Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012 | 838 | 2012 |
Who is tweeting on Twitter: human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia Proceedings of the 26th annual computer security applications conference, 21-30, 2010 | 740 | 2010 |
Detecting social spam campaigns on twitter Z Chu, I Widjaja, H Wang Applied Cryptography and Network Security: 10th International Conference …, 2012 | 204 | 2012 |
Blog or block: Detecting blog bots through behavioral biometrics Z Chu, S Gianvecchio, A Koehl, H Wang, S Jajodia Computer Networks 57 (3), 634-646, 2013 | 77 | 2013 |
Bot or human? A behavior-based online bot detection system Z Chu, S Gianvecchio, H Wang From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 25 | 2018 |
An investigation of hotlinking and its countermeasures Z Chu, H Wang Computer Communications 34 (4), 577-590, 2011 | 9 | 2011 |
RCB: A Simple and Practical Framework for Real-time Collaborative Browsing. C Yue, Z Chu, H Wang USENIX Annual Technical Conference 2009, 2009 | 8 | 2009 |
Dependable and Secure Computing Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on, 811-824, 2012 | 1 | 2012 |
Detecting Abnormal Behavior in Web Applications Z Chu The College of William and Mary, 2012 | 1 | 2012 |