2020
DOI: 10.1088/1742-6596/1447/1/012044
|View full text |Cite
|
Sign up to set email alerts
|

Detecting spam campaign in twitter with semantic similarity

Abstract: Twitter is a widespread supply for real-time news distribution between individuals. Furthermore, spammers could post any kinds of spam content to users, and a variant of incidents are committed on Twitter against users. These threats aren’t restricted to the social media platforms however they threaten the safety of Twitter users. Most of the researches use deep learning techniques to detect Twitter spammer activities. The traditional solutions check the behavior of each account or campaign of similar purpose … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Thus, some studies [15] depend on a social graph to tackle the problem of fabrication by calculating distance and connectivity of each tweet between sender and receiver to examine whether it is spam. Yang et al [16] built a more robust feature using a bidirectional link ratio between centrality and local cluster coefficient with performance 99% true positive, while [17] provides a new solution that can detect most campaigns and classify each of them into spam or not spam using deep learning techniques and semantic similarity methods.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thus, some studies [15] depend on a social graph to tackle the problem of fabrication by calculating distance and connectivity of each tweet between sender and receiver to examine whether it is spam. Yang et al [16] built a more robust feature using a bidirectional link ratio between centrality and local cluster coefficient with performance 99% true positive, while [17] provides a new solution that can detect most campaigns and classify each of them into spam or not spam using deep learning techniques and semantic similarity methods.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They didn't carry out any strategy on the clarified module; they just recommended how to distinguish spam information. [33] Present another setting up camp identification model that relies upon vector-based characteristics for sentence introducing. The entire exploration relies upon 3 essential advances: Firstly, to examine the similitude of Twitter accounts in which posts or tweets are on a similar point.…”
Section: VImentioning
confidence: 99%
“…To sum up, spam is a real issue that affects the user experience in social media and there are multiple research papers [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] aimed to fight the existence of spam. Many of them focus on social media as a broad category and since Twitter is considered a microblogging service with different user requirements, this broad category of research does not always fit to Twitter.…”
Section: Related Workmentioning
confidence: 99%
“…This indicates that there is a problem with the currently used spam detection framework. Hence, many researchers are concerned with investigating and solving the problem of detecting/preventing spam and phishing on Twitter platform [16,24,[29][30][31][32][33][34][35][36][37][38][39][40]. This paper introduces a new approach for detecting spam on microblogging services using domain popularity and Machine Learning (ML) algorithms.…”
Section: Introductionmentioning
confidence: 99%