{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:17:07Z","timestamp":1742984227467,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811685309"},{"type":"electronic","value":"9789811685316"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8531-6_4","type":"book-chapter","created":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T06:04:38Z","timestamp":1638943478000},"page":"47-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Drift Aware Hierarchical Test Based Approach for Combating Social Spammers in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Darshika","family":"Koggalahewa","sequence":"first","affiliation":[]},{"given":"Yue","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,9]]},"reference":[{"key":"4_CR1","first-page":"69","volume":"23","author":"G Widmer","year":"1996","unstructured":"Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn. 23, 69\u2013101 (1996)","journal-title":"Mach. Learn."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.inffus.2017.02.004","volume":"37","author":"B Krawczyk","year":"2017","unstructured":"Krawczyk, B., Minku, L., Gama, J., Stefanowski, J., Wo\u017aniak, M.: Ensemble learning for data stream analysis: a survey. Inf. Fusion. 37, 132\u2013156 (2017)","journal-title":"Inf. Fusion."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G Huang","year":"2006","unstructured":"Huang, G., Zhu, Q., Siew, C.: Extreme learning machine: theory and applications. Neurocomputing 70, 489\u2013501 (2006)","journal-title":"Neurocomputing"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, X., C. Pr\u00edncipe, J.: Request-and-reverify: hierarchical hypothesis testing for concept drift detection with expensive labels. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (2018)","DOI":"10.24963\/ijcai.2018\/421"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Lu, J., Liu, A., Dong, F., Gu, F., Gama, J., Zhang, G.: Learning under concept drift: a review. IEEE Trans. Knowl. Data Eng. 31(12), 1\u20131 (2019). https:\/\/doi.org\/10.1109\/TKDE.2018.2876857","DOI":"10.1109\/TKDE.2018.2876857"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cose.2017.11.013","volume":"76","author":"T Wu","year":"2018","unstructured":"Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: survey of new approaches and comparative study. Comput. Secur. 76, 265\u2013284 (2018)","journal-title":"Comput. Secur."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"115742","DOI":"10.1016\/j.eswa.2021.115742","volume":"186","author":"S Rao","year":"2021","unstructured":"Rao, S., Verma, A., Bhatia, T.: A review on social spam detection: Challenges, open issues, and future directions. Expert Syst. Appl. 186, 115742 (2021)","journal-title":"Expert Syst. Appl."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobait\u0117, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. 46, 1\u201337 (2014)","journal-title":"ACM Comput. Surv."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.eswa.2017.04.008","volume":"82","author":"T Sethi","year":"2017","unstructured":"Sethi, T., Kantardzic, M.: On the reliable detection of concept drift from streaming unlabeled data. Expert Syst. Appl. 82, 77\u201399 (2017)","journal-title":"Expert Syst. Appl."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Sethi, T., Kantardzic, M., Arabmakki, E.: Monitoring classification blindspots to detect drifts from unlabeled data. In: 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI) (2016)","DOI":"10.1109\/IRI.2016.26"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40994-3_25"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.: On information and sufficiency. Ann. Math. Stat. 22, 79\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"364","DOI":"10.3897\/jucs.66284","volume":"27","author":"M Henke","year":"2021","unstructured":"Henke, M., Santos, E., Souto, E., Santin, A.: Spam detection based on feature evolution to deal with concept drift. JUCS J. Univ. Comput. Sci. 27, 364\u2013386 (2021)","journal-title":"JUCS J. Univ. Comput. Sci."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Cao, C., Caverlee, J.: Behavioral detection of spam URL sharing: Posting patterns versus click patterns. In: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014) (2014)","DOI":"10.1109\/ASONAM.2014.6921573"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Lu, N., Lu, J., Zhang, G., Lopez de Mantaras, R.: A concept drift-tolerant case-base editing technique. Artif. Intell. 230, 108\u2013133 (2016)","DOI":"10.1016\/j.artint.2015.09.009"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2019.05.052","volume":"135","author":"M Washha","year":"2019","unstructured":"Washha, M., Qaroush, A., Mezghani, M., Sedes, F.: Unsupervised collective-based framework for dynamic retraining of supervised real-time spam tweets detection model. Expert Syst. Appl. 135, 129\u2013152 (2019)","journal-title":"Expert Syst. Appl."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-28645-5_29","volume-title":"Advances in Artificial Intelligence \u2013 SBIA 2004","author":"J Gama","year":"2004","unstructured":"Gama, J., Medas, P., Castillo, G., Rodrigues, P.: Learning with drift detection. In: Bazzan, A.L.C., Labidi, S. (eds.) SBIA 2004. LNCS (LNAI), vol. 3171, pp. 286\u2013295. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28645-5_29"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11811305_4","volume-title":"Advanced Data Mining and Applications","author":"J Gama","year":"2006","unstructured":"Gama, J., Castillo, G.: Learning with local drift detection. In: Li, X., Za\u00efane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 42\u201355. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11811305_4"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Niranjan Koggalahewa, D., Xu, Y., Foo, E.: Spam detection in social networks based on peer acceptance. In: Proceedings of the Australasian Computer Science Week Multiconference (2020)","DOI":"10.1145\/3373017.3373025"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TKDE.2014.2345382","volume":"27","author":"I Frias-Blanco","year":"2015","unstructured":"Frias-Blanco, I., Campo-Avila, J., Ramos-Jimenez, G., Morales-Bueno, R., Ortiz-Diaz, A., Caballero-Mota, Y.: Online and non-parametric drift detection methods based on Hoeffding\u2019s bounds. IEEE Trans. Knowl. Data Eng. 27, 810\u2013823 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.artint.2014.01.001","volume":"209","author":"N Lu","year":"2014","unstructured":"Lu, N., Zhang, G., Lu, J.: Concept drift detection via competence models. Artif. Intell. 209, 11\u201328 (2014)","journal-title":"Artif. Intell."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Shao, J., Ahmadi, Z., Kramer, S.: Prototype-based learning on concept-drifting data streams. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)","DOI":"10.1145\/2623330.2623609"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TNNLS.2015.2512714","volume":"28","author":"C Alippi","year":"2017","unstructured":"Alippi, C., Boracchi, G., Roveri, M.: Hierarchical Change-Detection Tests. IEEE Trans. Neural Netw. Learn. Syst. 28, 246\u2013258 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.neucom.2021.09.037","volume":"466","author":"N Xu","year":"2021","unstructured":"Xu, N., Huo, C., Zhang, X., Cao, Y., Meng, G., Pan, C.: Dynamic camera configuration learning for high-confidence active object detection. Neurocomputing 466, 113\u2013127 (2021)","journal-title":"Neurocomputing"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"150554","DOI":"10.1016\/j.scitotenv.2021.150554","volume":"807","author":"N Taoufik","year":"2021","unstructured":"Taoufik, N., Boumya, W., Achak, M., Chennouk, H., Dewil, R., Barka, N.: The state of art on the prediction of efficiency and modeling of the processes of pollutants removal based on machine learning. Sci. Total Environ. 807, 150554 (2021)","journal-title":"Sci. Total Environ."},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"113666","DOI":"10.1016\/j.bios.2021.113666","volume":"194","author":"J Zheng","year":"2021","unstructured":"Zheng, J., Cole, T., Zhang, Y., Kim, J., Tang, S.: Exploiting machine learning for bestowing intelligence to microfluidics. Biosens. Bioelectron. 194, 113666 (2021)","journal-title":"Biosens. Bioelectron."},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.icte.2021.08.014","volume":"7","author":"C Tsai","year":"2021","unstructured":"Tsai, C., Chen, Y., Tang, T., Luo, Y.: An efficient parallel machine learning-based blockchain framework. ICT Express 7, 300\u2013307 (2021)","journal-title":"ICT Express"}],"container-title":["Communications in Computer and Information Science","Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8531-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T15:07:53Z","timestamp":1648739273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8531-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811685309","9789811685316"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8531-6_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AusDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ausdm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ausdm21.ausdm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}