Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2063576.2063658acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Content-driven detection of campaigns in social media

Published: 24 October 2011 Publication History

Abstract

We study the problem of detecting coordinated free text campaigns in large-scale social media. These campaigns -- ranging from coordinated spam messages to promotional and advertising campaigns to political astro-turfing -- are growing in significance and reach with the commensurate rise of massive-scale social systems. Often linked by common "talking points", there has been little research in detecting these campaigns. Hence, we propose and evaluate a content-driven framework for effectively linking free text posts with common "talking points" and extracting campaigns from large-scale social media. One of the salient aspects of the framework is an investigation of graph mining techniques for isolating coherent campaigns from large message-based graphs. Through an experimental study over millions of Twitter messages we identify five major types of campaigns -- Spam, Promotion, Template, News, and Celebrity campaigns -- and we show how these campaigns may be extracted with high precision and recall.

References

[1]
A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. Syntactic clustering of the web. Comput. Netw. ISDN Syst., 29(8--13):1157--1166, 1997.
[2]
A. Chowdhury, O. Frieder, D. Grossman, and M. C. McCabe. Collection statistics for fast duplicate document detection. ACM Trans. Inf. Syst., 20(2):171--191, 2002.
[3]
L. Films. (astro)turf wars. www.astroturfwars.com, 2011.
[4]
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement (IMC), 2010.
[5]
N. J. Hurley, M. P. O'Mahony, and G. C. M. Silvestre. Attacking Recommender Systems: A Cost-Benefit Analysis. Intelligent Systems, IEEE, 22(3):64--68, 2007.
[6]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In WWW, 2004.
[7]
E. P. Lim, V. A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In CIKM, 2010.
[8]
M. Theobald, J. Siddharth, and A. Paepcke. Spotsigs: robust and efficient near duplicate detection in large web collections. In SIGIR, 2008.
[9]
E. Tomita, A. Tanaka, and H. Takahashi. The worst-case time complexity for generating all maximal cliques and computational experiments. Theor. Comput. Sci., 363:28--42, 2006.
[10]
N. Wang, S. Parthasarathy, K.-L. Tan, and A. K. H. Tung. Csv: visualizing and mining cohesive subgraphs. In SIGMOD, 2008.
[11]
B. Wu, S. Yang, H. Zhao, and B. Wang. A distributed algorithm to enumerate all maximal cliques in mapreduce. In Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009.

Cited By

View all
  • (2024)Identifying Coordinated Activities on Online Social Networks Using Contrast Pattern Mining2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651552(1-9)Online publication date: 30-Jun-2024
  • (2023)Friendship Preference: Scalable and Robust Category of Features for Social Bot DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315900720:2(1516-1528)Online publication date: 1-Mar-2023
  • (2023)ARD-Stream: An adaptive radius density-based stream clusteringFuture Generation Computer Systems10.1016/j.future.2023.07.027149(416-431)Online publication date: Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '11: Proceedings of the 20th ACM international conference on Information and knowledge management
October 2011
2712 pages
ISBN:9781450307178
DOI:10.1145/2063576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. campaign detection
  2. social media

Qualifiers

  • Research-article

Conference

CIKM '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)2
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Identifying Coordinated Activities on Online Social Networks Using Contrast Pattern Mining2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651552(1-9)Online publication date: 30-Jun-2024
  • (2023)Friendship Preference: Scalable and Robust Category of Features for Social Bot DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315900720:2(1516-1528)Online publication date: 1-Mar-2023
  • (2023)ARD-Stream: An adaptive radius density-based stream clusteringFuture Generation Computer Systems10.1016/j.future.2023.07.027149(416-431)Online publication date: Dec-2023
  • (2020)A Survey of Sentiment Analysis from Social Media DataIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29569577:2(450-464)Online publication date: Apr-2020
  • (2019)Taming Social BotsProceedings of the 28th ACM International Conference on Information and Knowledge Management10.1145/3357384.3360315(2967-2968)Online publication date: 3-Nov-2019
  • (2019)BotCamp: Bot-driven Interactions in Social CampaignsThe World Wide Web Conference10.1145/3308558.3313420(2529-2535)Online publication date: 13-May-2019
  • (2019)A Novel Stream Clustering Framework for Spam Detection in TwitterIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29108186:3(525-534)Online publication date: Jun-2019
  • (2019)Enhancing Content Marketing Article Detection With Graph AnalysisIEEE Access10.1109/ACCESS.2019.29280947(94869-94881)Online publication date: 2019
  • (2017)Detecting Collusive Spamming Activities in Community Question AnsweringProceedings of the 26th International Conference on World Wide Web10.1145/3038912.3052594(1073-1082)Online publication date: 3-Apr-2017
  • (2017)Identifying Opinion Drivers on Social MediaOn the Move to Meaningful Internet Systems. OTM 2017 Conferences10.1007/978-3-319-69459-7_17(242-253)Online publication date: 21-Oct-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media