Classification of Instagram fake users using supervised machine learning
algorithms
- URL: http://arxiv.org/abs/2311.12336v1
- Date: Tue, 21 Nov 2023 03:59:14 GMT
- Title: Classification of Instagram fake users using supervised machine learning
algorithms
- Authors: Vertika Singh, Naman Tolasaria, Patel Meet Alpeshkumar, Shreyash
Bartwal
- Abstract summary: This paper proposes an application designed to detect and neutralize such dishonest entities.
The user-centric design of the application ensures accessibility for investigative agencies.
- Score: 0.0
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: In the contemporary era, online social networks have become integral to
social life, revolutionizing the way individuals manage their social
connections. While enhancing accessibility and immediacy, these networks have
concurrently given rise to challenges, notably the proliferation of fraudulent
profiles and online impersonation. This paper proposes an application designed
to detect and neutralize such dishonest entities, with a focus on safeguarding
companies from potential fraud. The user-centric design of the application
ensures accessibility for investigative agencies, particularly the criminal
branch, facilitating navigation of complex social media landscapes and
integration with existing investigative procedures
Related papers
- Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems [11.501563549824466]
We investigate the nuanced dynamics between user engagement on Web3 social platforms and the consequent privacy concerns.
We scrutinize the widespread phenomenon of fabricated activities, which encompasses the establishment of bogus accounts aimed at mimicking popularity.
We highlight the urgent need for more stringent privacy measures and ethical protocols to navigate the complex web of social exchanges.
arXiv Detail & Related papers (2024-05-22T06:26:15Z) - Detecting fake accounts through Generative Adversarial Network in online
social media [0.0]
This paper proposes a novel method using user similarity measures and the Generative Adversarial Network (GAN) algorithm to identify fake user accounts in the Twitter dataset.
Despite the problem's complexity, the method achieves an AUC rate of 80% in classifying and detecting fake accounts.
arXiv Detail & Related papers (2022-10-25T10:20:27Z) - Cross-Network Social User Embedding with Hybrid Differential Privacy
Guarantees [81.6471440778355]
We propose a Cross-network Social User Embedding framework, namely DP-CroSUE, to learn the comprehensive representations of users in a privacy-preserving way.
In particular, for each heterogeneous social network, we first introduce a hybrid differential privacy notion to capture the variation of privacy expectations for heterogeneous data types.
To further enhance user embeddings, a novel cross-network GCN embedding model is designed to transfer knowledge across networks through those aligned users.
arXiv Detail & Related papers (2022-09-04T06:22:37Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z) - Federated Social Recommendation with Graph Neural Network [69.36135187771929]
We propose fusing social information with user-item interactions to alleviate it, which is the social recommendation problem.
We devise a novel framework textbfFedrated textbfSocial recommendation with textbfGraph neural network (FeSoG)
arXiv Detail & Related papers (2021-11-21T09:41:39Z) - Relational Graph Neural Networks for Fraud Detection in a Super-App
environment [53.561797148529664]
We propose a framework of relational graph convolutional networks methods for fraudulent behaviour prevention in the financial services of a Super-App.
We use an interpretability algorithm for graph neural networks to determine the most important relations to the classification task of the users.
Our results show that there is an added value when considering models that take advantage of the alternative data of the Super-App and the interactions found in their high connectivity.
arXiv Detail & Related papers (2021-07-29T00:02:06Z) - A Social Search Model for Large Scale Social Networks [4.3835068018995935]
Retrieval system treats social connections as indexing terms, and generates meaningful results sets by biasing towards close social connections.
Deep neural network handles textual and social relevance in a two-tower approach, in which personalization and textual relevance are addressed jointly.
System is deployed on Facebook and is helping billions of users finding postings from their connections efficiently.
arXiv Detail & Related papers (2020-05-09T02:59:02Z) - DiffNet++: A Neural Influence and Interest Diffusion Network for Social
Recommendation [50.08581302050378]
Social recommendation has emerged to leverage social connections among users for predicting users' unknown preferences.
We propose a preliminary work of a neural influence diffusion network (i.e., DiffNet) for social recommendation (Diffnet)
In this paper, we propose DiffNet++, an improved algorithm of Diffnet that models the neural influence diffusion and interest diffusion in a unified framework.
arXiv Detail & Related papers (2020-01-15T08:45:34Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.