42
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Multi-contextual spammer detection for online social networks

&
Pages 777-786 | Received 01 Feb 2020, Published online: 19 Jan 2021

References

  • Al-Tameem, Ayman bin Abdulaziz, and Abdul Khader Jilani Saudagar. “Machine learning approach for identification of threat content in audio messages shared on social media.” Journal of Discrete Mathematical Sciences and Cryptography 23.1 (2020): 83-93. doi: 10.1080/09720529.2020.1721876
  • Mittal, Ruchi, and M. P. S. Bhatia. “Discovering bottlenecks entities in multi-layer social networks.” Journal of Discrete Mathematical Sciences and Cryptography 22.2 (2019): 241-252. doi: 10.1080/09720529.2019.1582870
  • Jain, Vanita, Rishabh Kapoor, Shashwat Gulyani, and Arun Kumar Dubey. “Categorization of spam images and identification of controversial images on mobile phones using machine learning and predictive learning.” Journal of Discrete Mathematical Sciences and Cryptography 22.2 (2019): 293-307. doi: 10.1080/09720529.2019.1582863
  • Jangra, Monika, and Buddha Singh. “Performance analysis of CLEFIA and PRESENT lightweight block ciphers.” Journal of Discrete Mathematical Sciences and Cryptography 22.8 (2019): 1489-1499. doi: 10.1080/09720529.2019.1695900
  • Cao, Cheng, and James Caverlee. “Behavioral detection of spam URL sharing: posting patterns versus click patterns.” In 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 138-141. IEEE, 2014.
  • Guo, Bo, Hao Wang, Zhaojun Yu, and Yu Sun. “Detecting Spammers in E-Commerce Website via Spectrum Features of User Relation Graph.” In 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), pp. 324-330. IEEE, 2017.
  • Ala’M, Al-Zoubi, Ja’far Alqatawna, and Hossam Faris. “Spam profile detection in social networks based on public features.” In 2017 8th International Conference on information and Communication Systems (ICICS), pp. 130-135. IEEE, 2017.
  • Wang, Alex Hai. “Don’t follow me: Spam detection in twitter.” 2010 international conference on security and cryptography (SECRYPT). IEEE, 2010.
  • Van Der Walt, Estée, and Jan Eloff. “Using machine learning to detect fake identities: bots vs humans.” IEEE Access 6 (2018): 6540-6549.
  • Egele, Manuel, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. “Towards detecting compromised accounts on social networks.” IEEE Transactions on Dependable and Secure Computing 14, no. 4 (2015): 447-460. doi: 10.1109/TDSC.2015.2479616
  • Zhu, Yin, Xiao Wang, Erheng Zhong, Nathan N. Liu, He Li, and Qiang Yang. “Discovering spammers in social networks.” In Twenty-Sixth AAAI Conference on Artificial Intelligence. 2012.
  • Lin, Guanjun, Nan Sun, Surya Nepal, Jun Zhang, Yang Xiang, and Houcine Hassan. “Statistical twitter spam detection demystified: performance, stability and scalability.” IEEE access 5 (2017): 11142–11154. doi: 10.1109/ACCESS.2017.2710540
  • Shankar, Vishnu, and Karan Singh. “An improved user authentication scheme on smartphone using dominating attribute of touch data.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (2019): 1549-1561. doi: 10.1080/09720529.2019.1695903
  • Kumar, Sunil, and Karan Singh. “A keyless secure data aggregation mechanism.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (2019): 1533-1548. doi: 10.1080/09720529.2019.1695902

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.