Preemptive Detection of Fake Accounts on Social Networks via Multi-Class
Preferential Attachment Classifiers
- URL: http://arxiv.org/abs/2308.05353v1
- Date: Thu, 10 Aug 2023 05:49:30 GMT
- Title: Preemptive Detection of Fake Accounts on Social Networks via Multi-Class
Preferential Attachment Classifiers
- Authors: Adam Breuer, Nazanin Khosravani, Michael Tingley, Bradford Cottel
- Abstract summary: We describe a new algorithm called PreAttacK for detecting fake accounts in a social network.
We show that PreAttacK approximates the posterior probability that a new account is fake under a multi-class Preferential Attachment model.
These are the first provable guarantees for fake account detection that apply to new users.
- Score: 2.580765958706854
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this paper, we describe a new algorithm called Preferential Attachment
k-class Classifier (PreAttacK) for detecting fake accounts in a social network.
Recently, several algorithms have obtained high accuracy on this problem.
However, they have done so by relying on information about fake accounts'
friendships or the content they share with others--the very things we seek to
prevent.
PreAttacK represents a significant departure from these approaches. We
provide some of the first detailed distributional analyses of how new fake (and
real) accounts first attempt to request friends after joining a major network
(Facebook). We show that even before a new account has made friends or shared
content, these initial friend request behaviors evoke a natural multi-class
extension of the canonical Preferential Attachment model of social network
growth.
We use this model to derive a new algorithm, PreAttacK. We prove that in
relevant problem instances, PreAttacK near-optimally approximates the posterior
probability that a new account is fake under this multi-class Preferential
Attachment model of new accounts' (not-yet-answered) friend requests. These are
the first provable guarantees for fake account detection that apply to new
users, and that do not require strong homophily assumptions.
This principled approach also makes PreAttacK the only algorithm with
provable guarantees that obtains state-of-the-art performance on new users on
the global Facebook network, where it converges to AUC=0.9 after new users send
+ receive a total of just 20 not-yet-answered friend requests. For comparison,
state-of-the-art benchmarks do not obtain this AUC even after observing
additional data on new users' first 100 friend requests. Thus, unlike
mainstream algorithms, PreAttacK converges before the median new fake account
has made a single friendship (accepted friend request) with a human.
Related papers
- Cloned Identity Detection in Social-Sensor Clouds based on Incomplete Profiles [5.411585313453657]
We propose a novel approach to effectively detect cloned identities of social-sensor cloud service providers (i.e. social media users) in the face of non-privacy-sensitive profile data.
Named ICD-IPD, the proposed approach first extracts account pairs with similar usernames or screen names from a given set of user accounts collected from a social media.
It then learns a multi-view representation associated with a given account and extracts two categories of features for every single account.
arXiv Detail & Related papers (2024-11-02T18:23:22Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Federated Face Forgery Detection Learning with Personalized Representation [63.90408023506508]
Deep generator technology can produce high-quality fake videos that are indistinguishable, posing a serious social threat.
Traditional forgery detection methods directly centralized training on data.
The paper proposes a novel federated face forgery detection learning with personalized representation.
arXiv Detail & Related papers (2024-06-17T02:20:30Z) - Characteristics and prevalence of fake social media profiles with AI-generated faces [7.444681337745949]
Recent advancements in generative artificial intelligence (AI) have raised concerns about their potential to create convincing fake social media accounts.
We present a systematic analysis of Twitter accounts using human faces generated by Generative Adrial Networks (GANs) for their profile pictures.
We show that they are used to spread scams, spam, and amplify coordinated messages, among other inauthentic activities.
arXiv Detail & Related papers (2024-01-05T04:10:46Z) - Compromised account detection using authorship verification: a novel
approach [1.0312968200748118]
Compromising legitimate accounts is a way of disseminating malicious content to a large user base in Online Social Networks (OSNs)
This paper proposes a novel approach based on authorship verification to identify compromised twitter accounts.
arXiv Detail & Related papers (2022-06-02T14:54:27Z) - On the Reproducibility of Neural Network Predictions [52.47827424679645]
We study the problem of churn, identify factors that cause it, and propose two simple means of mitigating it.
We first demonstrate that churn is indeed an issue, even for standard image classification tasks.
We propose using emphminimum entropy regularizers to increase prediction confidences.
We present empirical results showing the effectiveness of both techniques in reducing churn while improving the accuracy of the underlying model.
arXiv Detail & Related papers (2021-02-05T18:51:01Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - A Simple Approach to Case-Based Reasoning in Knowledge Bases [56.661396189466664]
We present a surprisingly simple yet accurate approach to reasoning in knowledge graphs (KGs) that requires emphno training, and is reminiscent of case-based reasoning in classical artificial intelligence (AI)
Consider the task of finding a target entity given a source entity and a binary relation.
Our non-parametric approach derives crisp logical rules for each query by finding multiple textitgraph path patterns that connect similar source entities through the given relation.
arXiv Detail & Related papers (2020-06-25T06:28:09Z) - Pre-training Is (Almost) All You Need: An Application to Commonsense
Reasoning [61.32992639292889]
Fine-tuning of pre-trained transformer models has become the standard approach for solving common NLP tasks.
We introduce a new scoring method that casts a plausibility ranking task in a full-text format.
We show that our method provides a much more stable training phase across random restarts.
arXiv Detail & Related papers (2020-04-29T10:54:40Z) - Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social
Networks [4.923937591056569]
We present the SybilEdge algorithm, which determines whether a new user is a fake account by aggregating over (I) her choices of friend request targets and (II) these targets' respective responses.
We show that SybilEdge rapidly detects new fake users at scale on the Facebook network and outperforms state-of-the-art algorithms.
arXiv Detail & Related papers (2020-04-09T22:03:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.