{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:21:05Z","timestamp":1764937265274,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030712136"},{"type":"electronic","value":"9783030712143"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71214-3_2","type":"book-chapter","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T11:04:17Z","timestamp":1616583857000},"page":"11-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Automatically Managed Accounts in Online Social Networks: Graph Embeddings Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8106-9426","authenticated-orcid":false,"given":"Ilia","family":"Karpov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5435-4064","authenticated-orcid":false,"given":"Ekaterina","family":"Glazkova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-78256-0_1","volume-title":"Social Networks and Surveillance for Society","author":"M Apte","year":"2019","unstructured":"Apte, M., Palshikar, G.K., Baskaran, S.: Frauds in online social networks: a review. In: \u00d6zyer, T., Bakshi, S., Alhajj, R. (eds.) Social Networks and Surveillance for Society. LNSN, pp. 1\u201318. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-78256-0_1"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10588-018-09290-1","volume":"25","author":"DM Beskow","year":"2018","unstructured":"Beskow, D.M., Carley, K.M.: Its all in a name: detecting and labeling bots by their name. Comput. Math. Organ. Theory 25(1), 24\u201335 (2018). https:\/\/doi.org\/10.1007\/s10588-018-09290-1","journal-title":"Comput. Math. Organ. Theory"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Cai, C., Li, L., Zeng, D.: Detecting social bots by jointly modeling deep behavior and content information. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1995-1998. ACM (2017)","DOI":"10.1145\/3132847.3133050"},{"key":"2_CR4","unstructured":"Danezis, G., Mittal, P.: Sybilinfer: detecting Sybil nodes using social networks. In: 16th Network and Distributed System Security Symposium (NDSS), pp. 1\u201315 (2009)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"David, I., Siordia, O.S., Moctezuma, D.: Features combination for the detection of malicious twitter accounts. In: 2016 IEEE International Autumn Meeting on Power, pp. IEEE1-6 (2016)","DOI":"10.1109\/ROPEC.2016.7830626"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Gaurav, M., Srivastava, A., Kumar, A., Miller, S.: Leveraging candidate popularity on twitter to predict election outcome. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis. SNAKDD 2013. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2501025.2501038","DOI":"10.1145\/2501025.2501038"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, pp. 855\u2013864. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2939672.2939754","DOI":"10.1145\/2939672.2939754"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Khaled, S., El-Tazi, N., Mokhtar, H.M.: Detecting fake accounts on social media. In: IEEE International Conference on Big Data, pp. 3672-3681. IEEE (2018)","DOI":"10.1109\/BigData.2018.8621913"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on Twitter. In: Fifth International AAAI Conference on Weblogs and Social Media, pp. 185\u2013192 (2011)","DOI":"10.1609\/icwsm.v5i1.14106"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2898361","volume":"8","author":"J Leskovec","year":"2016","unstructured":"Leskovec, J., Sosi\u010d, R.: SNAP: a general-purpose network analysis and graph-mining library. ACM Trans. Intell. Syst. Technol. (TIST) 8(1), 1 (2016)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Loyola-Gonz\u00e1lez, O., Monroy, R., Rodr\u00edguez, J., L\u00f3pez-Cuevas, A., Mata-S\u00e1nchez, J.I.: Contrast pattern-based classification for bot detection on Twitter. IEEE Access 7, 45800\u201345817 (2019)","DOI":"10.1109\/ACCESS.2019.2904220"},{"key":"2_CR12","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Wu, L., Nazer, T.H., Carley, K.M., Liu, H.: A new approach to bot detection: striking the balance between precision and recall. In: Proceedings of the 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, pp. 533\u2013540. IEEE Press (2016)","DOI":"10.1109\/ASONAM.2016.7752287"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Pan, J. and Liu, Y., Liu, X., Hu, H.: Discriminating bot accounts based solely on temporal features of microblog behavior. Physica A 450, 193\u2013204 (2016)","DOI":"10.1016\/j.physa.2015.12.148"},{"key":"2_CR15","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Ratkiewicz, J., et al.: Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th International Conference Companion on World Wide Web, WWW 2011, pp. 249\u2013252. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/1963192.1963301","DOI":"10.1145\/1963192.1963301"},{"key":"2_CR17","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots, 96, 104. arXiv preprint arXiv:1707.07592 (2017)"},{"key":"2_CR18","unstructured":"Skorniakov, K., Turdakov, D., Zhabotinsky, A.: Make social networks clean again: graph embedding and stacking classifiers for bot detection. In: 2nd International Workshop on Rumours and Deception in Social Media (RDSM) (2018)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a nearoptimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy (SP 2008), pp. 3\u201317 (2008)","DOI":"10.1109\/SP.2008.13"},{"key":"2_CR20","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D.: Sybilguard: defending against sybil attacks via social networks. IEEE\/ACM Trans. Netw. 16, 576\u2013589 (2008)"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Zegzhda, P.D., Malyshev, E.V., Pavlenko, E.Y.: The use of an artificial neural network to detect automatically managed accounts in social networks. Autom. Control Comput. Sci. 51(8), 874\u2013880 (2017). https:\/\/doi.org\/10.3103\/S0146411617080296","DOI":"10.3103\/S0146411617080296"},{"key":"2_CR22","unstructured":"Zhang, D., Yin, J., Zhu, X., Zhang, C.: Attributed network embedding via subspace discovery. CoRR abs\/1901.04095 (2019). http:\/\/arxiv.org\/abs\/1901.04095"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"\u017dnidar\u0161i\u010d, A., Doreian, P., Ferligoj, A.: Treating missing network data before partitioning. In: Advances in Network Clustering and Blockmodeling, pp. 189\u2013224 (2019)","DOI":"10.1002\/9781119483298.ch7"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Analysis of Images, Social Networks and Texts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71214-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T09:03:44Z","timestamp":1671699824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-71214-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030712136","9783030712143"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71214-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Analysis of Images, Social Networks and Texts","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Moscow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aist2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aistconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"108","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.33","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}