Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering
نویسندگان
چکیده
Online social networks (OSNs) are threatened by Sybil attacks, which create fake accounts (also called Sybils) on OSNs and use them for various malicious activities. Therefore, detection is a fundamental task OSN security. Most existing methods based the graph structure of OSNs, have been proposed recently. However, although almost all compared experimentally in terms performance noise robustness, theoretical understanding still lacking. In this study, we show that graph-based can be interpreted unified framework low-pass filtering. This enables us to theoretically compare analyze each method from two perspectives: filter kernel properties spectrum shift matrices. Our analysis reveals depends effectiveness Furthermore, basis analysis, propose novel SybilHeat. Numerical experiments synthetic graphs real demonstrate SybilHeat performs consistently well with structural properties. study lays foundation leads better methods.
منابع مشابه
Pixel-Based Skin Detection for Pornography Filtering
A robust skin detector is the primary need of many fields of computer vision, including face detection, gesture recognition, and pornography filtering. Less than 10 years ago, the first paper on automatic pornography filtering was published. Since then, different researchers claim different color spaces to be the best choice for skin detection in pornography filtering. Unfortunately, no com...
متن کاملImproving Sybil Detection via Graph Pruning and Regularization Techniques
Due to their open and anonymous nature, online social networks are particularly vulnerable to Sybil attacks. In recent years, there has been a rising interest in leveraging social network topological structures to combat Sybil attacks. Unfortunately, due to their strong dependency on unrealistic assumptions, existing graph-based Sybil defense mechanisms suffer from high false detection rates. I...
متن کاملHorizontal low or high pass filtering Vertical low or high pass filtering X Input LLLL LLLH LLH LHLH LHLL
In this paper we show how the Orthogonal Memory Processor (OMP) is suited to the implementation of the two-dimensional wavelet transform (2DWT) due to its ability to transpose a data-set in negligible time. The OMP architecture is a shared memory machine in which the processing elements can alternately (together) access either rows or columns of the two-dimensional data-set. Since the 2DWT invo...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولGraph Properties Based Filtering
This article presents a generic filtering scheme, based on the graph description of global constraints. This description is defined by a network of binary constraints and a list of elementary graph properties: each solution of the global constraint corresponds to a subgraph of the initial network, retaining only the satisfied binary constraints, and which fulfills all the graph properties. The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2023
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2023.3237364