{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:51:42Z","timestamp":1744217502475},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066042"},{"type":"electronic","value":"9783319066059"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06605-9_49","type":"book-chapter","created":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T01:56:51Z","timestamp":1399514211000},"page":"596-607","source":"Crossref","is-referenced-by-count":11,"title":["Automatic Fake Followers Detection in Chinese Micro-blogging System"],"prefix":"10.1007","author":[{"given":"Yi","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jianjun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Kejun","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Nan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC 2010 Conference Proceedings, pp. 1\u20139 (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: WWW 2010 Conference Proceedings, pp. 591\u2013600 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"49_CR3","unstructured":"Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: identifying misinformation in microblogs. In: EMNLP 2011 Conference Proceedings, pp. 1589\u20131599 (2011)"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: Can we trust what we rt? In: Proceedings of the First Workshop on Social Media Analytics, pp. 71\u201379 (2010)","DOI":"10.1145\/1964858.1964869"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: CCS 2010 Conference Proceedings, pp. 27\u201337 (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"49_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M. McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol.\u00a06906, pp. 175\u2013186. Springer, Heidelberg (2011)"},{"key":"49_CR7","unstructured":"Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: Detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security, NDSS (2013)"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: IMC 2010 Conference Proceedings, pp. 35\u201347 (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Egele, M., Kruegel, C., Vigna, G.: Poultry markets: On the underground economy of twitter followers. In: WOSN 2012 Conference Proceedings, pp. 1\u20136 (2012)","DOI":"10.1145\/2342549.2342551"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: WWW 2012 Conference Proceedings, pp. 61\u201370 (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: IMC 2011 Conference Proceedings, pp. 243\u2013258 (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW 2012 Conference Proceedings, pp. 71\u201380 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"49_CR13","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol.\u00a06 (2010)"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: SIGIR 2010 Conference Proceedings, pp. 435\u2013442 (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Li, H., Yang, Q.: Discovering spammers in social networks. In: AAAI 2012 Conference Proceedings, pp. 171\u2013177 (2012)","DOI":"10.1609\/aaai.v26i1.8116"},{"key":"49_CR16","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","volume":"10","author":"M. Cha","year":"2010","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: The million follower fallacy. ICWSM\u00a010, 10\u201317 (2010)","journal-title":"ICWSM"},{"key":"49_CR17","unstructured":"Rosen-Zvi, M., Griffiths, T., Steyvers, M., Smyth, P.: The author-topic model for authors and documents. In: UAI 2004 Conference Proceedings, pp. 487\u2013494 (2004)"},{"key":"49_CR18","unstructured":"Chang, J., Gerrish, S., Wang, C., Boyd-graber, J.L., Blei, D.M.: Reading tea leaves: How humans interpret topic models. In: Advances in Neural Information Processing Systems, pp. 288\u2013296 (2009)"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Kwak, H., Chun, H., Moon, S.: Fragile online relationship: a first look at unfollow dynamics in twitter. In: CHI 2011 Conference Proceedings, pp. 1091\u20131100 (2011)","DOI":"10.1145\/1978942.1979104"},{"key":"49_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C.C. Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: Libsvm: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST)\u00a02, 1\u201327 (2011)","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"49_CR21","unstructured":"Quinlan, J.R.: Bagging, boosting, and c4. 5. In: AAAI\/IAAI, vol.\u00a01, pp. 725\u2013730 (1996)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06605-9_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T23:15:52Z","timestamp":1689203752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06605-9_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066042","9783319066059"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06605-9_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}