{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:30:09Z","timestamp":1765269009988,"version":"3.37.3"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00521-024-10350-8","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T03:40:04Z","timestamp":1724816404000},"page":"21487-21515","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient fake account identification in social media networks: Facebook and Instagram using NSGA-II algorithm"],"prefix":"10.1007","volume":"36","author":[{"given":"Amine","family":"Sallah","sequence":"first","affiliation":[]},{"given":"El Arbi","family":"Abdellaoui Alaoui","sequence":"additional","affiliation":[]},{"given":"Abdelaaziz","family":"Hessane","sequence":"additional","affiliation":[]},{"given":"Said","family":"Agoujil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9821-6146","authenticated-orcid":false,"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"10350_CR1","doi-asserted-by":"publisher","DOI":"10.5455\/jjcit.71-1609858713","author":"KS Adewole","year":"2021","unstructured":"Adewole KS, Balogun AO, Raheem MO, Jimoh MK, Jimoh RG, Mabayoje MA, Usman-Hamza FE, Akintola AG, Asaju-Gbolagade AW (2021) Hybrid feature selection framework for sentiment analysis on large corpora. Jordan J Comput Inf Technol. https:\/\/doi.org\/10.5455\/jjcit.71-1609858713","journal-title":"Jordan J Comput Inf Technol"},{"key":"10350_CR2","doi-asserted-by":"publisher","first-page":"99339","DOI":"10.1109\/ACCESS.2023.3313169","volume":"11","author":"BL Aditya","year":"2023","unstructured":"Aditya BL, Mohanty SN (2023) Heterogenous social media analysis for efficient deep learning fake-profile identification. IEEE Access 11:99339\u201399351. https:\/\/doi.org\/10.1109\/ACCESS.2023.3313169","journal-title":"IEEE Access"},{"issue":"1","key":"10350_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/spy2.9","volume":"1","author":"H Ahmed","year":"2018","unstructured":"Ahmed H, Traore I, Saad S (2018) Detecting opinion spams and fake news using text classification. Secur Priv 1(1):9","journal-title":"Secur Priv"},{"key":"10350_CR4","doi-asserted-by":"publisher","unstructured":"Akyon FC, Esat Kalfaoglu M (2019) Instagram fake and automated account detection. In: Proceedings\u20142019 innovations in intelligent systems and applications conference, ASYU 2019 https:\/\/doi.org\/10.1109\/ASYU48272.2019.8946437. arXiv:1910.03090","DOI":"10.1109\/ASYU48272.2019.8946437"},{"key":"10350_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.5614\/itbj.ict.res.appl.2019.13.2.2","volume":"13","author":"MB Albayati","year":"2019","unstructured":"Albayati MB, Altamimi AM (2019) Identifying fake Facebook profiles using data mining techniques. J ICT Res Appl 13:107\u2013117. https:\/\/doi.org\/10.5614\/itbj.ict.res.appl.2019.13.2.2","journal-title":"J ICT Res Appl"},{"key":"10350_CR6","first-page":"329","volume":"34","author":"M Allam","year":"2018","unstructured":"Allam M, Nandhini M (2018) Optimal feature selection using binary teaching learning based optimization algorithm. J King Saud Univ Comput Inf Sci 34:329\u2013341","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"10350_CR7","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.14569\/IJACSA.2024.01503125","volume":"15","author":"E Alnagi","year":"2024","unstructured":"Alnagi E, Ahmad A, Al-Haija QA, Aref A (2024) Unmasking fake social network accounts with explainable intelligence. Int J Adv Comput Sci Appl 15:1277\u20131283. https:\/\/doi.org\/10.14569\/IJACSA.2024.01503125","journal-title":"Int J Adv Comput Sci Appl"},{"key":"10350_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/app13053013","author":"FS Alsubaei","year":"2023","unstructured":"Alsubaei FS (2023) Detection of inappropriate tweets linked to fake accounts on twitter. Appl Sci (Switzerland). https:\/\/doi.org\/10.3390\/app13053013","journal-title":"Appl Sci (Switzerland)"},{"key":"10350_CR9","first-page":"27","volume":"10","author":"N Anand","year":"2021","unstructured":"Anand N, Sehgal R, Anand S, Kaushik A (2021) Feature selection on educational data using Boruta algorithm. Int J Comput Intell Stud 10:27\u201335","journal-title":"Int J Comput Intell Stud"},{"key":"10350_CR10","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.18280\/mmep.100608","volume":"10","author":"KL Arega","year":"2023","unstructured":"Arega KL, Alasadi MK, Yaseen AJ, Salau AO, Braide SL, Bandele JO (2023) Machine learning based detection of fake Facebook profiles in Afan Oromo language. Math Model Eng Probl 10:1987\u20131993. https:\/\/doi.org\/10.18280\/mmep.100608","journal-title":"Math Model Eng Probl"},{"key":"10350_CR11","unstructured":"Bakhshandeh B (2019) Instagram fake spammer genuine accounts"},{"key":"10350_CR12","doi-asserted-by":"publisher","unstructured":"Bhattasali T, Saeed K (2021) Typing pattern analysis for fake profile detection in social media, in: Computer information systems and industrial management: 20th international conference, CISIM 2021, E\u0142k, Poland, September 24\u201326, 2021, Proceedings 20, Springer. pp 17\u201327. https:\/\/doi.org\/10.1007\/978-3-030-84340-3_2","DOI":"10.1007\/978-3-030-84340-3_2"},{"key":"10350_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.neucom.2017.11.077","volume":"300","author":"J Cai","year":"2018","unstructured":"Cai J, Luo J, Wang S, Yang S (2018) Feature selection in machine learning: a new perspective. Neurocomputing 300:70\u201379","journal-title":"Neurocomputing"},{"key":"10350_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/0263276420917466","volume":"37","author":"E Carmi","year":"2020","unstructured":"Carmi E (2020) Rhythmedia: a study of Facebook immune system. Theory Cult Soc 37:119\u2013138. https:\/\/doi.org\/10.1177\/0263276420917466","journal-title":"Theory Cult Soc"},{"key":"10350_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103516","volume":"60","author":"F Cauteruccio","year":"2023","unstructured":"Cauteruccio F, Kou Y (2023) Investigating the emotional experiences in esports spectatorship: the case of league of legends. Inf Process Manag 60:103516. https:\/\/doi.org\/10.1016\/j.ipm.2023.103516","journal-title":"Inf Process Manag"},{"key":"10350_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MIS.2012.47","volume":"27","author":"G Chalkiadakis","year":"2012","unstructured":"Chalkiadakis G, Elkind E, Wooldridge M (2012) Cooperative game theory: basic concepts and computational challenges. IEEE Intell Syst 27:86\u201390","journal-title":"IEEE Intell Syst"},{"key":"10350_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TCSS.2016.2516039","volume":"2","author":"C Chen","year":"2015","unstructured":"Chen C, Zhang J, Xie Y, Xiang Y, Zhou W, Hassan MM, AlElaiwi A, Alrubaian M (2015) A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Trans Comput Soc Syst 2:65\u201376","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"10350_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2015) Fame for sale: efficient detection of fake twitter followers. Decis Support Syst 80:56\u201371","journal-title":"Decis Support Syst"},{"key":"10350_CR19","doi-asserted-by":"crossref","unstructured":"Cresci S, Di\u00a0Pietro R, Petrocchi M, Spognardi A, Tesconi M (2017) The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th international conference on world wide web companion, pp 963\u2013972","DOI":"10.1145\/3041021.3055135"},{"key":"10350_CR20","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans Evol Comput 6:182\u2013197. https:\/\/doi.org\/10.1109\/4235.996017","journal-title":"IEEE Trans Evol Comput"},{"key":"10350_CR21","volume-title":"Introduction to genetic algorithms","author":"S Deepa","year":"2008","unstructured":"Deepa S (2008) Introduction to genetic algorithms. Springer, Berlin"},{"key":"10350_CR22","doi-asserted-by":"publisher","first-page":"3797","DOI":"10.1007\/s11042-018-6083-5","volume":"78","author":"X Deng","year":"2019","unstructured":"Deng X, Li Y, Weng J, Zhang J (2019) Feature selection for text classification: a review. Multimed Tools Appl 78:3797\u20133816","journal-title":"Multimed Tools Appl"},{"key":"10350_CR23","doi-asserted-by":"crossref","unstructured":"Fakhraei S, Foulds J, Shashanka M, Getoor L (2015) Collective spammer detection in evolving multi-relational social networks. In: Proceedings of the 21th ACM sigkdd international conference on knowledge discovery and data mining, pp 1769\u20131778","DOI":"10.1145\/2783258.2788606"},{"key":"10350_CR24","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng S, Tan Z, Wan H, Wang N, Chen Z, Zhang B, Zheng Q, Zhang W, Lei Z, Yang S et al (2022) Twibot-22: towards graph-based twitter bot detection. Adv Neural Inf Process Syst 35:35254\u201335269","journal-title":"Adv Neural Inf Process Syst"},{"key":"10350_CR25","unstructured":"Fraser A, Burnell D et\u00a0al (1970) Computer models in genetics. Comput Models Genet"},{"key":"10350_CR26","first-page":"42","volume":"24","author":"P Gal\u00e1n-Garc\u00eda","year":"2016","unstructured":"Gal\u00e1n-Garc\u00eda P, Puerta JGDI, G\u00f3mez CL, Santos I, Bringas PG (2016) Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. Logic J IGPL 24:42\u201353","journal-title":"Logic J IGPL"},{"key":"10350_CR27","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.ejor.2020.08.045","volume":"290","author":"C Gambella","year":"2021","unstructured":"Gambella C, Ghaddar B, Naoum-Sawaya J (2021) Optimization problems for machine learning: a survey. Eur J Oper Res 290:807\u2013828. https:\/\/doi.org\/10.1016\/j.ejor.2020.08.045","journal-title":"Eur J Oper Res"},{"key":"10350_CR28","doi-asserted-by":"publisher","unstructured":"Gazelo\u011flu C (2020) Prediction of heart disease by classifying with feature selection and machine learning methods. Progress Nutr. https:\/\/doi.org\/10.23751\/pn.v22i2.9830","DOI":"10.23751\/pn.v22i2.9830"},{"key":"10350_CR29","doi-asserted-by":"publisher","first-page":"84365","DOI":"10.1109\/ACCESS.2022.3196905","volume":"10","author":"N Ghatasheh","year":"2022","unstructured":"Ghatasheh N, Altaharwa I, Aldebei K (2022) Modified genetic algorithm for feature selection and hyper parameter optimization: case of XGBoost in spam prediction. IEEE Access 10:84365\u201384383","journal-title":"IEEE Access"},{"key":"10350_CR30","doi-asserted-by":"crossref","unstructured":"Gu B, Zhai Z, Li X, Huang H (2022) Towards fairer classifier via true fairness score path. In: Proceedings of the 31st ACM international conference on information & knowledge management, pp 3113\u20133121","DOI":"10.1145\/3511808.3557109"},{"key":"10350_CR31","doi-asserted-by":"publisher","first-page":"128008","DOI":"10.1016\/j.biortech.2022.128008","volume":"363","author":"ZU Haq","year":"2022","unstructured":"Haq ZU, Ullah H, Khan MNA, Naqvi SR, Ahad A, Amin NAS (2022) Comparative study of machine learning methods integrated with genetic algorithm and particle swarm optimization for bio-char yield prediction. Bioresour Technol 363:128008. https:\/\/doi.org\/10.1016\/j.biortech.2022.128008","journal-title":"Bioresour Technol"},{"key":"10350_CR32","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.ins.2021.09.052","volume":"581","author":"A Hashemi","year":"2021","unstructured":"Hashemi A, Bagher Dowlatshahi M, Nezamabadi-pour H (2021) An efficient pareto-based feature selection algorithm for multi-label classification. Inf Sci 581:428\u2013447. https:\/\/doi.org\/10.1016\/j.ins.2021.09.052","journal-title":"Inf Sci"},{"key":"10350_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50017-1","author":"L Igual","year":"2017","unstructured":"Igual L, Segu\u00ed S (2017) Introduction to data science: a python approach to concepts. Tech Appl. https:\/\/doi.org\/10.1007\/978-3-319-50017-1","journal-title":"Tech Appl"},{"key":"10350_CR34","doi-asserted-by":"publisher","DOI":"10.1038\/s41524-019-0181-4","author":"PC Jennings","year":"2019","unstructured":"Jennings PC, Lysgaard S, Hummelsh\u00f8j JS, Vegge T, Bligaard T (2019) Genetic algorithms for computational materials discovery accelerated by machine learning. NPJ Comput Mater. https:\/\/doi.org\/10.1038\/s41524-019-0181-4","journal-title":"NPJ Comput Mater"},{"key":"10350_CR35","doi-asserted-by":"crossref","unstructured":"Joshi S, Nagariya HG, Dhanotiya N, Jain S (2020) Identifying fake profile in online social network: an overview and survey. In: International conference on machine learning. Image Processing, Network Security and Data Sciences, Springer, pp 17\u201328","DOI":"10.1007\/978-981-15-6315-7_2"},{"key":"10350_CR36","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","volume":"80","author":"S Katoch","year":"2021","unstructured":"Katoch S, Chauhan SS, Kumar V (2021) A review on genetic algorithm: past, present, and future. Multimed Tools Appl 80:8091\u20138126","journal-title":"Multimed Tools Appl"},{"key":"10350_CR37","doi-asserted-by":"publisher","unstructured":"Kaubiyal J, Jain AK (2019) A feature based approach to detect fake profiles in twitter. In: ACM international conference proceeding series. https:\/\/doi.org\/10.1145\/3361758.3361784","DOI":"10.1145\/3361758.3361784"},{"key":"10350_CR38","doi-asserted-by":"publisher","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN\u201995-international conference on neural networks, IEEE. pp 1942\u20131948. https:\/\/doi.org\/10.1109\/ICNN.1995.488968","DOI":"10.1109\/ICNN.1995.488968"},{"key":"10350_CR39","doi-asserted-by":"publisher","unstructured":"Kubat M (2017) An introduction to machine learning. https:\/\/doi.org\/10.1007\/978-3-319-63913-0","DOI":"10.1007\/978-3-319-63913-0"},{"key":"10350_CR40","first-page":"2020","volume":"6","author":"M Kursa","year":"2020","unstructured":"Kursa M, Rudnicki W (2020) Boruta: wrapper algorithm for all relevant feature selection. Visit\u00e9 le 6:2020","journal-title":"Visit\u00e9 le"},{"key":"10350_CR41","doi-asserted-by":"publisher","unstructured":"Kursa MB, Rudnicki WR (2010) Feature selection with the Boruta package. J Stat Softw 36:1\u201313. https:\/\/doi.org\/10.18637\/jss.v036.i11","DOI":"10.18637\/jss.v036.i11"},{"key":"10350_CR42","doi-asserted-by":"publisher","first-page":"22863","DOI":"10.1109\/ACCESS.2018.2818682","volume":"6","author":"XY Liu","year":"2018","unstructured":"Liu XY, Liang Y, Wang S, Yang ZY, Ye HS (2018) A hybrid genetic algorithm with wrapper-embedded approaches for feature selection. IEEE Access 6:22863\u201322874","journal-title":"IEEE Access"},{"key":"10350_CR43","unstructured":"Lundberg SM, Lee SI (2017) A unified approach to interpreting model predictions. In: Advances in neural information processing systems 2017-December, 4766\u20134775. arXiv:1705.07874"},{"key":"10350_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107933","author":"W Ma","year":"2021","unstructured":"Ma W, Zhou X, Zhu H, Li L, Jiao L (2021) A two-stage hybrid ant colony optimization for high-dimensional feature selection. Pattern Recog. https:\/\/doi.org\/10.1016\/j.patcog.2021.107933","journal-title":"Pattern Recog"},{"key":"10350_CR45","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.compeleceng.2017.01.025","volume":"58","author":"DV Medhane","year":"2017","unstructured":"Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126\u2013143. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.01.025","journal-title":"Comput Electr Eng"},{"key":"10350_CR46","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5923156","author":"M Mohammadrezaei","year":"2018","unstructured":"Mohammadrezaei M, Shiri ME, Rahmani AM (2018) Identifying fake accounts on social networks based on graph analysis and classification algorithms. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2018\/5923156","journal-title":"Secur Commun Netw"},{"key":"10350_CR47","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1007\/s12652-019-01364-5","volume":"11","author":"F Moslehi","year":"2020","unstructured":"Moslehi F, Haeri A (2020) A novel hybrid wrapper-filter approach based on genetic algorithm, particle swarm optimization for feature subset selection. J Ambient Intell Humaniz Comput 11:1105\u20131127","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10350_CR48","doi-asserted-by":"publisher","unstructured":"Nettleton D (2014) Selection of variables and factor derivation. In: Commercial data mining. https:\/\/doi.org\/10.1016\/b978-0-12-416602-8.00006-6","DOI":"10.1016\/b978-0-12-416602-8.00006-6"},{"key":"10350_CR49","doi-asserted-by":"publisher","first-page":"116","DOI":"10.14445\/22315381\/IJETT-V72I3P112","volume":"72","author":"L Oumaima","year":"2024","unstructured":"Oumaima L, Mariam R, Ouafae B, Abdelouahid L (2024) Fake account detection in twitter using long short-term memory and convolutional neural network. Int J Eng Trends Technol 72:116\u2013126. https:\/\/doi.org\/10.14445\/22315381\/IJETT-V72I3P112","journal-title":"Int J Eng Trends Technol"},{"key":"10350_CR50","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.3390\/molecules24152811","volume":"24","author":"A R\u00e1cz","year":"2019","unstructured":"R\u00e1cz A, Bajusz D, H\u00e9berger K (2019) Multi-level comparison of machine learning classifiers and their performance metrics. Molecules 24:2811","journal-title":"Molecules"},{"key":"10350_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eetsis.4342","volume":"11","author":"EVS Raja","year":"2024","unstructured":"Raja EVS, Aditya BL, Mohanty SN (2024) Fake profile detection using logistic regression and gradient descent algorithm on online social networks. EAI Endorsed Trans Scalable Inf Syst 11:1\u201310. https:\/\/doi.org\/10.4108\/eetsis.4342","journal-title":"EAI Endorsed Trans Scalable Inf Syst"},{"key":"10350_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00398-3","volume":"8","author":"M Rostami","year":"2021","unstructured":"Rostami M, Berahmand K, Forouzandeh S (2021) A novel community detection based genetic algorithm for feature selection. J Big Data 8:1\u201327","journal-title":"J Big Data"},{"key":"10350_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-02839-9","author":"A Shah","year":"2024","unstructured":"Shah A, Varshney S, Mehrotra M (2024) Detection of fake profiles on online social network platforms: performance evaluation of artificial intelligence techniques. SN Comput Sci. https:\/\/doi.org\/10.1007\/s42979-024-02839-9","journal-title":"SN Comput Sci"},{"key":"10350_CR54","doi-asserted-by":"publisher","first-page":"10031","DOI":"10.1109\/ACCESS.2022.3142859","volume":"10","author":"TM Shami","year":"2022","unstructured":"Shami TM, El-Saleh AA, Alswaitti M, Al-Tashi Q, Summakieh MA, Mirjalili S (2022) Particle swarm optimization: a comprehensive survey. IEEE Access 10:10031\u201310061. https:\/\/doi.org\/10.1109\/ACCESS.2022.3142859","journal-title":"IEEE Access"},{"key":"10350_CR55","first-page":"429","volume":"34","author":"S Sheikhi","year":"2020","unstructured":"Sheikhi S (2020) An efficient method for detection of fake accounts on the Instagram platform. Rev d\u2019Intelligence Artif 34:429\u2013436","journal-title":"Rev d\u2019Intelligence Artif"},{"key":"10350_CR56","doi-asserted-by":"publisher","unstructured":"Shirataki S, Yamaguchi S (2017) A study on interpretability of decision of machine learning. In: Proceedings\u20142017 IEEE international conference on big data, big data vol 2018, pp 4830\u20134831. https:\/\/doi.org\/10.1109\/BigData.2017.8258557","DOI":"10.1109\/BigData.2017.8258557"},{"key":"10350_CR57","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.swevo.2017.04.002","volume":"36","author":"P Shunmugapriya","year":"2017","unstructured":"Shunmugapriya P, Kanmani S (2017) A hybrid algorithm using ant and bee colony optimization for feature selection and classification (ac-abc hybrid). Swarm Evolut Comput 36:27\u201336. https:\/\/doi.org\/10.1016\/j.swevo.2017.04.002","journal-title":"Swarm Evolut Comput"},{"key":"10350_CR58","doi-asserted-by":"crossref","unstructured":"Singhal Y, Jain A, Batra S, Varshney Y, Rathi M (2018) Review of bagging and boosting classification performance on unbalanced binary classification. In: 2018 IEEE 8th international advance computing conference (IACC), IEEE. pp 338\u2013343","DOI":"10.1109\/IADCC.2018.8692138"},{"key":"10350_CR59","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/TEVC.2020.2968743","volume":"24","author":"XF Song","year":"2020","unstructured":"Song XF, Zhang Y, Guo YN, Sun XY, Wang YL (2020) Variable-size cooperative coevolutionary particle swarm optimization for feature selection on high-dimensional data. IEEE Trans Evol Comput 24:882\u2013895. https:\/\/doi.org\/10.1109\/TEVC.2020.2968743","journal-title":"IEEE Trans Evol Comput"},{"key":"10350_CR60","unstructured":"Statista. Most popular social networks worldwide as of january 2022, ranked by number of monthly active users. https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/"},{"key":"10350_CR61","doi-asserted-by":"publisher","first-page":"292","DOI":"10.11591\/ijeecs.v35.i1.pp292-300","volume":"35","author":"MV Unni","year":"2024","unstructured":"Unni MV, Jeevananda S, Kalapurackal JJ, Fatma S (2024) Enhancing authenticity and trust in social media: an automated approach for detecting fake profiles. Indones J Electr Eng Comput Sci 35:292\u2013300. https:\/\/doi.org\/10.11591\/ijeecs.v35.i1.pp292-300","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"10350_CR62","first-page":"3","volume":"19","author":"B Venkatesh","year":"2019","unstructured":"Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybern Inf Technol 19:3\u201326","journal-title":"Cybern Inf Technol"},{"key":"10350_CR63","doi-asserted-by":"publisher","first-page":"18","DOI":"10.46604\/peti.2024.13200","volume":"26","author":"SC Venkatesh","year":"2024","unstructured":"Venkatesh SC, Shaji S, Sundaram BM (2024) A fake profile detection model using multistage stacked ensemble classification. Proc Eng Technol Innov 26:18\u201332. https:\/\/doi.org\/10.46604\/peti.2024.13200","journal-title":"Proc Eng Technol Innov"},{"key":"10350_CR64","doi-asserted-by":"publisher","unstructured":"Wang X, Lai CM, Lin YC, Hsieh CJ, Wu SF, Cam H (2019) Multiple accounts detection on Facebook using semi-supervised learning on graphs. In: Proceedings\u2014IEEE military communications conference MILCOM 2019-Oct 94\u2013101. https:\/\/doi.org\/10.1109\/MILCOM.2018.8599718","DOI":"10.1109\/MILCOM.2018.8599718"},{"key":"10350_CR65","doi-asserted-by":"publisher","unstructured":"Wani MA, Agarwal N, Jabin S, Hussain SZ (2019) Analyzing Real and Fake users in Facebook Network based on Emotions. 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019 2061:110\u2013117. https:\/\/doi.org\/10.1109\/COMSNETS.2019.8711124","DOI":"10.1109\/COMSNETS.2019.8711124"},{"key":"10350_CR66","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.neucom.2019.06.075","volume":"364","author":"Y Xue","year":"2019","unstructured":"Xue Y, Li M, Shepperd M, Lauria S, Liu X (2019) A novel aggregation-based dominance for pareto-based evolutionary algorithms to configure software product lines. Neurocomputing 364:32\u201348. https:\/\/doi.org\/10.1016\/j.neucom.2019.06.075","journal-title":"Neurocomputing"},{"key":"10350_CR67","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.neucom.2020.07.061","volume":"415","author":"L Yang","year":"2020","unstructured":"Yang L, Shami A (2020) On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415:295\u2013316. https:\/\/doi.org\/10.1016\/j.neucom.2020.07.061","journal-title":"Neurocomputing"},{"key":"10350_CR68","doi-asserted-by":"crossref","unstructured":"Zeng F, Sun Y, Li Y (2023) MRLBot : Multi-dimensional representation learning for social media bot detection","DOI":"10.3390\/electronics12102298"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10350-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10350-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10350-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T09:07:48Z","timestamp":1732352868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10350-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":68,"journal-issue":{"issue":"34","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10350"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10350-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,8,28]]},"assertion":[{"value":"3 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}