2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2018
DOI: 10.1109/asonam.2018.8508654
|View full text |Cite
|
Sign up to set email alerts
|

CADET: A Multi-View Learning Framework for Compromised Account Detection on Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Karimi et al (2018) utilizes LSTM networks to capture temporal dependencies to detect compromised accounts. VanDam et al (2018) uses an unsupervised learning framework, where multiple views on a user profile (i.e., term, source, time and place) are encoded separately and then mapped into a joint space. This joint representation is then used to retrieve a ranking of compromised accounts.…”
Section: Related Workmentioning
confidence: 99%
“…Karimi et al (2018) utilizes LSTM networks to capture temporal dependencies to detect compromised accounts. VanDam et al (2018) uses an unsupervised learning framework, where multiple views on a user profile (i.e., term, source, time and place) are encoded separately and then mapped into a joint space. This joint representation is then used to retrieve a ranking of compromised accounts.…”
Section: Related Workmentioning
confidence: 99%
“…The commonly used features include raw features, such as word vector, word embedding, hashtags, links and URLs [119]. Advanced features include deep content features, statistics, LIWC and other metadata, such as location, source, or time [193]. Most ML-based models use supervised learning.…”
Section: Pros and Consmentioning
confidence: 99%
“…• Precision [10,17,21,28,40,50,61,78,82,88,89,91,102,107,113,115,135,162,166,175,186,193,217,219,224]: This metric simply estimates the true positives over positives detected including true positives and false positives by:…”
Section: B Metricsmentioning
confidence: 99%
“…It addressed the sparsity problem by defining and employing a user context representation. The study of Vandam et al [27] combined multiple modalities of the data at the user level to detect compromised accounts. They considered this method by four modalities: source, timing, location, and textual content.…”
Section: Related Workmentioning
confidence: 99%