{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:39:17Z","timestamp":1773520757985,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002387, 61872448, 61772549, U1804263, 62002386"],"award-info":[{"award-number":["62002387, 61872448, 61772549, U1804263, 62002386"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002387, 61872448, 61772549, U1804263, 62002386"],"award-info":[{"award-number":["62002387, 61872448, 61772549, U1804263, 62002386"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002387, 61872448, 61772549, U1804263, 62002386"],"award-info":[{"award-number":["62002387, 61872448, 61772549, U1804263, 62002386"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002387, 61872448, 61772549, U1804263, 62002386"],"award-info":[{"award-number":["62002387, 61872448, 61772549, U1804263, 62002386"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62002387, 61872448, 61772549, U1804263, 62002386"],"award-info":[{"award-number":["62002387, 61872448, 61772549, U1804263, 62002386"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"China and the Key Research and Development Project of Henan Province","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]},{"name":"China and the Key Research and Development Project of Henan Province","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]},{"name":"China and the Key Research and Development Project of Henan Province","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]},{"name":"China and the Key Research and Development Project of Henan Province","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]},{"name":"China and the Key Research and Development Project of Henan Province","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10115-024-02116-4","type":"journal-article","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T08:02:12Z","timestamp":1714118532000},"page":"5185-5202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["BotCL: a social bot detection model based on graph contrastive learning"],"prefix":"10.1007","volume":"66","author":[{"given":"Yan","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Daofu","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Haoyu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"2116_CR1","doi-asserted-by":"crossref","unstructured":"Cai C, Li L, Zengi D (2017) Behavior enhanced deep bot detection in social media. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 128\u2013130 (2017)","DOI":"10.1109\/ISI.2017.8004887"},{"issue":"10","key":"2116_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci S (2020) A decade of social bot detection. Commun ACM 63(10):72\u201383","journal-title":"Commun ACM"},{"key":"2116_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2015) Fame for sale: efficient detection of fake Twitter followers. Decis Support Syst 80:56\u201371","journal-title":"Decis Support Syst"},{"issue":"4","key":"2116_CR4","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/TITS.2015.2404431","volume":"16","author":"E D\u2019Andrea","year":"2015","unstructured":"D\u2019Andrea E, Ducange P, Lazzerini B, Marcelloni F (2015) Real-time detection of traffic from twitter stream analysis. IEEE Trans Intell Transp Syst 16(4):2269\u20132283","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2116_CR5","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng S, Tan Z, Wan H, Wang N, Chen Z, Zhang B, Zheng Q, Zhang W, Lei Z, Yang S et al (2022) Twibot-22: towards graph-based twitter bot detection. Adv Neural Inf Process Syst 35:35254\u201335269","journal-title":"Adv Neural Inf Process Syst"},{"key":"2116_CR6","doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Li J, Luo M (2021) SATAR: a self-supervised approach to twitter account representation learning and its application in bot detection. In: Proceedings of the 30th ACM international conference on information & knowledge management, pp 3808\u20133817","DOI":"10.1145\/3459637.3481949"},{"key":"2116_CR7","doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Li J, Luo M (2021) TwiBot-20: a comprehensive twitter bot detection benchmark. In: Proceedings of the 30th ACM international conference on information & knowledge management, pp 4485\u20134494","DOI":"10.1145\/3459637.3482019"},{"key":"2116_CR8","unstructured":"Kipf T N, Welling M. (2017) Semi-supervised classification with graph convolutional networks. In: Proceedings of the 5th international conference on learning representations (ICLR)"},{"key":"2116_CR9","doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Luo M (2021) BotRGCN: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM international conference on advances in social networks analysis and mining, pp 236\u2013239","DOI":"10.1145\/3487351.3488336"},{"issue":"7","key":"2116_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96\u2013104","journal-title":"Commun ACM"},{"key":"2116_CR11","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"2116_CR12","unstructured":"Han X, Jiang Z, Liu N, Hu X (2022) G-Mixup: graph data augmentation for graph classification. In: International conference on machine learning. PMLR, pp 8230\u20138248"},{"key":"2116_CR13","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64\u201373","journal-title":"Inf Sci"},{"key":"2116_CR14","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"2116_CR15","doi-asserted-by":"publisher","first-page":"101771","DOI":"10.1016\/j.is.2021.101771","volume":"103","author":"P Pham","year":"2022","unstructured":"Pham P, Nguyen LT, Vo B, Yun U (2022) Bot2vec: a general approach of intra-community oriented representation learning for bot detection in different types of social networks. Inf Syst 103:101771","journal-title":"Inf Syst"},{"issue":"49","key":"2116_CR16","doi-asserted-by":"publisher","first-page":"12435","DOI":"10.1073\/pnas.1803470115","volume":"115","author":"M Stella","year":"2018","unstructured":"Stella M, Ferrara E, De Domenico M (2018) Bots increase exposure to negative and inflammatory content in online social systems. Proc Natl Acad Sci 115(49):12435\u201312440","journal-title":"Proc Natl Acad Sci"},{"key":"2116_CR17","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2018) Graph attention networks. In: Proceedings of the 6th international conference on learning representations (ICLR)"},{"key":"2116_CR18","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang W, Liang Y, Cai Y, Hooi B (2021) Mixup for node and graph classification. In: WWW \u201921: the web conference 2021, pp 3663\u20133674","DOI":"10.1145\/3442381.3449796"},{"key":"2116_CR19","doi-asserted-by":"crossref","unstructured":"Wei F, Nguyen UT (2019) Twitter bot detection using bidirectional long short-term memory neural networks and word embeddings. In: 2019 First IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS-ISA). IEEE, pp 101\u2013109","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"issue":"8","key":"2116_CR20","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang C, Harkreader R, Gu G (2013) Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans Inf Forensics Secur 8(8):1280\u20131293","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2116_CR21","first-page":"5812","volume":"33","author":"Y You","year":"2020","unstructured":"You Y, Chen T, Sui Y, Chen T, Wang Z, Shen Y (2020) Graph contrastive learning with augmentations. Adv Neural Inf Process Syst 33:5812\u20135823","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"2116_CR22","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/3446776","volume":"64","author":"C Zhang","year":"2021","unstructured":"Zhang C, Bengio S, Hardt M, Recht B, Vinyals O (2021) Understanding deep learning (still) requires rethinking generalization. Commun ACM 64(3):107\u2013115","journal-title":"Commun ACM"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02116-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-024-02116-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02116-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T07:10:27Z","timestamp":1723533027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-024-02116-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,26]]},"references-count":22,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["2116"],"URL":"https:\/\/doi.org\/10.1007\/s10115-024-02116-4","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,26]]},"assertion":[{"value":"21 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}