Social Network Spam Detection Based on ALBERT and Combination of Bi‐LSTM with Self‐Attention

G Xu, D Zhou, J Liu - Security and Communication Networks, 2021 - Wiley Online Library
Social networks are full of spams and spammers. Although social network platforms have
established a variety of strategies to prevent the spread of spam, strict information review …

Provably Secure Security‐Enhanced Timed‐Release Encryption in the Random Oracle Model

K Yuan, Y Wang, Y Zeng, W Ouyang… - Security and …, 2021 - Wiley Online Library
Cryptographic primitive of timed‐release encryption (TRE) enables the sender to encrypt a
message which only allows the designated receiver to decrypt after a designated time …

[HTML][HTML] Метрики вредоносных социальных ботов

МВ Коломеец, АА Чечулин - Труды учебных заведений связи, 2023 - cyberleninka.ru
В работе представлена параметризация вредоносных ботов с помощью метрик,
которые могут быть основой для построения моделей распознавания параметров …

Two-model active learning approach for inappropriate information classification in social networks

D Levshun, O Tushkanova, A Chechulin - International Journal of …, 2023 - Springer
The work process of specialists in protection from information consists of many time-
consuming tasks, including data collection, datasets formation, and data manual labelling. In …

[PDF][PDF] Reference architecture for social networks graph analysis tool

M Kolomeets, A Benachour, D El Baz… - Journal of Wireless …, 2019 - researchgate.net
When analyzing social networks, graph data structures are often used. Such graphs may
have a complex structure that makes their operational analysis difficult or even impossible …

Properties of Malicious Social Bots

MV Kolomeets, AA Chechulin - Proceedings of …, 2023 - journals.rcsi.science
The paper considers the ability to describe malicious bots using their characteristics, which
can be the basis for building models for recognising bot parameters and qualitatively …

Towards revealing parallel adversarial attack on politician socialnet of graph structure

Y Tian, J Liu, E Tong, W Niu, L Chang… - Security and …, 2021 - Wiley Online Library
Socialnet becomes an important component in real life, drawing a lot of study issues of
security and safety. Recently, for the features of graph structure in socialnet, adversarial …

Семантический анализ цифрового деструктивного контента по тематике «скулшутинг» в социальной сети «ВКонтакте»

УБ Гриненко - Психология и право, 2021 - psyjournals.ru
Аннотация С середины 1970-х годов общественность серьезно обеспокоена случаями
скулшутинга—вооруженного нападения учеников на учебные организации …

Technique for classifying the social network profiles according to the psychological scales based on machine learning methods

A Branitskiy, E Doynikova… - Journal of Physics …, 2021 - iopscience.iop.org
A technique for classifying the social network users and groups by psychological scales of
the Ammon's test has been developed. To analyze user profiles, we have used several types …

Experimental Evaluation: Can Humans Recognise Social Media Bots?

M Kolomeets, O Tushkanova, V Desnitsky… - Big Data and Cognitive …, 2024 - mdpi.com
This paper aims to test the hypothesis that the quality of social media bot detection systems
based on supervised machine learning may not be as accurate as researchers claim, given …