{"id":"https://openalex.org/W2293634932","doi":"https://doi.org/10.1145/2818052.2869094","title":"LBSNShield: Malicious Account Detection in Location-Based Social Networks","display_name":"LBSNShield: Malicious Account Detection in Location-Based Social Networks","publication_year":2016,"publication_date":"2016-02-27","ids":{"openalex":"https://openalex.org/W2293634932","doi":"https://doi.org/10.1145/2818052.2869094","mag":"2293634932"},"language":"en","primary_location":{"id":"doi:10.1145/2818052.2869094","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2818052.2869094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100838958","display_name":"Xuan Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Xuan","raw_affiliation_strings":["Fudan University, Ministry of Education, China, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Fudan University, Ministry of Education, China, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I24943067","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350503","display_name":"Yang Chen","orcid":"https://orcid.org/0000-0003-4749-3060"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Chen","raw_affiliation_strings":["Fudan University, Ministry of Education, China, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Fudan University, Ministry of Education, China, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I24943067","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603788","display_name":"Huiying Li","orcid":"https://orcid.org/0000-0002-3637-2581"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiying Li","raw_affiliation_strings":["Fudan University, Ministry of Education, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Ministry of Education, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029925982","display_name":"Pan Hui","orcid":"https://orcid.org/0000-0002-0848-2599"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Pan Hui","raw_affiliation_strings":["Hong Kong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072249624","display_name":"Lei Shi","orcid":"https://orcid.org/0000-0002-1170-3911"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Shi","raw_affiliation_strings":["Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100838958"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":4.8336,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.9506051,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"437","last_page":"440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7020233869552612},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6206986308097839},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34390872716903687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7020233869552612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6206986308097839},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34390872716903687}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2818052.2869094","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2818052.2869094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-76997","is_oa":false,"landing_page_url":"http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000468137600106","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"},{"id":"pmh:oai:repository.ust.hk:1783.1-76997","is_oa":false,"landing_page_url":"http://repository.ust.hk/ir/Record/1783.1-76997","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1882350379","https://openalex.org/W1979675303","https://openalex.org/W2092277251","https://openalex.org/W2140097565","https://openalex.org/W2168508162"],"related_works":["https://openalex.org/W3007967230","https://openalex.org/W2030496847","https://openalex.org/W4313313264","https://openalex.org/W2236103065","https://openalex.org/W2547405342","https://openalex.org/W2787177649","https://openalex.org/W2783961853","https://openalex.org/W2534190072","https://openalex.org/W2940769101","https://openalex.org/W2143560501"],"abstract_inverted_index":{"Given":[0],"the":[1,16,27,55,61,108],"popularity":[2],"of":[3,20,29,39,63,116,125,152],"GPS-enabled":[4],"smart":[5],"devices,":[6],"location-based":[7],"social":[8],"networks":[9],"(LBSNs)":[10],"have":[11],"attracted":[12],"numerous":[13],"users":[14],"around":[15],"world.":[17],"The":[18],"openness":[19],"LBSN":[21,87],"platforms":[22],"has":[23],"also":[24],"made":[25],"themselves":[26],"targets":[28],"malicious":[30,56,75,104],"attack-ers.":[31],"In":[32,66],"LBSNs,":[33],"attackers":[34],"can":[35,148],"register":[36],"a":[37,85,95,114,134],"number":[38,115],"fake":[40,49],"iden-tities":[41],"and":[42,53,103],"let":[43],"them":[44],"post":[45],"spam":[46],"reviews":[47],"or":[48],"check-ins.":[50],"Therefore,":[51],"discovering":[52],"blocking":[54],"accounts":[57],"are":[58],"vital":[59],"for":[60],"experience":[62],"legitimate":[64,102],"users.":[65],"this":[67],"pa-per,":[68],"we":[69,112,131],"investigated":[70],"how":[71],"to":[72,100,119,142],"accurately":[73],"detect":[74],"ac-counts":[76],"in":[77,88],"LBSNs.":[78],"We":[79,92],"collected":[80],"rich":[81],"user":[82],"data":[83,110],"from":[84],"pop-ular":[86],"China,":[89],"so-called":[90],"Dianping.":[91],"then":[93],"built":[94,132],"crowdsourcing":[96],"based":[97],"annotation":[98],"platform":[99],"mark":[101],"accounts.":[105,126],"By":[106],"examining":[107],"annotated":[109],"set,":[111],"selected":[113],"key":[117],"features":[118],"distinguish":[120],"between":[121],"these":[122,129],"two":[123],"types":[124],"Based":[127],"on":[128],"fea-tures,":[130],"LBSNShield,":[133],"machine":[135],"learning-based":[136],"mali-cious":[137],"account":[138],"detection":[139],"system.":[140],"According":[141],"our":[143,146],"extensive":[144],"evaluation,":[145],"system":[147],"achieve":[149],"an":[150],"F1-score":[151],"0.89.":[153]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
