4.7 Review

A review on social spam detection: Challenges, open issues, and future directions

Related references

Note: Only part of the references are listed.
Review Computer Science, Interdisciplinary Applications

The Revolution of Blockchain: State-of-the-Art and Research Challenges

Suyel Namasudra et al.

Summary: With the rapid development of the IT industry, data security has become a critical issue, and Blockchain technology is widely used to enhance data security. This technology allows for decentralized, immutable, and transparent transactions without the need for a trusted third party. The study discusses the fundamentals of Blockchain, its working procedure, applications in various fields, as well as future research challenges.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2021)

Article Computer Science, Artificial Intelligence

An unsupervised detection method for shilling attacks based on deep learning and community detection

Yaojun Hao et al.

Summary: This study proposes an unsupervised method based on deep learning and community detection for shilling attack detection. Experimental results show that the proposed method outperforms some baseline detectors in detecting simulated attacks and actual attacks.

SOFT COMPUTING (2021)

Article Computer Science, Artificial Intelligence

A novel framework for detecting social bots with deep neural networks and active learning

Yuhao Wu et al.

Summary: Microblogging, as a popular form of online social networking, faces challenges in detecting social bots due to their increasing sophistication and resemblance to regular users. This study introduces a novel framework (DABot) based on deep neural networks and active learning, which outperforms existing methods in detecting social bots on platforms like Sina Weibo.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Automation & Control Systems

Analysing centralities for organisational role inference in online social networks

Ruben Sanchez-Corcuera et al.

Summary: The intensive use of Online Social Networks has led to users exposing more information unknowingly. In this paper, authors propose a method to deduce the roles of employees within an organization using Twitter relationships and graph features. Results show that latent features of the graph along with directed relationships perform better in classifying employee roles compared to previously proposed methods.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Proceedings Paper Computer Science, Information Systems

Social Engineering Attacks: Recent Advances and Challenges

Nikol Mashtalyar et al.

Summary: This article discusses the threats of social engineering attacks to organizations and digital infrastructure, as well as mitigation strategies. Social engineers exploit human psychological weaknesses to target intellectual property, data, financial resources, and other assets, requiring institutions to be vigilant and prepared for defense.

HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021) (2021)

Review Information Science & Library Science

Big data analytics meets social media: A systematic review of techniques, open issues, and future directions

Sepideh Bazzaz Abkenar et al.

Summary: Social Networking Services connect people worldwide through sharing contents, photos, and videos, with big data analytics techniques commonly exploited in Social Network Analysis. The research mainly focuses on big data analytic approaches in social networks, classified into content-oriented and network-oriented methods, discussing their advantages and disadvantages.

TELEMATICS AND INFORMATICS (2021)

Review Computer Science, Interdisciplinary Applications

A Survey of Deep Learning and Its Applications: A New Paradigm to Machine Learning

Shaveta Dargan et al.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2020)

Article Computer Science, Hardware & Architecture

Predicting the customer's opinion on amazon products using selective memory architecture-based convolutional neural network

Trupthi Mandhula et al.

JOURNAL OF SUPERCOMPUTING (2020)

Article Computer Science, Information Systems

Co-Detection of crowdturfing microblogs and spammers in online social networks

Bo Liu et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2020)

Review Computer Science, Artificial Intelligence

Applicability of machine learning in spam and phishing email filtering: review and approaches

Tushaar Gangavarapu et al.

ARTIFICIAL INTELLIGENCE REVIEW (2020)

Article Computer Science, Information Systems

Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection

Somya Ranjan Sahoo et al.

ENTERPRISE INFORMATION SYSTEMS (2020)

Review Computer Science, Artificial Intelligence

A review of deep learning with special emphasis on architectures, applications and recent trends

Saptarshi Sengupta et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Review Computer Science, Artificial Intelligence

Detection of malicious social bots: A survey and a refined taxonomy

Majd Latah

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Review Computer Science, Hardware & Architecture

A Decade of Social Bot Detection

Stefano Cresci

COMMUNICATIONS OF THE ACM (2020)

Article Multidisciplinary Sciences

The COVID-19 social media infodemic

Matteo Cinelli et al.

SCIENTIFIC REPORTS (2020)

Article Computer Science, Artificial Intelligence

Deepfakes and beyond: A Survey of face manipulation and fake detection

Ruben Tolosana et al.

INFORMATION FUSION (2020)

Proceedings Paper Computer Science, Information Systems

Detecting Malicious Social Bots: Story of a Never-Ending Clash

Stefano Cresci

DISINFORMATION IN OPEN ONLINE MEDIA (2020)

Article Psychology, Biological

Assessing the risks of 'infodemics' in response to COVID-19 epidemics

Riccardo Gallotti et al.

NATURE HUMAN BEHAVIOUR (2020)

Article Computer Science, Information Systems

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

Bin Wu et al.

IEEE ACCESS (2020)

Article Computer Science, Cybernetics

Recommender System-Based Diffusion Inferring for Open Social Networks

Xiao Yang et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2020)

Review Statistics & Probability

Adversarial machine learning for cybersecurity and computer vision: Current developments and challenges

Bowei Xi

WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS (2020)

Article Computer Science, Information Systems

DeepVision: Deepfakes Detection Using Human Eye Blinking Pattern

Tackhyun Jung et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Adaptive deep Q-learning model for detecting social bots and influential users in online social networks

Greeshma Lingam et al.

APPLIED INTELLIGENCE (2019)

Review Computer Science, Information Systems

A review on trust propagation and opinion dynamics in social networks and group decision making frameworks

Raquel Urena et al.

INFORMATION SCIENCES (2019)

Review Chemistry, Multidisciplinary

Spam Review Detection Techniques: A Systematic Literature Review

Naveed Hussain et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Artificial Intelligence

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

Prithviraj Dasgupta et al.

AI MAGAZINE (2019)

Review Computer Science, Hardware & Architecture

The History of Digital Spam

Emilio Ferrara

COMMUNICATIONS OF THE ACM (2019)

Article Computer Science, Hardware & Architecture

Hybrid approach for detection of malicious profiles in twitter

Somya Ranjan Sahoo et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Cybernetics

A Novel Stream Clustering Framework for Spam Detection in Twitter

Hadi Tajalizadeh et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems

Ahmed Abusnaina et al.

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Review Multidisciplinary Sciences

Machine learning for email spam filtering: review, approaches and open research problems

Emmanuel Gbenga Dada et al.

HELIYON (2019)

Review Computer Science, Information Systems

Social Engineering Attacks: A Survey

Fatima Salahdine et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

A Comprehensive Survey for Intelligent Spam Email Detection

Asif Karim et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Combating Deepfake Videos Using Blockchain and Smart Contracts

Haya R. Hasan et al.

IEEE ACCESS (2019)

Review Management

The Emergence of Deepfake Technology: A Review

Mika Westerlund

TECHNOLOGY INNOVATION MANAGEMENT REVIEW (2019)

Proceedings Paper Computer Science, Theory & Methods

Bot Electioneering Volume: Visualizing Social Bot Activity During Elections

Kai-Cheng Yang et al.

COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ) (2019)

Review Computer Science, Information Systems

Review of Deep Learning Algorithms and Architectures

Ajay Shrestha et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Recent Progress on Generative Adversarial Networks (GANs): A Survey

Zhaoqing Pan et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

The Rise of Social Botnets: Attacks and Countermeasures

Jinxue Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets

Sylvio Barbon et al.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook

Shailendra Rathore et al.

APPLIED SOFT COMPUTING (2018)

Article Computer Science, Cybernetics

From risk factors to detection and intervention: a practical proposal for future work on cyberbullying

Andri Ioannou et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

Fake profile detection techniques in large-scale online social networks: A comprehensive review

Devakunchari Ramalingam et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

Combating the evolving spammers in online social networks

Qiang Fu et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Twitter spam detection: Survey of new approaches and comparative study

Tingmin Wu et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Cyber-security: Identity deception detection on social media platforms

Estee van der Walt et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Cybernetics

Who is Who on Twitter-Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time

Monika Singh et al.

CYBERNETICS AND SYSTEMS (2018)

Article Computer Science, Theory & Methods

A prediction system of Sybil attack in social network using deep-regression model

Muhammad Al-Qurishi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Ensemble based spam detection in social loT using probabilistic data structures

Amritpal Singh et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A Hybrid Approach for Detecting Automated Spammers in Twitter

Mohd Fazil et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

Discovering spammer communities in twitter

P. V. Bindu et al.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2018)

Review Computer Science, Hardware & Architecture

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches

Ravneet Kaur et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

SocksCatch: Automatic detection and grouping of sockpuppets in social media

Zaher Yamak et al.

KNOWLEDGE-BASED SYSTEMS (2018)

Article Computer Science, Information Systems

Using Machine Learning to Detect Fake Identities: Bots vs Humans

Estee Van Der Walt et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Attribute Inference Attacks in Online Social Networks

Neil Zhenqiang Gong et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning

Bo Feng et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Deep neural networks for bot detection

Sneha Kudugunta et al.

INFORMATION SCIENCES (2018)

Article Multidisciplinary Sciences

The spread of low-credibility content by social bots

Chengcheng Shao et al.

NATURE COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Trust evaluation based on evidence theory in online social networks

Jian Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2018)

Article Computer Science, Information Systems

Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique

Dharmaraj R. Patil et al.

CYBERNETICS AND INFORMATION TECHNOLOGIES (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Collective Classification of Spam Campaigners on Twitter: A Hierarchical Meta-Path Based Approach

Srishti Gupta et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Proceedings Paper Computer Science, Information Systems

A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks

Yang Xin et al.

2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2018)

Article Computer Science, Cybernetics

Semi-Supervised Spam Detection in Twitter Stream

Surendra Sedhai et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)

Article Computer Science, Information Systems

Attribute selection for improving spam classification in online social networks: a rough set theory-based approach

Soumi Dutta et al.

SOCIAL NETWORK ANALYSIS AND MINING (2018)

Article Multidisciplinary Sciences

A Feature Selection Approach to Detect Spam in the Facebook Social Network

Mohammad Karim Sohrabi et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Computer Science, Information Systems

Detecting opinion spams and fake news using text classification

Hadeer Ahmed et al.

SECURITY AND PRIVACY (2018)

Article Computer Science, Information Systems

Discovering hidden suspicious accounts in online social networks

Jian Cao et al.

INFORMATION SCIENCES (2017)

Review Computer Science, Hardware & Architecture

Malicious accounts: Dark of the social networks

Kayode Sakariyah Adewole et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

Discovering social spammers from multiple views0

Hua Shen et al.

NEUROCOMPUTING (2017)

Article Computer Science, Interdisciplinary Applications

Social Bots: Human-Like by Means of Human Control?

Christian Grimme et al.

BIG DATA (2017)

Article Computer Science, Information Systems

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability

Guanjun Lin et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Sybil Defense Techniques in Online Social Networks: A Survey

Muhammad Al-Qurishi et al.

IEEE ACCESS (2017)

Article Computer Science, Cybernetics

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

Abigail Paradise et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2017)

Article Operations Research & Management Science

Organization Mining Using Online Social Networks

Michael Fire et al.

NETWORKS & SPATIAL ECONOMICS (2016)

Review Computer Science, Hardware & Architecture

The Rise of Social Bots

Emilio Ferrara et al.

COMMUNICATIONS OF THE ACM (2016)

Article Computer Science, Cybernetics

Followers or Fradulents? An Analysis and Classification of Twitter Followers Market Merchants

Monika Singh et al.

CYBERNETICS AND SYSTEMS (2016)

Article Computer Science, Theory & Methods

Profiling Online Social Behaviors for Compromised Account Detection

Xin Ruan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Recent developments in social spam detection and combating techniques: A survey

Manajit Chakraborty et al.

INFORMATION PROCESSING & MANAGEMENT (2016)

Article Computer Science, Information Systems

Follow spam detection based on cascaded social information

Sihyun Jeong et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Artificial Intelligence

Fame for sale: Efficient detection of fake Twitter followers

Stefano Cresci et al.

DECISION SUPPORT SYSTEMS (2015)

Review Computer Science, Artificial Intelligence

Detection of review spam: A survey

Atefeh Heydari et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

Toward Trustworthy Social Network Services: A Robust Design of Recommender Systems

Giseop Noh et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2015)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Article Computer Science, Artificial Intelligence

Detecting spammers on social networks

Xianghan Zheng et al.

NEUROCOMPUTING (2015)

Article Communication

Rationalizing Sociality: An Unfinished Script for Socialbots

Maria Bakardjieva

INFORMATION SOCIETY (2015)

Article Computer Science, Information Systems

Online Social Networks: Threats and Solutions

Michael Fire et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Pollution, bad-mouthing, and local marketing: The underground of location-based social networks

Helen Costa et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Theory & Methods

A Survey of Trust in Social Networks

Wanita Sherchan et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Information Systems

A Survey of Phishing Email Filtering Techniques

Ammar Almomani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Theory & Methods

Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers

Chao Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

A Survey of Emerging Approaches to Spam Filtering

Godwin Caruana et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Artificial Intelligence

A survey of learning-based techniques of email spam filtering

Enrico Blanzieri et al.

ARTIFICIAL INTELLIGENCE REVIEW (2009)

Article Communication

Social Network Sites: Definition, History, and Scholarship

Danah M. Boyd et al.

JOURNAL OF COMPUTER-MEDIATED COMMUNICATION (2007)