html
[12]
George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks NDSS.
[13]
Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, and M. Zubair Shafiq. 2014. Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). 129--136.
[14]
John R. Douceur. 2002. The Sybil Attack. In International workshop on peer-to-peer systems. 251--260.
[15]
Amir Fayazi, Kyumin Lee, James Caverlee, and Anna Squicciarini. 2015. Uncovering Crowdsourced Manipulation of Online Reviews Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '15). ACM, New York, NY, USA, 233--242.
[16]
Geli Fei, Arjun Mukherjee, Bing Liu, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. 2013. Exploiting Burstiness in Reviews for Review Spammer Detection Proceedings of AAAI ICWSM.
[17]
Fiverr. {n. d.}. https://www.fiverr.com/.
[18]
Jerome Friedman, Trevor Hastie, and Robert Tibshirani. 2010. Regularization Paths for Generalized Linear Models via Coordinate Descent. Journal of Statistical Software Vol. 33, 1 (2010), 1--22. http://www.jstatsoft.org/v33/i01/
[19]
Oana Goga, Howard Lei, Sree Hari Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, and Renata Teixeira. 2013. Exploiting innocuous activity for correlating users across sites Proceedings of the 22nd international conference on World Wide Web. 447--458.
[20]
Atefeh Heydari, Mohammadali Tavakoli, and Naomie Salim. 2016. Detection of Fake Opinions Using Time Series. Expert Syst. Appl. Vol. 58, C (Oct. 2016), 83--92.
[21]
Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2015. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. CoRR Vol. abs/1511.06030 (2015).
[22]
Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '16). ACM, New York, NY, USA, 895--904.
[23]
Paridhi Jain, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. @ i seek'fb. me': Identifying users across multiple online social networks Proceedings of the 22nd international conference on World Wide Web. ACM, 1259--1268.
[24]
Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. In Proceedings of the international conference on Web search and web data mining (WSDM '08). ACM, New York, NY, USA, 219--230.
[25]
Parisa Kaghazgaran, James Caverlee, and Majid Alfifi. 2017. Behavioral Analysis of Review Fraud: Linking Malicious Crowdsourcing to Amazon and Beyond. In Proceedings of ICWSM.
[26]
Parisa Kaghazgaran, James Caverlee, and Anna Squicciarini. 2018. Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). ACM, New York, NY, USA, 306--314.
[27]
David R Karger. 1993. Global Min-cuts in RNC, and Other Ramifications of a Simple Min-Cut Algorithm. SODA, Vol. Vol. 93.
[28]
Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis, and Evangelos P Markatos. 2011. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on. IEEE, 295--300.
[29]
Srijan Kumar, Justin Cheng, Jure Leskovec, and V.S. Subrahmanian. 2017. An Army of Me: Sockpuppets in Online Discussion Communities Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 857--866.
[30]
Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and V. S. Subrahmanian. 2018. REV2: Fraudulent User Prediction in Rating Platforms Proceedings of the ACM International Conference on Web Search and Data Mining. 333--341.
[31]
Kyumin Lee, Steve Webb, and Hancheng Ge. 2014. The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/view/8078
[32]
Huayi Li, Zhiyuan Chen, Arjun Mukherjee, Bing Liu, and Jidong Shao. 2015. Analyzing and Detecting Opinion Spam on a Large-scale Dataset via Temporal and Spatial Patterns. In Proceedings of ICWSM. AAAI Press, 634--637.
[33]
Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee, and Jidong Shao. 2017. Bimodal Distribution and Co-Bursting in Review Spam Detection Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1063--1072.
[34]
Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal. 2015. Exploiting Temporal Dynamics in Sybil Defenses. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). ACM, New York, NY, USA, 805--816.
[35]
Michael Luca and Georgios Zervas. 2016. Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud Management Sciences. 3412--3427.
[36]
Arjun Mukherjee, Abhinav Kumar, Bing Liu, Junhui Wang, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. 2013 a. Spotting Opinion Spammers Using Behavioral Footprints Proceedings of ACM KDD.
[37]
Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spotting Fake Reviewer Groups in Consumer Reviews. In Proceedings of ACM WWW.
[38]
Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie Glance. 2013 b. What Yelp Fake Review Filter Might Be Doing. In Proceedings of the International Conference on Weblogs and Social Media.
[39]
Kazushi Nagayama and Andrew Ahn. 2016. Keeping the Play Store trusted: fighting fraud and spam installs. Android Developers Blog, https://android-developers.googleblog.com/2016/10/keeping-the-play-store-trusted-fighting-fraud-and-spam-installs.html.
[40]
Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, and Dawn Song. 2012. On the Feasibility of Internet-Scale Author Identification Proceedings of the IEEE Symposium on Security and Privacy. 300--314.
[41]
Arvind Narayanan and Vitaly Shmatikov. 2008. Robust De-anonymization of Large Sparse Datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP '08). IEEE Computer Society, Washington, DC, USA, 111--125.
[42]
Shashank Pandit, Duen Horng Chau, Samuel Wang, and Christos Faloutsos. 2007. Netprobe: A Fast and Scalable System for Fraud Detection in Online Auction Networks. In Proceedings of the 16th International Conference on World Wide Web (WWW '07). 201--210.
[43]
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. DeepWalk: Online Learning of Social Representations Proceedings of the International Conference on Knowledge Discovery and Data Mining. 701--710.
[44]
Mahmudur Rahman, Bogdan Carbunar, Jaime Ballesteros, George Burri, and Duen Horng (Polo) Chau. 2014. Turning the Tide: Curbing Deceptive Yelp Behaviors Proceedings of the SIAM International Conference on Data Mining (SDM).
[45]
Mizanur Rahman, Nestor Hernandez, Bogdan Carbunar, and Duen Horng Chau. 2018. Search Rank Fraud De-Anonymization in Online Systems Proceedings of the ACM Conference on Hypertext and Social Media.
[46]
Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar, and Dongwon Lee. 2017. Stateless Puzzles for Real Time Online Fraud Preemption Proceedings of the ACM Web Science Conference (WebSci).
[47]
Shebuti Rayana and Leman Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '15). ACM, New York, NY, USA, 985--994.
[48]
Brian Reigh. 2017. Fake reviews on the Play Store reportedly growing and getting smarter. Android Authority (April. 2017). https://www.androidauthority.com/fake-reviews-play-store-reportedly-growing-761928/
[49]
Eli Rosenberg. 2017. The Shed at Dulwich' was London's top-rated restaurant. Just one problem: It didn't exist. The Washington Post (Dec. 2017). https://www.nytimes.com/interactive/2018/01/27/technology/social-media-bots.html
[50]
Vlad Sandulescu and Martin Ester. 2015. Detecting Singleton Review Spammers Using Semantic Similarity Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion). ACM, New York, NY, USA, 971--976.
[51]
Giuseppe Silvestri, Jie Yang, Alessandro Bozzon, and Andrea Tagarelli. 2015. Linking Accounts across Social Networks: the Case of StackOverflow, Github and Twitter. KDWeb. 41--52.
[52]
Thamar Solorio, Ragib Hasan, and Mainul Mizan. 2013. A case study of sockpuppet detection in wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media. 59--68.
[53]
Jonghyuk Song, Sangho Lee, and Jong Kim. 2015. CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). ACM, New York, NY, USA, 793--804.
[54]
Tao Stein, Erdong Chen, and Karan Mangla. 2011. Facebook Immune System. In Proceedings of the 4th Workshop on Social Network Systems. 8:1--8:8.
[55]
Brad Stone and Matt Richtel. 2007. The Hand That Controls the Sock Puppet Could Get Slapped. The New York Times, https://www.nytimes.com/2007/07/16/technology/16blog.html.
[56]
Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 563--578. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini
[57]
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y. Zhao. 2013. Follow the Green: Growth and Dynamics in Twitter Follower Markets Proceedings of the 2013 Conference on Internet Measurement Conference (IMC '13). ACM, New York, NY, USA, 163--176.
[58]
Jessica Su, Ansh Shukla, Sharad Goel, and Arvind Narayanan. 2017. De-anonymizing Web Browsing Data with Social Networks Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1261--1269.
[59]
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of the 22Nd USENIX Conference on Security (SEC'13). USENIX Association, Berkeley, CA, USA, 195--210. http://dl.acm.org/citation.cfm?id=2534766.2534784
[60]
Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, and Tong Zhang. 2015. Crowd Fraud Detection in Internet Advertising. In Proceedings of the 24th International Conference on World Wide Web (WWW '15). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1100--1110.
[61]
Nguyen Tran, Bonan Min, Jinyang Li, and Lakshminarayanan Subramanian. 2009. Sybil-resilient Online Content Voting. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09). USENIX Association, Berkeley, CA, USA, 15--28. http://dl.acm.org/citation.cfm?id=1558977.1558979
[62]
Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna P. Gummadi, and Nishanth Sastry. 2016. Strengthening Weak Identities Through Inter-Domain Trust Transfer Proceedings of the 25th International Conference on World Wide Web (WWW '16). 1249--1259.
[63]
Colleen Wamback. 2017. WPI Research Detects When Online Reviews and News Are a Paid-for Pack of Lies. Worcester Polytechnic Institute (November. 2017). https://www.wpi.edu/news/wpi-research-detects-when-online-reviews-and-news-are-paid-pack-lies
[64]
Binghui Wang, Neil Zhenqiang Gong, and Hao Fu. 2017. GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs. In Proceedings of ICDM.
[65]
Gang Wang, Tianyi Wang, Haitao Zhang, and Ben Y. Zhao. 2014. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers Proceedings of the 23rd USENIX Conference on Security Symposium. 239--254.
[66]
Guan Wang, Sihong Xie, Bing Liu, and Philip S. Yu. 2011. Review Graph Based Online Store Review Spammer Detection. IEEE ICDM (2011).
[67]
Emma Woollacott. 2017. Amazon's Fake Review Problem Is Now Worse Than Ever, Study Suggests. Forbes (September. 2017). https://www.forbes.com/sites/emmawoollacott/2017/09/09/exclusive-amazons-fake-review-problem-is-now-worse-than-ever/#77a903177c0f
[68]
Zhen Xie and Sencun Zhu. 2014. GroupTie: Toward Hidden Collusion Group Discovery in App Stores Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec '14). ACM, New York, NY, USA, 153--164.
[69]
Zhen Xie, Sencun Zhu, Qing Li, and Wenjing Wang. 2016. You Can Promote, but You Can'T Hide: Large-scale Abused App Detection in Mobile App Stores. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC '16). ACM, New York, NY, USA, 374--385.
[70]
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data (TKDD) Vol. 8, 1 (2014), 2.
[71]
Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, and Ben Y. Zhao. 2017. Automated Crowdturfing Attacks and Defenses in Online Review Systems Proceedings of the ACM Conference on Computer and Communications Security. 1143--1158.
[72]
Junting Ye, Santhosh Kumar, and Leman Akoglu. 2016. Temporal Opinion Spam Detection by Multivariate Indicative Signals Proceedings of ICWSM. AAAI Press, 743--746.
[73]
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2010. SybilLimit: A Near-optimal Social Network Defense Against Sybil Attacks. IEEE/ACM Trans. Netw. Vol. 18, 3 (June. 2010), 885--898.
[74]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham D. Flaxman. 2008. SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM Trans. Netw. Vol. 16, 3 (June. 2008), 576--589.
[75]
Reza Zafarani and Huan Liu. 2013. Connecting users across social media sites: a behavioral-modeling approach Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. 41--49.
[76]
Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross. 2018. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS).

Cited By

View all
  • (2025)Not All Money Is the Same: The Meanings of Money in Online FraudCrime & Delinquency10.1177/00111287251321442Online publication date: 26-Feb-2025
  • (2024)Provably Secure Decisions based on Potentially Malicious InformationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3353295(1-16)Online publication date: 2024
  • (2022)Composite Behavioral Modeling for Identity Theft Detection in Online Social NetworksIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30920079:2(428-439)Online publication date: Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
October 2018
2359 pages
ISBN:9781450356930
DOI:10.1145/3243734
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Sybil attack
  2. app store optimization
  3. crowdturfing
  4. fake review
  5. fraud de-anonymization
  6. opinion spam
  7. search rank fraud

Qualifiers

  • Research-article

Funding Sources

  • Division of Computer and Network Systems

Conference

CCS '18
Sponsor:

Acceptance Rates

CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,647
  • Downloads (Last 6 weeks)42
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Not All Money Is the Same: The Meanings of Money in Online FraudCrime & Delinquency10.1177/00111287251321442Online publication date: 26-Feb-2025
  • (2024)Provably Secure Decisions based on Potentially Malicious InformationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3353295(1-16)Online publication date: 2024
  • (2022)Composite Behavioral Modeling for Identity Theft Detection in Online Social NetworksIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30920079:2(428-439)Online publication date: Apr-2022
  • (2021)RacketStoreProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487837(639-657)Online publication date: 2-Nov-2021
  • (2021)DFraud³: Multi-Component Fraud Detection Free of Cold-StartIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.308125816(3456-3468)Online publication date: 2021
  • (2019)The Art and Craft of Fraudulent App Promotion in Google PlayProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3345658(2437-2454)Online publication date: 6-Nov-2019

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media