|  Jin L, Chen Y, Wang T, Hui P, Vasilakos A V. Understanding user behavior in online social networks: A survey. IEEE Communications Magazine, 2013, 51(9): 144-150. Nazir A, Raza S, Chuah C N, Schipper B. Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications. In Proc. the 3rd Workshop on Online Social Networks, June 2010. Bhat S Y, Abulaish M. Community-based features for identifying spammers in online social networks. In Proc. ASONAM, August 2013, pp.100-107. Dai H, Zhu F, Lim E P, Pang H. Mining coherent anomaly collections on web data. In Proc. the 21st CIKM, October 29-November 2, 2012, pp.1557-1561. Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao B Y. Detecting and characterizing social spam campaigns. In Proc. the 10th ACM SIGCOMM Internet Measurement Conference, November 2010, pp.35-47. Hu X, Tang J, Zhang Y, Liu H. Social spammer detection in microblogging. In Proc. the 23rd IJCAI, August 2013, pp.2633-2639. Irani D, SteveWebb, Pu C. Study of static classification of social spam profiles in MySpace. In Proc. the 4th ICWSM, May 2010, pp.82-89. Lumezanu C, Feamster N. Observing common spam in Tweets and email. In Proc. the 12th ACM SIGCOMM IMC, November 2012, pp.461-466. Miller Z, Dickinson B, Deitrick W, Hua W, Wang A H. Twitter spammer detection using data stream clustering. Information Sciences, 2014, 260: 64-73. Stringhini G, Kruegel C, Vigna G. Detecting spammers on social networks. In Proc. the 26th Annual Computer Security Applications Conference, December 2010, pp.1-9. Thomas K, Grier C, Paxson V, Song D. Suspended accounts in retrospect: An analysis of Twitter spam. In Proc. the 11th ACM SIGCOMM Internet Measurement Conference, November 2011, pp.243-258. Wang G, Wilson C, Zhao X, Zhu Y, Mohanlal M, Zheng H, Zhao B Y. Serf and turf: Crowdturfing for fun and profits. In Proc. the 21st WWW, April 2012, pp.679-688. Danezis G, Mittal P. SybilInfer: Detecting sybil nodes using social networks. In Proc. NDSS, February 2009. Tran N, Min B, Li J, Subramanian L. Sybil-resilient online content voting. In Proc. the 6th NSDI, April 2009, pp.15-28. Wei W, Xu F, Tan C C, Li Q. SybilDefender: A defense mechanism for sybil attacks in large social networks. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(12): 2492-2502. Yu H, Gibbons P B, Kaminsky M, Xiao F. SybilLimit: A near-optimal social network defense against sybil attacks. In Proc. IEEE Symposium on Security and Privacy, May 2008, pp.3-17. Yu H, Kaminsky M, Gibbons P B, Flaxman A D. Sybil- Guard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking, 2008, 16(3): 576- 589. Chu Z, Gianvecchio S, Wang H, Jajodia S. Who is tweeting on Twitter: Human, bot, or cyborg? In Proc. the 26th Annual Computer Security Applications Conference, December 2010, pp.21-30. Lee K, Caverlee J, Webb S. Uncovering social spammers: Social honeypots + machine learning. In Proc. the 33rd SIGIR, July 2010, pp.435-442. Webb S, Caverlee J, Pu C. Social honeypots: Making friends with a spammer near you. In Proc. the 5th CEAS, August 2008. Benevenuto F, Rodrigues T, Almeida V, Almeida J, Gonglves M. Detecting spammers and content promoters in online video social networks. In Proc. the 32nd SIGIR, July 2009, pp.620-627. Benevenuto F, Magno G, Rodrigues T, Almeida V. Detecting spammers on Twitter. In Proc. CEAS, July 2010. Liu J Y, Zhao Y H, Zhang Z X, Wang Y H, Yuan X M, Hu L, Dong Z J. Spam short messages detection via mining social networks. Journal of Computer Science and Technology, 2012, 27(3): 506-514. Yang Z, Wilson C, Wang X, Gao T, Zhao B Y, Dai Y. Uncovering social network sybils in the wild. In Proc. the 11th ACM SIGCOMM Internet Measurement Conference, November 2011, pp.259-268. Yardi S, Romero D, Schoenebeck G, Boyd D. Detecting spam in a Twitter network. First Monday, 2010, 15(1). Jiang J, Shan Z, Sha W, Wang X, Dai Y. Detecting and validating sybil groups in the wild. In Proc. the 32nd ICDCS Workshops, June 2012, pp.127-132. Jiang J, Wilson C, Wang X, Huang P, Sha W, Dai Y, Zhao B Y. Understanding latent interactions in online social networks. In Proc. the 10th ACM Internet Measurement Conference, November 2010, pp.369-382. Mann H B, Whitney D R. On a test of whether one of two random variables is stochastically larger than the other. The Annals of Mathematical Statistics, 1947, 18(1): 50-60. Palla G, Barabási A L, Vicsek T. Quantifying social group evolution. Nature, 2007, 446(7136): 664-667. Viswanath B, Post A, Gummadi K P, Mislove A. An analysis of social network-based sybil defenses. In Proc. SIGCOMM, August 30-September 3, 2010, pp.363-374. Kumar R, Novak J, Tomkins A. Structure and evolution of online social networks. In Proc. the 12th KDD, August 2006, pp.611-617. Li Z, Chen G, Qiu T. Partition nodes: Topologically-critical nodes of unstructured peer-to-peer networks. Journal of Software, 2008, 19(9): 2376-2388. (in Chinese) Gong M G, Zhang L J, Ma J J, Jiao L C. Community detection in dynamic social networks based on multiobjective immune algorithm. Journal of Computer Science and Technology, 2012, 27(3): 455-467. Blondel V D, Guillaume J L, Lambiotte R, Lefebvre E. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008, 2008(10): P10008. Bastian M, Heymann S, Jacomy M. Gephi: An open source software for exploring and manipulating networks. In Proc. the 3rd International AAAI Conference on Weblogs and Social Media, May 2009, pp.361-362. Xue J, Yang Z, Yang X,Wang X, Chen L, Dai Y. VoteTrust: Leveraging friend invitation graph to defend against social network sybils. In Proc. INFOCOM, April 2013, pp.2400- 2408.