Data Set Used
—Online social networks like Slashdot bring valuable information to millions of users-but their accuracy is based on the integrity of their user base. Unfortunately, there are many " trolls " on Slashdot who post misinformation and compromise system integrity. In this paper, we develop a general algorithm called TIA (short for Troll Identification… (More)
—Selfish mining, originally discovered by Eyal et al. , is a well-known attack where a selfish miner, under certain conditions, can gain a disproportionate share of reward by deviating from the honest behavior. In this paper, we expand the mining strategy space to include novel " stubborn " strategies that, for a large range of parameters, earn the miner… (More)
We study the problem of detecting vandals on Wikipedia <i>before</i> any human or known vandalism detection system reports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a… (More)
Interpersonal relations are fickle, with close friendships often dissolving into enmity. In this work, we explore linguistic cues that presage such transitions by studying dyadic interactions in an on-line strategy game where players form alliances and break those alliances through betrayal. We characterize friendships that are unlikely to last and examine… (More)
Wikipedia is a major source of information for many people. However , false information on Wikipedia raises concerns about its credibility. One way in which false information may be presented on Wikipedia is in the form of hoax articles, i.e., articles containing fabricated facts about nonexistent entities or events. In this paper we study false information… (More)
Findings All citations made in a paper are not equal. What a paper says about another is a good indicator of the expressed sentiment.
In many biochemical protocols, such as polymerase chain reaction, a mixture of fluids in a certain ratio is repeatedly required, and hence a sufficient quantity of the mixture must be supplied for assay completion. Existing sample-preparation algorithms based on digital microfluidics (DMF) emit two target droplets in one pass, and costly multiple passes are… (More)