{"id":"https://openalex.org/W4200532622","doi":"https://doi.org/10.1145/3485832.3488013","title":"On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks","display_name":"On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks","publication_year":2021,"publication_date":"2021-12-06","ids":{"openalex":"https://openalex.org/W4200532622","doi":"https://doi.org/10.1145/3485832.3488013"},"language":"en","primary_location":{"id":"doi:10.1145/3485832.3488013","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3485832.3488013","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101910767","display_name":"Zijie Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zijie Yang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101789833","display_name":"Binghui Wang","orcid":"https://orcid.org/0000-0001-5616-060X"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Binghui Wang","raw_affiliation_strings":["Illinois Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology, USA","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100327732","display_name":"Haoran Li","orcid":"https://orcid.org/0000-0002-5994-0203"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoran Li","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054168288","display_name":"Dong Yuan","orcid":"https://orcid.org/0000-0003-1130-0888"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Yuan","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206037","display_name":"Zhuotao Liu","orcid":"https://orcid.org/0000-0002-7532-0434"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuotao Liu","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009102659","display_name":"Neil Zhenqiang Gong","orcid":"https://orcid.org/0000-0002-9900-9309"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neil Zhenqiang Gong","raw_affiliation_strings":["Duke University, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353377","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-4959-7541"},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"Berkeley, USA","institution_ids":["https://openalex.org/I134446601"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Liang","raw_affiliation_strings":["Tencent Inc., China"],"affiliations":[{"raw_affiliation_string":"Tencent Inc., China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059240498","display_name":"Shaofeng Hu","orcid":"https://orcid.org/0000-0003-3056-4440"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaofeng Hu","raw_affiliation_strings":["Tencent Inc., China"],"affiliations":[{"raw_affiliation_string":"Tencent Inc., China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5101910767"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.8509,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72468414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"297","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7721587419509888},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6610957980155945},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5954564809799194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5598562359809875},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5107431411743164},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.44146889448165894},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.3770381212234497},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25327688455581665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7721587419509888},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6610957980155945},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5954564809799194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5598562359809875},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5107431411743164},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.44146889448165894},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.3770381212234497},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25327688455581665}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3485832.3488013","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3485832.3488013","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1233141674","https://openalex.org/W1573258035","https://openalex.org/W1971963941","https://openalex.org/W1986678144","https://openalex.org/W1989643196","https://openalex.org/W1993081839","https://openalex.org/W2016707451","https://openalex.org/W2045775870","https://openalex.org/W2125490153","https://openalex.org/W2142772221","https://openalex.org/W2150941206","https://openalex.org/W2153644028","https://openalex.org/W2155743899","https://openalex.org/W2396652156","https://openalex.org/W2751074899","https://openalex.org/W2764040154","https://openalex.org/W2771677725","https://openalex.org/W2962736666","https://openalex.org/W2963021929","https://openalex.org/W2963539945","https://openalex.org/W2986868741","https://openalex.org/W3175539961","https://openalex.org/W4297077645"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3034529322","https://openalex.org/W2115913271","https://openalex.org/W2113597336","https://openalex.org/W2596305496","https://openalex.org/W2120116197","https://openalex.org/W118448456","https://openalex.org/W159653547","https://openalex.org/W2290534421","https://openalex.org/W1490895842"],"abstract_inverted_index":{"Privacy-centric":[0],"mobile":[1],"social":[2,13,22,67],"network":[3],"(PC-MSN),":[4],"which":[5],"allows":[6],"users":[7,100],"to":[8,45,50,71,84,91,98],"build":[9],"intimate":[10],"and":[11,37,94],"private":[12],"circles,":[14],"is":[15,69],"an":[16],"increasingly":[17],"popular":[18],"type":[19],"of":[20,26],"online":[21],"networks":[23],"(OSNs).":[24],"Because":[25],"strict":[27],"usage":[28],"policy":[29],"enforced":[30],"by":[31],"PC-MSNs":[32],"(such":[33],"as":[34],"restricted":[35],"account":[36,63,80],"content":[38],"access),":[39],"malicious":[40,55,79],"accounts":[41,49,88],"(or":[42],"users)":[43],"have":[44,95],"act":[46],"like":[47],"normal":[48],"accumulate":[51],"credentials":[52],"before":[53],"committing":[54],"activities.":[56],"Therefore,":[57],"analysis":[58],"merely":[59],"relying":[60],"on":[61],"static":[62],"profile":[64],"information":[65],"or":[66],"graphs":[68],"ineffective":[70],"detect":[72,86],"such":[73],"growing-up":[74,87,103],"accounts.":[75],"Besides,":[76],"existing":[77],"behavior-based":[78],"detection":[81],"methods":[82],"fail":[83],"effectively":[85],"who":[89],"pretend":[90],"be":[92],"benign":[93,99],"similar":[96],"behaviors":[97],"during":[101],"the":[102],"stage.":[104]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
