[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/3191835.3191872acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Accurately detecting trolls in slashdot zoo via decluttering

Published: 17 August 2014 Publication History

Abstract

Online social networks like Slashdot bring valuable information to millions of users - but their accuracy is based on the integrity of their user base. Unfortunately, there are many "trolls" on Slashdot who post misinformation and compromise system integrity. In this paper, we develop a general algorithm called TIA (short for Troll Identification Algorithm) to classify users of an online "signed" social network as malicious (e.g. trolls on Slashdot) or benign (i.e. normal honest users). Though applicable to many signed social networks, TIA has been tested on troll detection on Slashdot Zoo under a wide variety of parameter settings. Its running time is faster than many past algorithms and it is significantly more accurate than existing methods.

References

[1]
J. Kunegis, A. Lommatzsch, and C. Bauckhage, "The slashdot zoo: mining a social network with negative edges," in WWW, 2009, pp. 741--750.
[2]
S. Maniu, B. Cautis, and T. Abdessalem, "Building a signed network from interactions in wikipedia," in DBSocial, 2011, pp. 19--24.
[3]
E. Kouloumpis, T. Wilson, and J. Moore, "Twitter sentiment analysis: The good the bad and the omg!" in ICWSM, 2011.
[4]
R. Feldman, "Techniques and applications for sentiment analysis," Commun. ACM, vol. 56, no. 4, pp. 82--89, 2013.
[5]
P. Bonacich and P. Lloyd, "Calculating status with negative relations," Social Networks, vol. 26, no. 4, pp. 331 -- 338, 2004.
[6]
J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, "Predicting positive and negative links in online social networks," in WWW, 2010, pp. 641--650.
[7]
J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, "Signed networks in social media," in CHI, 2010, pp. 1361--1370.
[8]
J. A. Golbeck, "Computing and applying trust in web-based social networks," Ph.D. dissertation, University of Maryland, USA, 2005.
[9]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks," in WWW, 2003, pp. 640--651.
[10]
R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of trust and distrust," in WWW, 2004, pp. 403--412.
[11]
A. A. Zolfaghar K., "Mining trust and distrust relationships in social web applications," in IEEE ICCP, 2010, p. 7380.
[12]
S. Brin and L. Page, "The anatomy of a large-scale hypertextual web search engine," Computer Networks, vol. 30, no. 1--7, pp. 107--117, 1998.
[13]
M. Shahriari and M. Jalili, "Ranking nodes in signed social networks," Social Netw. Analys. Mining, vol. 4, no. 1, 2014.
[14]
P. Bonacich, "Factoring and weighting approaches to status scores and clique identification," Journal of Mathematical Sociology, vol. 2, no. 1, pp. 113--120, 1972.
[15]
J. M. Kleinberg, "Authoritative sources in a hyperlinked environment," J. ACM, vol. 46, no. 5, pp. 604--632, 1999.
[16]
A. Mishra and A. Bhattacharya, "Finding the bias and prestige of nodes in networks based on trust scores," in WWW, 2011, pp. 567--576.
[17]
D. Donato, S. Leonardi, and M. Paniccia, "Combining transitive trust and negative opinions for better reputation management in social networks," in SNA KDD, 2008.
[18]
M. Najork, H. Zaragoza, and M. J. Taylor, "Hits on the web: how does it compare?" in SIGIR, 2007, pp. 471--478.

Cited By

View all
  • (2023)Detecting Covert Disruptive Behavior in Online Interaction by Analyzing Conversational Features and Norm ViolationsACM Transactions on Computer-Human Interaction10.1145/363514331:2(1-43)Online publication date: 1-Dec-2023
  • (2023)Automated Content Moderation Increases Adherence to Community GuidelinesProceedings of the ACM Web Conference 202310.1145/3543507.3583275(2666-2676)Online publication date: 30-Apr-2023
  • (2023)SigGAN: Adversarial Model for Learning Signed Relationships in NetworksACM Transactions on Knowledge Discovery from Data10.1145/353261017:1(1-20)Online publication date: 20-Feb-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '14: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
August 2014
1021 pages
ISBN:9781479958764
  • Conference Chairs:
  • Yan Jia,
  • Jon Rokne,
  • Program Chairs:
  • Xindong Wu,
  • Martin Ester,
  • Guandong Xu

Sponsors

Publisher

IEEE Press

Publication History

Published: 17 August 2014

Check for updates

Qualifiers

  • Research-article

Conference

ASONAM '14
Sponsor:

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Detecting Covert Disruptive Behavior in Online Interaction by Analyzing Conversational Features and Norm ViolationsACM Transactions on Computer-Human Interaction10.1145/363514331:2(1-43)Online publication date: 1-Dec-2023
  • (2023)Automated Content Moderation Increases Adherence to Community GuidelinesProceedings of the ACM Web Conference 202310.1145/3543507.3583275(2666-2676)Online publication date: 30-Apr-2023
  • (2023)SigGAN: Adversarial Model for Learning Signed Relationships in NetworksACM Transactions on Knowledge Discovery from Data10.1145/353261017:1(1-20)Online publication date: 20-Feb-2023
  • (2020)TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 PandemicProceedings of the New Security Paradigms Workshop 202010.1145/3442167.3442169(59-75)Online publication date: 26-Oct-2020
  • (2018)Community Interaction and Conflict on the WebProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186141(933-943)Online publication date: 10-Apr-2018
  • (2016)Troll vulnerability in online social networksProceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.5555/3192424.3192689(1394-1396)Online publication date: 18-Aug-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media