{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T04:01:18Z","timestamp":1749355278903,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819665754","type":"print"},{"value":"9789819665761","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-6576-1_9","type":"book-chapter","created":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T05:39:11Z","timestamp":1749274751000},"page":"119-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DDFGNN: Dual-Dimensionality Fusion Graph Neural Network for\u00a0Social Bot Detection"],"prefix":"10.1007","author":[{"given":"Yuze","family":"Bai","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Yingjie","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Chengping","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Yizhou","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,6,8]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Alhosseini, S., Bin\u00a0Tareaf, R., Najafi, P., Meinel, C.: Detect me if you can: spam bot detection using inductive representation learning. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 148\u2013153 (2019)","DOI":"10.1145\/3308560.3316504"},{"issue":"2","key":"9_CR2","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11280-022-01116-0","volume":"26","author":"S Benslimane","year":"2023","unstructured":"Benslimane, S., Az\u00e9, J., Bringay, S., Servajean, M., Mollevi, C.: A text and GNN based controversy detection method on social media. World Wide Web 26(2), 799\u2013825 (2023)","journal-title":"World Wide Web"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Cai, C., Li, L., Zengi, D.: Behavior enhanced deep bot detection in social media. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 128\u2013130. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004887"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chavoshi, N., Hamooni, H., Mueen, A.: Debot: Twitter bot detection via warped correlation. In: ICDM, vol.\u00a018, pp. 28\u201365 (2016)","DOI":"10.1109\/ICDM.2016.0096"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Chen, S., Feng, S., Liang, S., Zong, C.C., Li, J., Li, P.: CACL: community-aware heterogeneous graph contrastive learning for social media bot detection. arXiv preprint arXiv:2405.10558 (2024)","DOI":"10.18653\/v1\/2024.findings-acl.617"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56\u201371 (2015). https:\/\/doi.org\/10.1016\/j.dss.2015.09.003","journal-title":"Decis. Support Syst."},{"issue":"5","key":"9_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIS.2016.29","volume":"31","author":"S Cresci","year":"2016","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intell. Syst. 31(5), 58\u201364 (2016)","journal-title":"IEEE Intell. Syst."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: a system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273\u2013274 (2016)","DOI":"10.1145\/2872518.2889302"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Deb, A., Luceri, L., Badaway, A., Ferrara, E.: Perils and challenges of social media and election manipulation analysis: the 2018 us midterms. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 237\u2013247 (2019)","DOI":"10.1145\/3308560.3316486"},{"issue":"2","key":"9_CR10","first-page":"5","volume":"1","author":"PG Efthimion","year":"2018","unstructured":"Efthimion, P.G., Payne, S., Proferes, N.: Supervised machine learning bot detection techniques to identify social twitter bots. SMU Data Sci. Rev. 1(2), 5 (2018)","journal-title":"SMU Data Sci. Rev."},{"issue":"7","key":"9_CR11","doi-asserted-by":"publisher","first-page":"155014771772249","DOI":"10.1177\/1550147717722499","volume":"13","author":"B Feng","year":"2017","unstructured":"Feng, B., Li, Q., Pan, X., Zhang, J., Guo, D.: Groupfound: an effective approach to detect suspicious accounts in online social networks. Int. J. Distrib. Sens. Netw. 13(7), 1550147717722499 (2017)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Feng, S., Tan, Z., Li, R., Luo, M.: Heterogeneity-aware twitter bot detection with relational graph transformers. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 3977\u20133985 (2022)","DOI":"10.1609\/aaai.v36i4.20314"},{"key":"9_CR13","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng, S., et al.: Twibot-22: towards graph-based twitter bot detection. Adv. Neural. Inf. Process. Syst. 35, 35254\u201335269 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Li, J., Luo, M.: Satar: a self-supervised approach to twitter account representation learning and its application in bot detection. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, pp. 3808\u20133817 (2021)","DOI":"10.1145\/3459637.3481949"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Luo, M.: Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236\u2013239 (2021)","DOI":"10.1145\/3487351.3488336"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MIC.2017.2911439","volume":"21","author":"D Gayo-Avello","year":"2017","unstructured":"Gayo-Avello, D.: Social media won\u2019t free us. IEEE Internet Comput. 21(4), 98\u2013101 (2017)","journal-title":"IEEE Internet Comput."},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-91521-0_32","volume-title":"Social Computing and Social Media. User Experience and Behavior","author":"C Grimme","year":"2018","unstructured":"Grimme, C., Assenmacher, D., Adam, L.: Changing perspectives: is it sufficient to detect social bots? In: Meiselwitz, G. (ed.) SCSM 2018. LNCS, vol. 10913, pp. 445\u2013461. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91521-0_32"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1177\/0894439320908190","volume":"40","author":"L Hagen","year":"2022","unstructured":"Hagen, L., Neely, S., Keller, T.E., Scharf, R., Vasquez, F.E.: Rise of the machines? Examining the influence of social bots on a political discussion network. Soc. Sci. Comput. Rev. 40(2), 264\u2013287 (2022)","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"1","key":"9_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13278-022-00869-w","volume":"12","author":"K Hayawi","year":"2022","unstructured":"Hayawi, K., Mathew, S., Venugopal, N., Masud, M.M., Ho, P.H.: Deeprobot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1), 43 (2022)","journal-title":"Soc. Netw. Anal. Min."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Knoke, D., Yang, S.: Social Network Analysis. SAGE Publications (2019)","DOI":"10.4135\/9781506389332"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467, 312\u2013322 (2018)","journal-title":"Inf. Sci."},{"key":"9_CR22","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., Tesconi, M.: Rtbust: exploiting temporal patterns for botnet detection on twitter. In: Proceedings of the 10th ACM Conference on Web Science, pp. 183\u2013192 (2019)","DOI":"10.1145\/3292522.3326015"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Sun, Y., Zeng, F., Xiao, J., Deng, Y., Ding, Y., Li, Y.: GPTCN: gated parallel transformer convolutional networks for downstream-task user representation learning on app usage. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5175\u20135179. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10446256"},{"key":"9_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2022.114912","volume":"301","author":"V Van Mulukom","year":"2022","unstructured":"Van Mulukom, V., et al.: Antecedents and consequences of covid-19 conspiracy beliefs: a systematic review. Soc. Sci. Med. 301, 114912 (2022)","journal-title":"Soc. Sci. Med."},{"key":"9_CR26","unstructured":"Wang, G., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Wei, F., Nguyen, U.T.: Twitter bot detection using bidirectional long short-term memory neural networks and word embeddings. In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 101\u2013109. IEEE (2019)","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"36664","DOI":"10.1109\/ACCESS.2020.2975630","volume":"8","author":"B Wu","year":"2020","unstructured":"Wu, B., Liu, L., Yang, Y., Zheng, K., Wang, X.: Using improved conditional generative adversarial networks to detect social bots on twitter. IEEE Access 8, 36664\u201336680 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"9_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3572403","volume":"17","author":"Y Yang","year":"2023","unstructured":"Yang, Y., et al.: Rosgas: adaptive social bot detection with reinforced self-supervised GNN architecture search. ACM Trans. Web 17(3), 1\u201331 (2023)","journal-title":"ACM Trans. Web"},{"issue":"2","key":"9_CR30","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1080\/19331681.2023.2189201","volume":"21","author":"B Zhao","year":"2024","unstructured":"Zhao, B., Ren, W., Zhu, Y., Zhang, H.: Manufacturing conflict or advocating peace? A study of social bots agenda building in the twitter discussion of the Russia-Ukraine war. J. Inf. Technol. Polit. 21(2), 176\u2013194 (2024)","journal-title":"J. Inf. Technol. Polit."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-6576-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T05:39:20Z","timestamp":1749274760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-6576-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819665754","9789819665761"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-6576-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}