{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:50:17Z","timestamp":1743742217302,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031280344"},{"type":"electronic","value":"9783031280351"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28035-1_22","type":"book-chapter","created":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T08:04:19Z","timestamp":1678349059000},"page":"312-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["How Many Features Do We Need to\u00a0Identify Bots on\u00a0Twitter?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6673-7086","authenticated-orcid":false,"given":"Fatima","family":"Tabassum","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0003-6682","authenticated-orcid":false,"given":"Sameera","family":"Mubarak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2843-5738","authenticated-orcid":false,"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3243-5768","authenticated-orcid":false,"given":"Jia Tina","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"1","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00327-4","volume":"7","author":"R-C Chen","year":"2020","unstructured":"Chen, R.-C., Dewi, C., Huang, S.-W., Caraka, R.E.: Selecting critical features for data classification based on machine learning methods. J. Big Data 7(1), 1\u201326 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00327-4","journal-title":"J. Big Data"},{"key":"22_CR3","unstructured":"Christoph, M.: Interpretable Machine Learning. A Guide for Making Black Box Models Explainable, Creative Commons Attribution, 2 edn (2022). https:\/\/christophm.github.io\/interpretable-ml-book\/"},{"issue":"10","key":"22_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: A decade of social bot detection. Commun. ACM 63(10), 72\u201383 (2020)","journal-title":"Commun. ACM"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56\u201371 (2015)","journal-title":"Decis. Support Syst."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, WWW 2017 Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313184","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on twitter. ACM Trans. Web (TWEB) 13, 1\u201327 (2019)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: a system to evaluate social bots (2016)","DOI":"10.1145\/2872518.2889302"},{"issue":"1","key":"22_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s10100-020-00721-6","volume":"29","author":"A Engin","year":"2021","unstructured":"Engin, A.: The cognitive ability and working memory framework: interpreting cognitive reflection test results in the domain of the cognitive experiential theory. CEJOR 29(1), 227\u2013245 (2021)","journal-title":"CEJOR"},{"key":"22_CR10","unstructured":"Feng, S., et al.: Twibot-22: towards graph-based twitter bot detection. arXiv preprint arXiv:2206.04564 (2022)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Li, J., Luo, M.: Twibot-20: a comprehensive twitter bot detection benchmark. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management (2021)","DOI":"10.1145\/3459637.3482019"},{"key":"22_CR12","first-page":"1","volume":"20","author":"A Fisher","year":"2019","unstructured":"Fisher, A., Rudin, C., Dominici, F.: All models are wrong, but many are useful: learning a variable\u2019s importance by studying an entire class of prediction models simultaneously. J. Mach. Learn. Res. 20, 1\u201381 (2019)","journal-title":"J. Mach. Learn. Res."},{"key":"22_CR13","unstructured":"Fisher, M., Cox, J.W., Hermann, P.: Pizzagate: from rumor, to hashtag, to gunfire in D.C. (2016). https:\/\/www.washingtonpost.com\/local\/pizzagate-from-rumor-to-hashtag-to-gunfire-in-dc\/2016\/12\/06\/4c7def50-bbd4-11e6-94ac-3d324840106c_story.html"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Gilani, Z., Farahbakhsh, R., Tyson, G., Wang, L., Crowcroft, J.: Of bots and humans (on twitter). In: ASONAM 2017: Advances in Social Networks Analysis and Mining 2017, pp. 349\u2013354. Association for Computing Machinery (2017)","DOI":"10.1145\/3110025.3110090"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Gilani, Z., Kochmar, E., Crowcroft, J.: Classification of twitter accounts into automated agents and human users. In: Diesner, J., Ferrari, E., Xu, G. (eds.) Advances in Social Networks Analysis and Mining 2017, pp. 489\u2013496. Association for Computing Machinery (2017)","DOI":"10.1145\/3110025.3110091"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Gr\u00f6mping, U.: Variable importance assessment in regression: linear regression versus random forest. Am. Stat. 308\u2013319 (2009)","DOI":"10.1198\/tast.2009.08199"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Lee, K., Eoff, B., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 5, no. 1, pp. 185\u2013192 (2021)","DOI":"10.1609\/icwsm.v5i1.14106"},{"key":"22_CR18","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., Tesconi, M.: Rtbust: exploiting temporal patterns for botnet detection on twitter. In: Proceedings of the 10th ACM Conference on Web Science, pp. 183\u2013192 (2019)","DOI":"10.1145\/3292522.3326015"},{"key":"22_CR20","unstructured":"Parr, T., Wilson, J.D., Hamrick, J.: Nonparametric feature impact and importance. arXiv preprint arXiv:2006.04750 1 (2020)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Rey, D., Neuh\u00e4user, M.: Wilcoxon-Signed-Rank Test, pp. 1658\u20131659 (2011)","DOI":"10.1007\/978-3-642-04898-2_616"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should i trust you?\u201d explaining the predictions of any classifier. In: KDD 2016: The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144. ACM, New York (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"22_CR23","unstructured":"Samuels, E., Kelly, M.: How false hope spread about hydroxychloroquine to treat COVID-19 - and the consequences that followed (2020). https:\/\/www.washingtonpost.com\/politics\/2020\/04\/13\/how-false-hope-spread-about-hydroxychloroquine-its-consequences\/"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Shao, C., Ciampaglia, G.L., Flammini, A., Menczer, F.: Hoaxy: a platform for tracking online misinformation. In: WWW 2016: 25th International World Wide Web Conference, pp. 745\u2013750. International Conference Companion on World Wide Web (2016)","DOI":"10.1145\/2872518.2890098"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2105-8-25","volume":"8","author":"C Strobl","year":"2007","unstructured":"Strobl, C., Boulesteix, A.L., Zeileis, A., Hothorn, T.: Bias in random forest variable importance measures: illustrations, sources and a solution. BMC Bioinform. 8, 1\u201321 (2007)","journal-title":"BMC Bioinform."},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/11573548_58","volume-title":"Affective Computing and Intelligent Interaction","author":"J Tao","year":"2005","unstructured":"Tao, J., Kang, Y.: Features importance analysis for emotional speech classification. In: Tao, J., Tan, T., Picard, R.W. (eds.) ACII 2005. LNCS, vol. 3784, pp. 449\u2013457. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11573548_58"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 11. AAAI (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Wetschoreck, F., Krabel, T., Krishnamurthy, S.: 8080labs\/ppscore: zenodo release (2020). https:\/\/doi.org\/10.5281\/zenodo.4091345","DOI":"10.5281\/zenodo.4091345"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Wu, Y., Ngai, E.W., Wu, P., Wu, C.: Fake online reviews: literature review, synthesis, and directions for future research. Decis. Support Syst. 132 (2020)","DOI":"10.1016\/j.dss.2020.113280"},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1002\/hbe2.115","volume":"1","author":"KC Yang","year":"2019","unstructured":"Yang, K.C., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1, 48\u201361 (2019)","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Yang, K.C., Varol, O., Hui, P.M., Menczer, F.: Scalable and generalizable social bot detection through data selection. In: Conference on Artificial Intelligence, vol. 34, pp. 1096\u20131103. AAAI (2020)","DOI":"10.1609\/aaai.v34i01.5460"},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Zafarani, R.: A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput. Surv. (CSUR) 53, 1\u201340 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Zhu, F., Jiang, M., Qiu, Y., Sun, C., Wang, M.: RSLIME: an efficient feature importance analysis approach for industrial recommendation systems. In: International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/IJCNN.2019.8852034"}],"container-title":["Lecture Notes in Computer Science","Information for a Better World: Normality, Virtuality, Physicality, Inclusivity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28035-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T13:31:17Z","timestamp":1709645477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28035-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031280344","9783031280351"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28035-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}