2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2020
DOI: 10.1109/asonam49781.2020.9381432
|View full text |Cite
|
Sign up to set email alerts
|

Semantic Text Analysis for Detection of Compromised Accounts on Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…VanDam, Tang, and Tan (2017) performs a measurement study and derives content-based features. Seyler, Li, and Zhai (2020) proposes a method that divides the tweet space randomly into compromised/benign tweets and uses the difference in language distributions as features. Karimi et al (2018) utilizes LSTM networks to capture temporal dependencies to detect compromised accounts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…VanDam, Tang, and Tan (2017) performs a measurement study and derives content-based features. Seyler, Li, and Zhai (2020) proposes a method that divides the tweet space randomly into compromised/benign tweets and uses the difference in language distributions as features. Karimi et al (2018) utilizes LSTM networks to capture temporal dependencies to detect compromised accounts.…”
Section: Related Workmentioning
confidence: 99%
“…To counteract this, it is common in supervised learning frameworks to balance datasets to learn a better discriminative function. Balanced datasets were previously used for deleted and suspended account detection (Volkova and Bell 2017), compromised account detection (Karimi et al 2018;VanDam et al 2019;Seyler, Li, and Zhai 2020) and spam detection (Benevenuto et al 2010;Lee, Caverlee, and Webb 2010;Nilizadeh et al 2017;Adewole et al 2019). To create a balanced dataset (i.e.…”
Section: Datasetmentioning
confidence: 99%
“…Existing efforts have the following three limitations. First, they mainly follow the classic big data processing pipeline [32,32,67,85,87]: all social media streams are first collected by distributed log collection systems, transporting massive quantities of users' microblog stream data from geographically distributed web servers to a centralized storage tier. Only after all stream data has arrived do the data processing engines (e.g., Spark Streaming with MLlib [11]) start processing these data.…”
Section: Introductionmentioning
confidence: 99%