Learning textual features for Twitter spam detection: A systematic literature review

SB Abkenar, MH Kashani, M Akbari… - Expert Systems with …, 2023 - Elsevier
Background—Nowadays, with the rise of Internet access and mobile devices around the
globe, more people are using social networks for collaboration and receiving real-time …

Bots, elections, and social media: a brief overview

E Ferrara - Disinformation, misinformation, and fake news in social …, 2020 - Springer
Bots, software-controlled accounts that operate on social media, have been used to
manipulate and deceive. We studied the characteristics and activity of bots around major …

Predicting fluctuations in cryptocurrency transactions based on user comments and replies

YB Kim, JG Kim, W Kim, JH Im, TH Kim, SJ Kang… - PloS one, 2016 - journals.plos.org
This paper proposes a method to predict fluctuations in the prices of cryptocurrencies, which
are increasingly used for online transactions worldwide. Little research has been conducted …

Empirical evaluation and new design for fighting evolving twitter spammers

C Yang, R Harkreader, G Gu - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
To date, as one of the most popular online social networks (OSNs), Twitter is paying its dues
as more and more spammers set their sights on this microblogging site. Twitter spammers …

Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y Xiang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …

Suspended accounts in retrospect: an analysis of twitter spam

K Thomas, C Grier, D Song, V Paxson - Proceedings of the 2011 ACM …, 2011 - dl.acm.org
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …

[PDF][PDF] Compa: Detecting compromised accounts on social networks.

M Egele, G Stringhini, C Kruegel, G Vigna - NDSS, 2013 - ucl.ac.uk
As social networking sites have risen in popularity, cyber-criminals started to exploit these
sites to spread malware and to carry out scams. Previous work has extensively studied the …

Statistical features-based real-time detection of drifted twitter spam

C Chen, Y Wang, J Zhang, Y Xiang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Twitter spam has become a critical problem nowadays. Recent works focus on applying
machine learning techniques for Twitter spam detection, which make use of the statistical …

Twitter spam detection based on deep learning

T Wu, S Liu, J Zhang, Y Xiang - Proceedings of the australasian …, 2017 - dl.acm.org
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have developed a series of machine learning-based methods and blacklisting …

Applying spark based machine learning model on streaming big data for health status prediction

LR Nair, SD Shetty, SD Shetty - Computers & Electrical Engineering, 2018 - Elsevier
Abstract Machine learning is one of the driving forces of science and commerce, but the
proliferation of Big Data demands paradigm shifts from traditional methods in the application …