{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:26:58Z","timestamp":1743024418904,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030336066"},{"type":"electronic","value":"9783030336073"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-33607-3_44","type":"book-chapter","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:05:28Z","timestamp":1573085128000},"page":"402-410","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Do You Really Follow Them? Automatic Detection of Credulous Twitter Users"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Balestrucci","sequence":"first","affiliation":[]},{"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]},{"given":"Catia","family":"Trubiani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"key":"44_CR1","first-page":"37","volume":"6","author":"D Aha","year":"1991","unstructured":"Aha, D., Kibler, D.: Instance-based learning algorithms. Mach. Learn. 6, 37\u201366 (1991)","journal-title":"Mach. Learn."},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.cose.2017.06.002","volume":"74","author":"F Amato","year":"2018","unstructured":"Amato, F., et al.: Recognizing human behaviours in online social networks. Comput. Secur. 74, 355\u2013370 (2018)","journal-title":"Comput. Secur."},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Balestrucci, A., et al.: Identification of credulous users on Twitter. In: ACM Symposium of Applied Computing (2019)","DOI":"10.1145\/3297280.3297486"},{"issue":"1","key":"44_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1177\/0894439317734157","volume":"37","author":"MT Bastos","year":"2019","unstructured":"Bastos, M.T., Mercea, D.: The Brexit botnet and user-generated hyperpartisan news. Soc. Sci. Comput. Rev. 37(1), 38\u201354 (2019)","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"1","key":"44_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1038\/s41467-018-07761-2","volume":"10","author":"A Bovet","year":"2019","unstructured":"Bovet, A., Makse, H.A.: Influence of fake news in Twitter during the 2016 US presidential election. Nat. Commun. 10(1), 7 (2019)","journal-title":"Nat. Commun."},{"issue":"1","key":"44_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Chatzakou, D., et al.: Mean birds: detecting aggression and bullying on Twitter. In: ACM Web Science Conference, pp. 13\u201322 (2017)","DOI":"10.1145\/3091478.3091487"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Chavoshi, N., et al.: DeBot: Twitter bot detection via warped correlation. In: Data Mining, pp. 817\u2013822 (2016)","DOI":"10.1109\/ICDM.2016.0096"},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/B978-1-55860-377-6.50023-2","volume-title":"Machine Learning Proceedings 1995","author":"William W. Cohen","year":"1995","unstructured":"Cohen, W.: Fast effective rule induction. In: Machine Learning, pp. 115\u2013123 (1995)"},{"key":"44_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., et al.: Fame for sale: efficient detection of fake Twitter followers. Decis. Support Syst. 80, 56\u201371 (2015)","journal-title":"Decis. Support Syst."},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Cresci, S., et al.: Exploiting digital DNA for the analysis of similarities in Twitter behaviours. In: IEEE Data Science and Advanced Analytics, pp. 686\u2013695 (2017)","DOI":"10.1109\/DSAA.2017.57"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Cresci, S., et al.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: 26th World Wide Web, Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"issue":"7","key":"44_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., et al.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"issue":"1","key":"44_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/3298789","volume":"13","author":"Z Gilani","year":"2019","unstructured":"Gilani, Z., et al.: A large-scale behavioural analysis of bots and humans on Twitter. ACM Trans. Web 13(1), 7 (2019)","journal-title":"ACM Trans. Web"},{"key":"44_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"R Holte","year":"1993","unstructured":"Holte, R.: Very simple classification rules perform well on most commonly used datasets. Mach. Learn. 11, 63\u201391 (1993)","journal-title":"Mach. Learn."},{"issue":"9","key":"44_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin, L., et al.: Understanding user behavior in online social networks: a survey. IEEE Commun. Mag. 51(9), 144\u2013150 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"44_CR17","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: 11th Uncertainty in Artificial Intelligence, pp. 338\u2013345 (1995)"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Lee, J., et al.: An iterative undersampling of extremely imbalanced data using CSVM. In: Machine Vision, vol. 9445 (2014)","DOI":"10.1117\/12.2181517"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Minnich, A., et al.: BotWalk: efficient adaptive exploration of Twitter bot networks. In: ASONAM, pp. 467\u2013474 (2017)","DOI":"10.1145\/3110025.3110163"},{"issue":"9","key":"44_CR20","doi-asserted-by":"publisher","first-page":"e0184148","DOI":"10.1371\/journal.pone.0184148","volume":"12","author":"B M\u00f8nsted","year":"2017","unstructured":"M\u00f8nsted, B., et al.: Evidence of complex contagion of information in socialmedia: an experiment using Twitter bots. PLoS ONE 12(9), e0184148 (2017)","journal-title":"PLoS ONE"},{"issue":"5","key":"44_CR21","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"SK Pal","year":"1992","unstructured":"Pal, S.K., Mitra, S.: Multilayer perceptron, fuzzy sets, and classification. IEEE Trans. Neural Networks 3(5), 683\u2013697 (1992)","journal-title":"IEEE Trans. Neural Networks"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Platt, J.: Fast training of support vector machines using sequential minimal optimization. In: Advances in Kernel Methods - Support Vector Learning (1998)","DOI":"10.7551\/mitpress\/1130.003.0016"},{"issue":"3","key":"44_CR23","first-page":"221","volume":"27","author":"JR Quinlan","year":"1987","unstructured":"Quinlan, J.R.: Simplifying decision trees. Int. J. Human Comput. Stud. 27(3), 221\u2013234 (1987)","journal-title":"Int. J. Human Comput. Stud."},{"issue":"1","key":"44_CR24","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao, C., et al.: The spread of low-credibility content by social bots. Nature Commun. 9(1), 4787 (2018)","journal-title":"Nature Commun."},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Shen, T.J., et al.: How gullible are you? Predicting susceptibility to fake news. In: Web Science, pp. 287\u2013288 (2019)","DOI":"10.1145\/3292522.3326055"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Varol, O., et al.: Online human-bot interactions: detection, estimation, and characterization. In: 11th Web and Social Media, pp. 280\u2013289 (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"44_CR27","unstructured":"Wagner, C., et al.: When social bots attack: modeling susceptibility of users in online social networks. In: Making Sense of Microposts, pp. 41\u201348 (2012)"},{"key":"44_CR28","unstructured":"Witten, I.H., et al.: Data Mining: Practical Machine Learning Tools and Techniques (2016)"},{"issue":"1","key":"44_CR29","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1002\/hbe2.115","volume":"1","author":"KC Yang","year":"2019","unstructured":"Yang, K.C., et al.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48\u201361 (2019)","journal-title":"Hum. Behav. Emerg. Technol."}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33607-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:58:35Z","timestamp":1710251915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-33607-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030336066","9783030336073"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33607-3_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Manchester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.confercare.manchester.ac.uk\/events\/ideal2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}