74
Views
0
CrossRef citations to date
0
Altmetric
Computers and Computing

A Unified Neuro-Fuzzy Framework to Assess the User Credibility on Twitter

, &

REFERENCES

  • S. Bazzaz, and E. Mahdipour. “Twitter spam detection: A systematic review.” arXiv preprint arXiv:2011.14754; 2020.
  • Y. Ren, and D. Ji, “Learning to detect deceptive opinion spam: A survey.,” IEEE. Access., Vol. 7, pp. 42934–45, 2019.
  • F. Nurdiatama, and I. Budi, “Malicious account detection on twitter based on tweet account features using machine learning,” in 2019 Fourth International Conference on Informatics and Computing (ICIC), 2019, pp. 1–5. IEEE.
  • A. R. Pathak, A. Mahajan, K. Singh, A. Patil, and A. Nair, “Analysis of techniques for rumor detection in social media,” Procedia Comput. Sci., Vol. 167, pp. 2286–2296, 2020.
  • O. Varol, and A. Flammini, “Online human-bot interactions: detection, estimation, and characterization,” in Proceedings of the International AAAI Conference on Web and Social Media, Vol. 11, no. 1, 2017.
  • M. Orabi, and I. Kamel, “Detection of bots in social media: A systematic review.,” Inf. Process. Manag., Vol. 57, no. 4, pp. 102250, 2020.
  • D. M. G. de Morais, and L. A. Digiampietri, “Methods and challenges in social bots detection: A systematic review,” in XVII Brazilian Symposium on Information Systems, 1–8, 2021.
  • https://www.talkwalker.com/hashtag-tracking?gclid=Cj0KCQiAvP6ABhCj.
  • W. Daffa, O. Bamasag, and A. AlMansour, “A survey on spam URLs detection in Twitter,” in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), IEEE, 2018, pp. 1–6
  • P. Meel, and D. K. Vishwakarma, “Fake news, rumor, information pollution in social media and web: A contemporary survey of state-of-the-arts, challenges and opportunities.,” Expert. Syst. Appl., Vol. 153, pp. 112986, 2020.
  • S. Uma Maheswari, and S. S. Dhenakaran, “Opinion mining on integrated social networks and E-commerce blog,” IETE. J. Res., Vol. 69, no. 4, pp. 2080–2088, 2023.
  • X. Wang, and M. Zhou, “Drifted Twitter spam classification using multiscale detection test on KL divergence,” IEEE. Access., Vol. 7, pp. 108384–108394, 2019.
  • M. Alrubaian, and M. M. Hassan, “Detecting spamming activities in twitter based on deep-learning technique,” Concur Compu: Pract Exp, Vol. 29, no. 19, pp. e4209, 2017.
  • S. Gharge, and M. Chavan, “An integrated approach for malicious tweets detection using NLP,” in 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), IEEE, pp. 435–438, 2017.
  • G. Jardaneh, and D. Johnson, “Classifying Arabic tweets based on credibility using content and user features,” in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), IEEE, pp. 596–601, 2019.
  • M. Jiang, P. Cui, and C. Faloutsos, “Suspicious behavior detection: current trends and future directions.,” IEEE Intell. Syst., Vol. 31, no. 1, pp. 31–39, 2016.
  • S. Madisetty, and M. S. Desarkar, “A neural network-based ensemble approach for spam detection in twitter.,” IEEE Transactions on Comput Soc Sys, Vol. 5, no. 4, pp. 973–984, 2018.
  • G. Jain, M. Sharma, and B. Agarwal, “Spam detection in social media using convolutional and long short term memory neural network.,” Ann. Math. Artif. Intell., Vol. 85, no. 1, pp. 21–44, 2019.
  • Q. Li, Q. Zhang, and L. Si, “Rumor detection by exploiting user credibility information, attention and multi-task learning,” in Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 1173–1179, 2019.
  • S. Yang, K. Shu, S. Wang, R. Gu, F. Wu, and H. Liu, “Unsupervised fake news detection on social media: A generative approach.,” Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33, no. 01, pp. 5644–5651, 2019.
  • S. Prabu, J. Padmanabhan, and G. Bala, “Effective ensemble dimensionality reduction approach using denoising autoencoder for intrusion detection system,” in Intelligent Sustainable Systems: Proceedings of ICISS 2021, vol. 213, Singapore: Springer, 2022, pp. 273–285.
  • H. Tajalizadeh, and R. Boostani, “A novel stream clustering framework for spam detection in twitter.,” IEEE Trans. Compu. Soc. Sys., Vol. 6, no. 3, pp. 525–534, 2019.
  • K. Hayawi, S. Mathew, N. Venugopal, M. M. Masud, and P.-H. Ho, “Deeprobot: a hybrid deep neural network model for social bot detection based on user profile data,” Soc. Netw. Anal. Min., Vol. 12, no. 1, pp. 1–19, 2022.
  • K. E. Daouadi, R. Z. Rebaï, and I. Amous, “Real-time bot detection from twitter using the twitterbot+ framework,” JUCS J. Univ. Comp. Sci., Vol. 26, no. 4, pp. 496–507, 2020.
  • L.-González, and J. I. Mata-Sánchez, “Contrast pattern-based classification for bot detection on twitter,” IEEE. Access., Vol. 7, pp. 45800–45817, 2019.
  • K. S. Adewole, and A. K. Sangaiah, “Twitter spam account detection based on clustering and classification methods,” J. Supercomput., Vol. 76, no. 7, pp. 4802–4837, 2020.
  • N. El-Mawass, P. Honeine, and L. Vercouter, “Similcatch: enhanced social spammers detection on twitter using Markov random fields.,” Inf. Process. Manag., Vol. 57, no. 6, pp. 102317, 2020.
  • B. Abu-Salih, and K. Y. Chan, “Twitter mining for ontology-based domain discovery incorporating machine learning,” J. Knowl. Manag., Vol. 22, no. 5, pp. 949–981, 2018.
  • M. Fazil, and M. Abulaish, “A hybrid approach for detecting automated spammers in twitter,” IEEE Trans. Inf. Forensics Secur., Vol. 13, no. 11, pp. 2707–2719, 2018.
  • M. Reddy, and M. Sandhya, “Spam detection and fake user identification methodologies in social networks using extreme machine learning,” Int. J. Analyt. Exper. Modal. Anal., Vol. 13, pp. 2367–2374, 2021.
  • F. Masood, and M. Zuair, “Spammer detection and fake user identification on social networks,” IEEE. Access., Vol. 7, pp. 68140–68152, 2019.
  • W. Herzallah, H. Faris, and O. Adwan, “Feature engineering for detecting spammers on Twitter: modelling and analysis.,” J. Inf. Sci., Vol. 44, no. 2, pp. 230–247, 2018.
  • M. Alrubaian, and A. Alamri, “A credibility analysis system for assessing information on Twitter,” IEEE Trans. Dependable Secure Comput., Vol. 15, no. 4, pp. 661–674, 2016.
  • P. Jayashree, and K. Laila, “Social network mining for predicting users’ credibility with optimal feature selection,” in Intelligent Sustainable Systems: Proceedings of ICISS 2021, vol. 213, Singapore: Springer, 2022, pp. 361–373.
  • H. Jelodar, and L. Zhao, “Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey.,” Multimed. Tools. Appl., Vol. 78, no. 11, pp. 15169–15211, 2019.
  • T. Jose, and S. S. Babu, “Detecting spammers on social network through clustering technique.,” J. Ambient. Intell. Humaniz. Comput., 1–15, 2019.
  • S. Wu, “The text mining and classification analyses of tumor based on twitter.,” IETE. J. Res., Vol. 69, no 4, pp. 1945–1951, 2023.
  • M. Stewart, W. Liu, and R. Cardell-Oliver. “Word-level lexical normalisation using context-dependent embeddings.” arXiv preprint arXiv:1911.06172., Vol. 69 no. 4, pp. 1945–1951, 2019.
  • R. Chowdhury, and S. K. Bandyopadhyay. A method based on NLP for Twitter spam detection; 2020.
  • J. Yin, and G. Xu, “Leveraging multi-level dependency of relational sequences for social spammer detection,” Neurocomputing, Vol. 428, pp. 130–141, 2021.
  • A. Chen, and P. Cheng, “ACTSSD: social spammer detection based on active learning and co-training,” J. Supercomput., Vol. 78, 2744–2771, 2022.
  • T. Qui, and C. P. Chen, “An adaptive social spammer detection model with semi-supervised broad learning,” IEEE Trans. Knowl. Data Eng., Vol. 34, no. 10, pp. 4622–4635, 2020.
  • K. Hans, L. Ahuja, and S. K. Muttoo, “An adaptive neuro-fuzzy inference system for detecting redirection spam,” in 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, pp. 559–564, 2017.
  • D. Prihadi, and V. Trisyanti. Fuzzy logic approach for email SPAM detection system.
  • K. Lee, B. D. Eoff, and J. Caverlee, “A long-term study of content polluters on twitter,” ICWSM, Seven Months with the Devils, 2011.
  • N. B. Taghvaei, and M. R. Keyvanpour, “A hybrid framework for personality prediction based on fuzzy neural networks and deep neural networks,” J. AI Data Mining, Vol. 9, no. 3, pp. 283–294, 2021.
  • Spam Policy Online Search on Twitter. Available: http://www.webcitation.org/78VPLwy11, Accessed May 2020.
  • A. Ramalingaiah, S. Hussaini, and S. Chaudhari, “Twitter bot detection using supervised machine learning,” J. Phys. Conf. Ser., Vol. 1950, no. 1, pp. 012006, 2021.
  • http://jmcauley.ucsd.edu/data/amazon/\\index_2014.html.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.