A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Leveraging Careful Microblog Users for Spammer Detection
2015
Proceedings of the 24th International Conference on World Wide Web - WWW '15 Companion
Microblogging websites, e.g. Twitter and Sina Weibo, have become a popular platform for socializing and sharing information in recent years. ...
Spammers have also discovered this new opportunity to unfairly overpower normal users with unsolicited content, namely social spams. ...
We take it as a baseline to compare with. • TrustRank [10] was proposed to detect web spams, and we adapt it for spammer detection in a microblogging site. ...
doi:10.1145/2740908.2745400
dblp:conf/www/FuXR15
fatcat:ex2u2cszojf7xkvu7ub5jbovmu
Suspicious Behavior Detection: Current Trends and Future Directions
2016
IEEE Intelligent Systems
Detection methods often look for the most suspicious parts of the data by optimizing scores, but quantifying the suspiciousness of a behavioral pattern is still an open issue. ...
The proposed Social Spammer Detection in Microblogging (SSDM) approach is a matrix factorization-based model that integrates both social network information and content information for social spammer detection ...
(spam versus regular message), and shows promising accuracy in combating email spams. 1 People don't want legitimate email blocked, so to take false-positive rates (FPRs) into consideration, AFSD gives ...
doi:10.1109/mis.2016.5
fatcat:afco6xovnbhbdggw7jmyo22uge
Spam, a Digital Pollution and Ways to Eradicate It
2019
International Journal of Engineering and Advanced Technology
This survey is thus mainly used to discuss and analyze the recent research that had been put forth regarding the spam detection in social media sites such as Twitter. ...
Due to the growing popularity of the microblogging and networking sites like twitter, Gmail, Facebook etc., there has been an increase in the number of spammers. ...
Spammers are using different features for their spam messages and are evolving over time. Spamming is usually done with similar content and in large quantities. ...
doi:10.35940/ijeat.b4107.129219
fatcat:uze7gfg3wrgjdmetvpuhzhl7p4
Detecting malicious tweets in trending topics using a statistical analysis of language
2013
Expert systems with applications
In addition, we have developed a machine learning system with some orthogonal features that can be combined with other sets of features with the aim of analyzing emergent characteristics of spam in social ...
This growing microblogging phenomenon therefore allows spammers to disseminate malicious tweets quickly and massively. ...
Acknowledgments This work has been partially supported by the Spanish Ministry of Science and Innovation within the project Holopedia (TIN2010-21128-C02-01) and the Regional Government of Madrid under ...
doi:10.1016/j.eswa.2012.12.015
fatcat:es6fmurrvjau5nyk7twgplesjm
CATS: Characterizing automation of Twitter spammers
2013
2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)
Spammers use myriad of techniques to evade security mechanisms and post spam messages, which are either unwelcome advertisements for the victim or lure victims in to clicking malicious URLs embedded in ...
Our analysis reveals detection of more than 90% of spammers with less than five tweets and about half of the spammers detected with only a single tweet. ...
However, the need to push the same spam message or URL to several users links these spammers and enables our detection methodology. ...
doi:10.1109/comsnets.2013.6465541
dblp:conf/comsnets/AmleshwaramRYGY13
fatcat:vu5wyvuuafb33m4m4ozvoqemcu
Integrating web-based intelligence retrieval and decision-making from the twitter trends knowledge base
2009
Proceeding of the 2nd ACM workshop on Social web search and mining - SWSM '09
Our methodology differs from the existing literature in the sense that we are doing analysis on Twitter microblog messages as opposed to traditional blog analysis in the literature which deals with the ...
Another key difference in our methodology is that we apply visualization techniques in conjunction with artificial intelligence-based data mining methods to classify messages dealing with the trend topic ...
Trended: this detects the presence of the word 'trend' in a message in the context of the user 'piggybacking' on the trending topic but not genuinely discussing the topic in a proper context. ...
doi:10.1145/1651437.1651439
dblp:conf/cikm/CheongL09
fatcat:5tjhdcr7njfidap2rwwd6j4ony
Seminar Users in the Arabic Twitter Sphere
[article]
2017
arXiv
pre-print
We introduce the notion of "seminar users", who are social media users engaged in propaganda in support of a political entity. ...
We develop a framework that can identify such users with 84.4% precision and 76.1% recall. ...
and detection of microblogging spam accounts. ...
arXiv:1707.07276v1
fatcat:kj7t6bjfurh43akssglhs735cq
Adversarial Web Search
2010
Foundations and Trends in Information Retrieval
They observe that, while in the case of e-mail spam each message should be analyzed independently in principle, in the case of comments there is a context which is the page and site where the comment is ...
Additionally, in social media sites users can, and usually do, help with policing bad behavior by reporting abuse and spam. ...
doi:10.1561/1500000021
fatcat:toxnvajrmbdppf5hytdbnykuiq
What do people study when they study Twitter? Classifying Twitter related academic papers
2013
Journal of Documentation
Structured Abstract Purpose Since its introduction in 2006, messages posted to the microblogging system Twitter have provided a rich dataset for researchers, leading to the publication of over a thousand ...
Findings The majority of published work relating to Twitter concentrates on aspects of the messages sent and details of the users. ...
--Enhancing spammer detection on the twitter microblogging platform using friends and followers 2010 Communications in Computer and Mowbray M. ...
doi:10.1108/jd-03-2012-0027
fatcat:3rfuptki5bgxvfxumtf6ea6vxi
User-Generated Content (UGC) Credibility on Social Media Using Sentiment Classification
2019
النشرة المعلوماتیة فی الحاسبات والمعلومات
Because online users face difficulty in finding which piece of information is credible or not, the researchers found that assessing User-Generated Content (UGC) of social media is very important in resolving ...
They usually rely on this information without any verification and this prevents them from making accurate decisions concerning their social lives, politics, or business events. ...
As in the case of opinion spam detection, recent approaches are focusing on the identification of spammers as well as fake news detection. ...
doi:10.21608/fcihib.2019.107506
fatcat:w4vazjtyl5h6zdz2kol2vn5hsy
Twitter Bot Detection Using Bidirectional Long Short-term Memory Neural Networks and Word Embeddings
[article]
2020
arXiv
pre-print
Twitter is a web application playing dual roles of online social networking and micro-blogging. ...
., tweets delivering news and updating feeds, while malicious bots spread spam or malicious contents. ...
In addition, when a spam account is detected, Twitter suspends it or even blocks his IP address temporally, so spammers only need to create a different account to continue sending spam messages or wait ...
arXiv:2002.01336v1
fatcat:fmqknywbrvgc7j5obqnv3cldeq
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
[article]
2020
arXiv
pre-print
attacks and cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; (iv) datasets/metrics ...
We conclude this survey paper with an in-depth discussions on the limitations of the state-of-the-art and recommend future research directions in this area. ...
Crowdturfing activities in social media exploit social networking platforms (e.g., instant message groups, microblogs, blogs, and online forums) as the main information channel of the campaign [162] . ...
arXiv:2004.07678v1
fatcat:k4a6siywefb6lhkmyn67lmoqwe
Social Media Identity Deception Detection: A Survey
[article]
2021
arXiv
pre-print
This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. ...
Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. ...
[107] proposed a Supervised Matrix Factorization method with Social Regularization (SMFSR) to detect spammers. ...
arXiv:2103.04673v1
fatcat:zf6xcn3pafcgfbxmoewc3yhhpi
A Survey of Techniques for Event Detection in Twitter
2013
Computational intelligence
Twitter is among the fastest-growing microblogging and online social networking services. ...
Twitter streams contain large amounts of meaningless messages and polluted content, which negatively affect the detection performance. ...
that co-trend with the query terms in relevant timespans. ...
doi:10.1111/coin.12017
fatcat:wr3wcvxmavbarityeu2szfcuw4
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions
[article]
2020
arXiv
pre-print
In this context, several insights and findings have been provided while elaborating computing and non-computing implications and research directions for potential solutions and social networks management ...
Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific ...
Spam and Misleading Posts Detection Detecting spammers on social networks most often relies on analyzing the content of messages [9], [29] , [31] - [33] , [57] . ...
arXiv:2005.08820v1
fatcat:vzwmd5mwzjendeaq3vfol6yxw4
« Previous
Showing results 1 — 15 out of 71 results