您当前的位置:
首页 >
文章列表页 >
Overview of detection techniques for malicious social bots
Comprehensive Reviews | 更新时间:2024-06-05
    • Overview of detection techniques for malicious social bots

    • Journal on Communications   Vol. 38, Issue Z2, Pages: 197-210(2017)
    • DOI:10.11959/j.issn.1000-436x.2017275    

      CLC: TP391
    • Online First:2017-11

      Published:25 November 2017

    移动端阅览

  • Rong LIU, Bo CHEN, Ling YU, et al. Overview of detection techniques for malicious social bots[J]. Journal on Communications, 2017, 38(Z2): 197-210. DOI: 10.11959/j.issn.1000-436x.2017275.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

4169

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey on differential privacy and its progress
Fine-grained recognition method for encrypted FTP commands based on temporal dual-mode feature fusion
Survey on key technologies for native-intelligence-driven spectrum management towards 6G
Enhanced membership inference attack method leveraging data characteristics
Privacy-preserving task matching scheme for crowdsourcing

Related Author

Zhi-qiang GAO
Yu-tao WANG
Fu Chunhui
Yang Zhi
Guo Yuanbo
Li Yongfei
Jin Shuyuan
Wang Xianmei

Related Institution

Department of Information Engineering,Engineering University of PAP
School of Computer Science and Engineering, Sun Yat-sen University
School of Cryptography, Information Engineering University
School of Cyberspace Security, Hainan University
Hebei Key Laboratory of Space-Air-Ground Intelligent Communication, University of Science and Technology Beijing
0