Sentiment Analysis in Social Networks 2017
DOI: 10.1016/b978-0-12-804412-4.00009-7
|View full text |Cite
|
Sign up to set email alerts
|

Opinion Spam Detection in Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The clever user intentionally enters a large number of URLs in their tweets to trap the legitimate users as their soft target. The URL ratio can be calculated using equation (2). =…”
Section: Mention Ratio / Url As Content-based Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The clever user intentionally enters a large number of URLs in their tweets to trap the legitimate users as their soft target. The URL ratio can be calculated using equation (2). =…”
Section: Mention Ratio / Url As Content-based Featuresmentioning
confidence: 99%
“…The social media communities are more liberal on their community standards and generally groups are formed between those users, who are more active and share information frequently compared to less active users. The unsolicited users enter to this chain of active users to execute their malicious activities [2]. Hackers possess as original users can have easy access to the important personal information such as bank account or passwords, available in social media account or those available in computing device (computer or mobile phone) [3].…”
Section: Introductionmentioning
confidence: 99%
“…Supervised learning techniques that have been used for spam review detection so far are; Rule based classification [5,10], Unified model [2], Logistic Regression [4,11,12], Knearest neighbor (KNN) [4], Random Forest [4,[13][14][15], Decision Trees [16,17], Gradient Decent [4,10], Genetic Algorithm [18], Conceptual Model [19], Time Series [20], Neural Network [21], Deep Neural Network [22], Multinomial Naïve Bayes [9,11,13], N-Gram [13], Hybrid Learning Approach (Active and supervised learning) [23], RNN, CNN [24], and Multilayer Perceptron Model (MLP) [4,24], Unsupervised learning is a category of machine learning that work on the unlabeled datasets. Many unsupervised learning techniques have been used in spam detection which are: Natural Language Processing [6,9][58] Markov Network [25], Neural Auto-encoder Decision Forest [16]¸ and PU Learning [26]. Other than these supervised and unsupervised learning techniques, there are many other techniques that have been used for spam detection such as Fuzzy Logic [27], Heterogeneous Information Network [28], Hadoop [29], Text Mining [30], Sentiment Analysis [31][32][33][34]<...>…”
Section: Figure 1 Types Of Spammentioning
confidence: 99%
“…Spam traffic specifications vary from authorized traffic authorization specifications. Authorized letters are usually issued throughout the day, while spamming is uniform throughout the day [2]. Spammers keep their identities secret when they send spam, but their identities are detectable when hunting mail addresses from websites, and this is one way of identifying spammers on the Internet.…”
Section: Literature Reviewmentioning
confidence: 99%