{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:22:22Z","timestamp":1771064542676,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U21B2024"],"award-info":[{"award-number":["U21B2024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62202329"],"award-info":[{"award-number":["62202329"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00530-024-01364-2","type":"journal-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T03:54:53Z","timestamp":1717473293000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Social bot detection on Twitter: robustness evaluation and improvement"],"prefix":"10.1007","volume":"30","author":[{"given":"Anan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yanwei","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Lanjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoqing","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Junbo","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,4]]},"reference":[{"key":"1364_CR1","doi-asserted-by":"crossref","unstructured":"Chen, W., Huang, C., Yuan, W., Chen, X., Hu, W., Zhang, X., Zhang, Y.: Title-and-tag contrastive vision-and-language trans former for social media popularity prediction. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 7008\u20137012 (2022)","DOI":"10.1145\/3503161.3551568"},{"key":"1364_CR2","unstructured":"Berger, J.M., Morgan, J.: The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. Communications and Messaging Report (2015). https:\/\/docslib.org\/doc\/6374172\/the-isis-twitter-censusdefining-and-describing-the-population-of-isis-supporters-on-twitter"},{"key":"1364_CR3","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: What types of COVID-19 conspiracies are populated by Twitter bots? Preprint arXiv:2004.09531 (2020)","DOI":"10.5210\/fm.v25i6.10633"},{"key":"1364_CR4","doi-asserted-by":"crossref","unstructured":"Deb, A., Luceri, L., Badaway, A., Ferrara, E.: Perils and challenges of social media and election manipulation analysis: the 2018 us midterms. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 237\u2013247 (2019)","DOI":"10.1145\/3308560.3316486"},{"key":"1364_CR5","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 French presidential election. Preprint arXiv:1707.00086 (2017)","DOI":"10.5210\/fm.v22i8.8005"},{"key":"1364_CR6","doi-asserted-by":"crossref","unstructured":"Weth, C., Abdul, A., Fan, S., Kankanhalli, M.: Helping users tackle algorithmic threats on social media: a multimedia research agenda. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 4425\u20134434 (2020)","DOI":"10.1145\/3394171.3414692"},{"key":"1364_CR7","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di\u00a0Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"key":"1364_CR8","unstructured":"Beskow, D., Carley, K.: Bot-hunter: a tiered approach to detecting & characterizing automated activity on Twitter. In: Proceedings of the SBP-BRiMS: International Conference on Social Computing, Behavioral-CulturalModeling and Prediction and Behavior Representation in Modeling and Simulation, vol. 3, no. 3, (2018)"},{"key":"1364_CR9","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Luo, M.: Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236\u2013239 (2021)","DOI":"10.1145\/3487351.3488336"},{"issue":"1","key":"1364_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13278-022-00869-w","volume":"12","author":"K Hayawi","year":"2022","unstructured":"Hayawi, K., Mathew, S., Venugopal, N., Masud, M.M., Ho, P.-H.: Deeprobot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1), 43 (2022)","journal-title":"Soc. Netw. Anal. Min."},{"issue":"4","key":"1364_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/technologies8040064","volume":"8","author":"P Kantartopoulos","year":"2020","unstructured":"Kantartopoulos, P., Pitropakis, N., Mylonas, A., Kylilis, N.: Exploring adversarial attacks and defences for fake Twitter account detection. Technologies 8(4), 64 (2020)","journal-title":"Technologies"},{"key":"1364_CR12","doi-asserted-by":"crossref","unstructured":"Wang, L., Qiao, X., Xie, Y., Nie, W., Zhang, Y., Liu, A.: My brother helps me: node injection based adversarial attack on social bot detection. In: Proceedings of the 31st ACM International Conference on Multimedia, pp. 6705\u20136714 (2023)","DOI":"10.1145\/3581783.3612396"},{"key":"1364_CR13","unstructured":"Castiglione, G., Ding, G., Hashemi, M., Srinivasa, C., Wu, G.: Scalable whitebox attacks on tree-based models. Preprint arXiv:2204.00103 (2022)"},{"key":"1364_CR14","unstructured":"Hu, C., Yu, R., Zeng, B., Zhan, Y., Fu, Y., Zhang, Q., Liu, R., Shi, H.: Hyperattack: multi-gradient-guided white-box adversarial structure attack of hypergraph neural networks. Preprint arXiv:2302.12407 (2023)"},{"key":"1364_CR15","first-page":"1","volume":"2022","author":"L Sun","year":"2022","unstructured":"Sun, L., Dou, Y., Yang, C., Zhang, K., Wang, J., Philip, S.Y., He, L., Li, B.: Adversarial attack and defense on graph data: a survey. IEEE Trans. Knowl. Data Eng. 2022, 1 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1364_CR16","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots. Preprint arXiv:1707.07592 96, 104 (2017)"},{"issue":"1","key":"1364_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: The graph neural network model. IEEE Trans. Neural Netw. 20(1), 61\u201380 (2008)","journal-title":"IEEE Trans. Neural Netw."},{"key":"1364_CR18","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ins.2020.03.113","volume":"537","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H.: Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537, 380\u2013393 (2020)","journal-title":"Inf. Sci."},{"key":"1364_CR19","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Alhosseini, S., Bin\u00a0Tareaf, R., Najafi, P., Meinel, C.: Detect me if you can: spam bot detection using inductive representation learning. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 148\u2013153 (2019)","DOI":"10.1145\/3308560.3316504"},{"key":"1364_CR20","unstructured":"Kipf, T., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv:1609.02907 (2016)"},{"key":"1364_CR21","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.ins.2018.05.050","volume":"460","author":"Y Fang","year":"2018","unstructured":"Fang, Y., Sun, H., Li, G., Zhang, R., Huai, J.: Context-aware result inference in crowdsourcing. Inf. Sci. 460, 346\u2013363 (2018)","journal-title":"Inf. Sci."},{"issue":"6","key":"1364_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2016.183","volume":"49","author":"VS Subrahmanian","year":"2016","unstructured":"Subrahmanian, V.S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F.: The DARPA Twitter bot challenge. Computer 49(6), 38\u201346 (2016)","journal-title":"Computer"},{"key":"1364_CR23","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.ins.2016.08.036","volume":"372","author":"A Alarifi","year":"2016","unstructured":"Alarifi, A., Alsaleh, M., Al-Salman, A.: Twitter turing test: identifying social machines. Inf. Sci. 372, 332\u2013346 (2016)","journal-title":"Inf. Sci."},{"key":"1364_CR24","doi-asserted-by":"crossref","unstructured":"Kantepe, M., Ganiz, M.C.: Preprocessing framework for twitter bot detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 630\u2013634. IEEE, London (2017)","DOI":"10.1109\/UBMK.2017.8093483"},{"key":"1364_CR25","doi-asserted-by":"crossref","unstructured":"Er\u015fahin, B., Akta\u015f, \u00d6., K\u0131l\u0131n\u00e7, D., Akyol, C.: Twitter fake account detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 388\u2013392. IEEE, London (2017)","DOI":"10.1109\/UBMK.2017.8093420"},{"key":"1364_CR26","doi-asserted-by":"crossref","unstructured":"Graves, A., Graves, A.: Long short-term memory. In: Supervised Sequence Labelling with Recurrent Neural Networks, pp. 37\u201345 (2012)","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"1364_CR27","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"1364_CR28","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847\u20132856 (2018)","DOI":"10.1145\/3219819.3220078"},{"key":"1364_CR29","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples on graph data: deep insights into attack and defense. Preprint arXiv:1903.01610 (2019)","DOI":"10.24963\/ijcai.2019\/669"},{"issue":"8","key":"1364_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3547330","volume":"55","author":"S Zhou","year":"2022","unstructured":"Zhou, S., Liu, C., Ye, D., Zhu, T., Zhou, W., Yu, P.S.: Adversarial attacks and defenses in deep learning: from a perspective of cybersecurity. ACM Comput. Surv. 55(8), 1\u201339 (2022)","journal-title":"ACM Comput. Surv."},{"key":"1364_CR31","unstructured":"Dai, H., Li, H., Tian, T., Huang, X., Wang, L., Zhu, J., Song, L.: Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115\u20131124. PMLR (2018)"},{"key":"1364_CR32","doi-asserted-by":"crossref","unstructured":"Zhu, D., Zhang, Z., Cui, P., Zhu, W.: Robust graph convolutional networks against adversarial attacks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1399\u20131407 (2019)","DOI":"10.1145\/3292500.3330851"},{"key":"1364_CR33","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S.: Certifiable robustness and robust training for graph convolutional networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 246\u2013256 (2019)","DOI":"10.1145\/3292500.3330905"},{"key":"1364_CR34","doi-asserted-by":"crossref","unstructured":"Xu, K., Chen, H., Liu, S., Chen, P., Weng, T., Hong, M., Lin, X.: Topology attack and defense for graph neural networks: an optimization perspective. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 3961\u20133967. ijcai.org (2019)","DOI":"10.24963\/ijcai.2019\/550"},{"issue":"3","key":"1364_CR35","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/TCSS.2020.3042628","volume":"8","author":"J Chen","year":"2020","unstructured":"Chen, J., Lin, X., Xiong, H., Wu, Y., Zheng, H., Xuan, Q.: Smoothing adversarial training for GNN. IEEE Trans. Comput. Soc. Syst. 8(3), 618\u2013629 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"1364_CR36","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V.: Roberta: a robustly optimized Bert pretraining approach. Preprint arXiv:1907.11692 (2019)"},{"key":"1364_CR37","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. Preprint arXiv:1412.6572 (2014)"},{"key":"1364_CR38","doi-asserted-by":"crossref","unstructured":"Schlichtkrull, M., Kipf, T.N., Bloem, P., Van Den\u00a0Berg, R., Titov, I., Welling, M.: Modeling relational data with graph convolutional networks. In: The Semantic Web: 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, June 3\u20137, 2018, Proceedings 15, pp. 593\u2013607. Springer, London (2018)","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"1364_CR39","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)"},{"key":"1364_CR40","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56\u201371 (2015)","journal-title":"Decis. Support Syst."},{"key":"1364_CR41","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng, S., Tan, Z., Wan, H., Wang, N., Chen, Z., Zhang, B., Zheng, Q., Zhang, W., Lei, Z., Yang, S., et al.: Twibot-22: towards graph-based twitter bot detection. Adv. Neural Inform. Process. Syst. 35, 35254\u201335269 (2022)","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"1364_CR42","doi-asserted-by":"crossref","unstructured":"Hu, Z., Dong, Y., Wang, K., Sun, Y.: Heterogeneous graph transformer. In: Proceedings of the Web Conference 2020, pp. 2704\u20132710 (2020)","DOI":"10.1145\/3366423.3380027"},{"key":"1364_CR43","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. Preprint arXiv:1710.10903 (2017)"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01364-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01364-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01364-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T01:37:45Z","timestamp":1732153065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01364-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1364"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01364-2","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"22 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no Conflict of interest related to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"167"}}