{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:18:20Z","timestamp":1743059900609,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319429953"},{"type":"electronic","value":"9783319429960"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42996-0_18","type":"book-chapter","created":{"date-parts":[[2016,7,14]],"date-time":"2016-07-14T10:23:26Z","timestamp":1468491806000},"page":"214-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Social Spam Detection Framework via Semi-supervised Learning"],"prefix":"10.1007","author":[{"given":"Xianchao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haijun","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Wenxin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,15]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Amleshwaram, A.A., Reddy, N., Yadav, S., Gu, G., Yang, C.: Cats: characterizing automation of Twitter spammers. In: 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/COMSNETS.2013.6465541"},{"key":"18_CR2","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS) (2010)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Gon\u00e7alves, M.: Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 620\u2013627. ACM (2009)","DOI":"10.1145\/1571941.1572047"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: Proceedings of the Eleventh Annual Conference on Computational Learning Theory, pp. 92\u2013100. ACM (1998)","DOI":"10.1145\/279943.279962"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Chen, F., Tan, P., Jain, A.: A co-classification framework for detecting web spam and spammers in social media web sites. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pp. 1807\u20131810. ACM (2009)","DOI":"10.1145\/1645953.1646235"},{"issue":"5","key":"18_CR6","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TKDE.2010.158","volume":"23","author":"J Du","year":"2011","unstructured":"Du, J., Ling, C.X., Zhou, Z.H.: When does cotraining work in real data? IEEE Trans. Knowl. Data Eng. 23(5), 788\u2013799 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Fu, H., Xie, X., Rui, Y.: Leveraging careful microblog users for spammer detection. In: Proceedings of the 24th International Conference on World Wide Web Companion, pp. 419\u2013429. International World Wide Web Conferences Steering Committee (2015)","DOI":"10.1145\/2740908.2745400"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th Annual Conference on Internet Measurement (IMC), pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"18_CR9","unstructured":"Goldman, S., Zhou, Y.: Enhancing supervised learning with unlabeled data. In: ICML, pp. 327\u2013334. Citeseer (2000)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), pp. 27\u201337. ACM (2010)","DOI":"10.1145\/1866307.1866311"},{"issue":"6","key":"18_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"18_CR12","unstructured":"Kiritchenko, S., Matwin, S.: Email classification with co-training. In: Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, pp. 301\u2013312. IBM Corp. (2011)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Cheng, Z., Sui, D.: Content-driven detection of campaigns in social media. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), pp. 551\u2013556. ACM (2011)","DOI":"10.1145\/2063576.2063658"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+machine learning. In: Proceeding of the 33rd International ACM (SIGIR) Conference on Research and Development in Information Retrieval, pp. 435\u2013442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, S., Deng, H., Wang, R., Chang, K.C.C.: Towards social user profiling: unified and discriminative influence model for inferring home locations. In: KDD, pp. 1023\u20131031 (2012)","DOI":"10.1145\/2339530.2339692"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-18032-8_14","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z Li","year":"2015","unstructured":"Li, Z., Zhang, X., Shen, H., Liang, W., He, Z.: A semi-supervised framework for social spammer detection. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS, vol. 9078, pp. 177\u2013188. Springer, Heidelberg (2015)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Lin, C., He, J., Zhou, Y., Yang, X., Chen, K., Song, L.: Analysis and identification of spamming behaviors in sina weibo microblog. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis, p. 5. ACM (2013)","DOI":"10.1145\/2501025.2501035"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"18_CR19","unstructured":"Wang, A.: Don\u2019t follow me: spam detection in Twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310. IEEE (2010)"},{"key":"18_CR20","unstructured":"Wang, B., Zubiaga, A., Liakata, M., Procter, R.: Making the most of tweet-inherent features for social spam detection on Twitter. arXiv preprint \n                      arXiv:1503.07405\n                      \n                     (2015)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), pp. 46\u201354. ACM (2011)","DOI":"10.1145\/2030376.2030382"},{"issue":"8","key":"18_CR22","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-19548-3_24","volume-title":"Databases Theory and Applications","author":"Q Zhang","year":"2015","unstructured":"Zhang, Q., Zhang, C., Cai, P., Qian, W., Zhou, A.: Detecting spamming groups in social media based on latent graph. In: Sharaf, M.A., Cheema, M.A., Qi, J. (eds.) ADC 2015. LNCS, vol. 9093, pp. 294\u2013305. Springer, Heidelberg (2015)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhu, S., Liang, W.: Detecting spam and promoting campaigns in the Twitter social network. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining, pp. 1194\u20131199. IEEE Computer Society (2012)","DOI":"10.1109\/ICDM.2012.28"},{"issue":"11","key":"18_CR25","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/TKDE.2005.186","volume":"17","author":"ZH Zhou","year":"2005","unstructured":"Zhou, Z.H., Li, M.: Tri-training: exploiting unlabeled data using three classifiers. IEEE Trans. Knowl. Data Eng. 17(11), 1529\u20131541 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"18_CR26","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s10115-009-0209-z","volume":"24","author":"ZH Zhou","year":"2010","unstructured":"Zhou, Z.H., Li, M.: Semi-supervised learning by disagreement. Knowl. Inf. Syst. 24(3), 415\u2013439 (2010)","journal-title":"Knowl. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Trends and Applications in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42996-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:05:15Z","timestamp":1558314315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42996-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319429953","9783319429960"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42996-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}