A survey of user profiling: State-of-the-art, challenges, and solutions

CI Eke, AA Norman, L Shuib, HF Nweke - IEEE Access, 2019 - ieeexplore.ieee.org
Advancements in information and communication technology, and online web users have
given attention to the virtual representation of each user, which is crucial for effective service …

Detection of compromised online social network account with an enhanced knn

EK Boahen, W Changda… - Applied Artificial …, 2020 - Taylor & Francis
The primary threat to online social network (OSN) users is account compromisation. The
challenge in detecting a compromised account is due to the trusted relationship established …

A graph-oriented model for hierarchical user interest in precision social marketing

Z Zhu, Y Zhou, X Deng, X Wang - Electronic Commerce Research and …, 2019 - Elsevier
With the rapid development of social commerce, how to push and diffuse marketing
messages in online social network (OSN) more effectively has increasingly become a …

GRAM: An efficient (k, l) graph anonymization method

R Mortazavi, SH Erfani - Expert Systems with Applications, 2020 - Elsevier
There are plenty of applications that use graphs for representing the association between
different entities. Many research communities are interested in publishing such graphs to …

A multi-perspective approach for analyzing long-running live events on social media. A case study on the “Big Four” international fashion weeks

AJ Sabet, M Brambilla, M Hosseini - Online Social Networks and Media, 2021 - Elsevier
In the last few years, thanks to the emergence of Web 2.0, social media has made the
concept of online live events possible. Users participate more and more in long-running …

Examining Online Behaviors of Violent and Non-Violent Right-Wing Extremists During Peak Posting Days

R Scrivens - Studies in Conflict & Terrorism, 2024 - Taylor & Francis
Despite the ongoing need for practitioners to identify violent extremists online before their
engagement in violence offline, little is empirically known about their digital footprints …

[Retracted] Computational Technologies for IoT Networks Application in English Classroom Teaching

H Liu, Y Miao, S Zhang - Security and Communication …, 2022 - Wiley Online Library
The purpose of this paper is to combine digital sensing technology with English character
recognition in order to improve its overall effectiveness. In addition, this paper will …

Fake User Detection Based on Multi-Model Joint Representation

J Li, W Jiang, J Zhang, Y Shao, W Zhu - Information, 2024 - mdpi.com
The existing deep learning-based detection of fake information focuses on the transient
detection of news itself. Compared to user category profile mining and detection, transient …

Prediction of social influence for provenance of misinformation in online social network using big data approach

R Sridhar - The Computer Journal, 2021 - academic.oup.com
Online social networks (OSNs) is a platform that plays an essential role in identifying
misinformation like false rumors, insults, pranks, hoaxes, spear phishing and computational …

Multi-interest user profiling in short text microblogs

H Wandabwa, MA Naeem, F Mirza, R Pears… - Designing for Digital …, 2020 - Springer
Discourse on short text platforms like Twitter shapes the design of underlying knowledge-
based recommendation engines. The resulting recommendations are powered by user …