2022
DOI: 10.1155/2022/6356152
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks

Abstract: Social media websites are becoming more prevalent on the Internet. Sites, such as Twitter, Facebook, and Instagram, spend significantly more of their time on users online. People in social media share thoughts, views, and facts and create new acquaintances. Social media sites supply users with a great deal of useful information. This enormous quantity of social media information invites hackers to abuse data. These hackers establish fraudulent profiles for actual people and distribute useless material. The mat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 13 publications
0
7
0
2
Order By: Relevance
“…However, with the continuous development of website technology and operations, people have increasingly data requirements. To achieve more sophisticated operations to improve the quality of the website, the data acquisition method of the website also develops continuously with the progress of website technology and the deepening of people's demand for website data [10]. From the perspective of use and development, it is mainly divided into three categories: website log fles, web beacons (commonly known as dots), and JS page tags.…”
Section: Data Acquisition Methods In Data-driven Technologymentioning
confidence: 99%
“…However, with the continuous development of website technology and operations, people have increasingly data requirements. To achieve more sophisticated operations to improve the quality of the website, the data acquisition method of the website also develops continuously with the progress of website technology and the deepening of people's demand for website data [10]. From the perspective of use and development, it is mainly divided into three categories: website log fles, web beacons (commonly known as dots), and JS page tags.…”
Section: Data Acquisition Methods In Data-driven Technologymentioning
confidence: 99%
“…Em [Prabhu Kavin et al 2022], os autores propõem uma abordagem baseada na inteligência artificial para detecc ¸ão automática de perfis falsos (ou Spamers) no Twitter. Eles exploraram três algoritmos de classificac ¸ão diferentes: Support Vector Machine (SVM), Random Forest (RF) e Multilayer Perceptron (MLP).…”
Section: Trabalhos Relacionadosunclassified
“…In their research, Page et al 121 used nine web‐based features and six domain‐based features in their ML method for detecting phishing domains. Last few years, several works have been proposed using ML 122‐129 …”
Section: Ml‐based Solutions For Osn Platformmentioning
confidence: 99%
“…Siva Rama Krishna et al 171 used the KNN algorithm to identify cloned or fake accounts and compared the results with the naive Bayesian algorithm. In their paper, Prabhu Kavin et al 126 proposed an AI technique using a support vector machine and ANN algorithms to detect fake accounts and spam content in social media. Analyzing various characteristics, Sahoo and Gupta 172 discussed a chrome extension‐based framework for detecting fake accounts in the Twitter environment 173‐175 also used ML based approach to detect fake or clone accounts in social networks.…”
Section: Ml‐based Solutions For Osn Platformmentioning
confidence: 99%