{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:35:14Z","timestamp":1756312514011,"version":"3.37.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00975-0","type":"journal-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T10:39:23Z","timestamp":1736246363000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter"],"prefix":"10.1007","volume":"24","author":[{"given":"Marouane","family":"Kihal","sequence":"first","affiliation":[]},{"given":"Lamia","family":"Hamza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"975_CR1","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1007\/s10489-019-01463-y","volume":"49","author":"MA Mokri","year":"2019","unstructured":"Mokri, M.A., Hamou, R.M., Amine, A.: A new bio inspired technique based on octopods for spam filtering. Appl. Intell. 49, 3425\u20133435 (2019). https:\/\/doi.org\/10.1007\/s10489-019-01463-y","journal-title":"Appl. Intell."},{"key":"975_CR2","doi-asserted-by":"publisher","first-page":"3538","DOI":"10.1007\/s10489-018-1161-y","volume":"48","author":"A Barushka","year":"2018","unstructured":"Barushka, A., Hajek, P.: Spam filtering using integrated distribution-based balancing approach and regularized deep neural networks. Appl. Intell. 48, 3538\u20133556 (2018). https:\/\/doi.org\/10.1007\/s10489-018-1161-y","journal-title":"Appl. Intell."},{"key":"975_CR3","doi-asserted-by":"publisher","unstructured":"Swe, M.M., Myo, N.N.: Fake accounts detection on twitter using blacklist. In:2018 IEEE\/ACIS 17th International Conference on Computer and Information Science (ICIS), IEEE, pp 562\u2013566 (2018) https:\/\/doi.org\/10.1145\/1772690.1772843","DOI":"10.1145\/1772690.1772843"},{"key":"975_CR4","doi-asserted-by":"publisher","unstructured":"Lee, K., Caverlee, J., Webb, S.: The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th International Conference on World Wide Web, pp 1139\u20131140 (2010) https:\/\/doi.org\/10.1109\/ICIS.2018.8466499","DOI":"10.1109\/ICIS.2018.8466499"},{"issue":"23","key":"975_CR5","doi-asserted-by":"publisher","first-page":"17233","DOI":"10.1007\/s00521-023-08614-w","volume":"35","author":"S Kaddoura","year":"2023","unstructured":"Kaddoura, S., Alex, S.A., Itani, M., Henno, S., AlNashash, A., Hemanth, D.J.: Arabic spam tweets classification using deep learning. Neural Comput. Appl. 35(23), 17233\u201317246 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08614-w","journal-title":"Neural Comput. Appl."},{"key":"975_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.knosys.2018.04.025","volume":"153","author":"AZ Alam","year":"2018","unstructured":"Alam, A.Z., Faris, H., Alqatawna, J., Hassonah, M.A.: Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts. Knowl.-Based Syst. 153, 91\u2013104 (2018). https:\/\/doi.org\/10.1016\/j.knosys.2018.04.025","journal-title":"Knowl.-Based Syst."},{"key":"975_CR7","doi-asserted-by":"publisher","unstructured":"Goyal, S., Chauhan, R., Parveen, S.: Spam detection using knn and decision tree mechanism in social network. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE, pp 522\u2013526 (2016) https:\/\/doi.org\/10.1109\/PDGC.2016.7913250","DOI":"10.1109\/PDGC.2016.7913250"},{"issue":"2","key":"975_CR8","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s13369-017-2855-x","volume":"43","author":"MK Sohrabi","year":"2018","unstructured":"Sohrabi, M.K., Karimi, F.: A feature selection approach to detect spam in the facebook social network. Arab. J. Sci. Eng. 43(2), 949\u2013958 (2018). https:\/\/doi.org\/10.1007\/s13369-017-2855-x","journal-title":"Arab. J. Sci. Eng."},{"key":"975_CR9","doi-asserted-by":"publisher","unstructured":"Freeman, D.M.: Using naive bayes to detect spammy names in social networks. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp 3\u201312 (2013) https:\/\/doi.org\/10.1145\/2517312.2517314","DOI":"10.1145\/2517312.2517314"},{"issue":"5","key":"975_CR10","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1108\/IJPCC-09-2020-0130","volume":"17","author":"R Krithiga","year":"2021","unstructured":"Krithiga, R., Ilavarasan, E.: Hyperparameter tuning of adaboost algorithm for social spammer identification. Int. J. Pervas. Comput. Commun. 17(5), 462\u2013482 (2021). https:\/\/doi.org\/10.1108\/IJPCC-09-2020-0130","journal-title":"Int. J. Pervas. Comput. Commun."},{"key":"975_CR11","doi-asserted-by":"publisher","first-page":"84365","DOI":"10.1109\/ACCESS.2022.3196905","volume":"10","author":"N Ghatasheh","year":"2022","unstructured":"Ghatasheh, N., Altaharwa, I., Aldebei, K.: Modified genetic algorithm for feature selection and hyper parameter optimization: case of xgboost in spam prediction. IEEE Access 10, 84365\u201384383 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3196905","journal-title":"IEEE Access"},{"issue":"1","key":"975_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.47852\/bonviewJCCE2202192","volume":"2","author":"Y Guo","year":"2023","unstructured":"Guo, Y., Mustafaoglu, Z., Koundal, D.: Spam detection using bidirectional transformers and machine learning classifier algorithms. J. Comput. Cogn. Eng. 2(1), 5\u20139 (2023). https:\/\/doi.org\/10.47852\/bonviewJCCE2202192","journal-title":"J. Comput. Cogn. Eng."},{"key":"975_CR13","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s41870-018-0157-5","volume":"11","author":"G Jain","year":"2019","unstructured":"Jain, G., Sharma, M., Agarwal, B.: Optimizing semantic LSTM for spam detection. Int. J. Inf. Technol. 11, 239\u2013250 (2019). https:\/\/doi.org\/10.1007\/s41870-018-0157-5","journal-title":"Int. J. Inf. Technol."},{"key":"975_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.ijin.2022.01.001","volume":"3","author":"JD Rosita","year":"2022","unstructured":"Rosita, J.D., Jacob, W.S.: Multi-objective genetic algorithm and CNN-based deep learning architectural scheme for effective spam detection. Int. J. Intell. Netw. 3, 9\u201315 (2022). https:\/\/doi.org\/10.1016\/j.ijin.2022.01.001","journal-title":"Int. J. Intell. Netw."},{"key":"975_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10844-013-0254-7","volume":"42","author":"B Zhou","year":"2014","unstructured":"Zhou, B., Yao, Y., Luo, J.: Cost-sensitive three-way email spam filtering. J. Intell. Infor. Syst. 42, 19\u201345 (2014). https:\/\/doi.org\/10.1007\/s10844-013-0254-7","journal-title":"J. Intell. Infor. Syst."},{"key":"975_CR16","doi-asserted-by":"publisher","first-page":"100079","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z Alom","year":"2020","unstructured":"Alom, Z., Carminati, B., Ferrari, E.: A deep learning model for twitter spam detection. Online Soc. Netw. Media 18, 100079 (2020). https:\/\/doi.org\/10.1016\/j.osnem.2020.100079","journal-title":"Online Soc. Netw. Media"},{"key":"975_CR17","doi-asserted-by":"publisher","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint (2013) arXiv:1301.3781https:\/\/doi.org\/10.48550\/arXiv.1301.3781","DOI":"10.48550\/arXiv.1301.3781"},{"key":"975_CR18","doi-asserted-by":"publisher","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp 435\u2013442 (2010) https:\/\/doi.org\/10.1145\/1835449.1835522","DOI":"10.1145\/1835449.1835522"},{"key":"975_CR19","doi-asserted-by":"publisher","first-page":"107655","DOI":"10.1016\/j.compeleceng.2021.107655","volume":"97","author":"ZF Sokhangoee","year":"2022","unstructured":"Sokhangoee, Z.F., Rezapour, A.: A novel approach for spam detection based on association rule mining and genetic algorithm. Comput. Electr. Eng. 97, 107655 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107655","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"975_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.48185\/jitc.v4i1.653","volume":"4","author":"MA Bouke","year":"2023","unstructured":"Bouke, M.A., Abdullah, A., Abdullah, M.T., Zaid, S.A., El Atigh, H.: A lightweight machine learning-based email spam detection model using word frequency pattern. J. Infor. Technol. Comput. 4(1), 15\u201328 (2023). https:\/\/doi.org\/10.48185\/jitc.v4i1.653","journal-title":"J. Infor. Technol. Comput."},{"key":"975_CR21","doi-asserted-by":"publisher","first-page":"103333","DOI":"10.1016\/j.advengsoft.2022.103333","volume":"175","author":"M Thomas","year":"2023","unstructured":"Thomas, M., Meshram, B.: CHSO-DNFNET: Spam detection in twitter using feature fusion and optimized deep neuro fuzzy network. Adv. Eng. Softw. 175, 103333 (2023). https:\/\/doi.org\/10.1016\/j.advengsoft.2022.103333","journal-title":"Adv. Eng. Softw."},{"key":"975_CR22","unstructured":"Twitter spam dataset: http:\/\/nsclab.org\/nsclab\/resources\/ accessed on (2021)"},{"key":"975_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.inffus.2018.08.002","volume":"48","author":"H Faris","year":"2019","unstructured":"Faris, H., AlaM, A.Z., Heidari, A.A., Aljarah, I., Mafarja, M., Hassonah, M.A., Fujita, H.: An intelligent system for spam detection and identification of the most relevant features based on evolutionary random weight networks. Infor. Fusion 48, 67\u201383 (2019). https:\/\/doi.org\/10.1016\/j.inffus.2018.08.002","journal-title":"Infor. Fusion"},{"key":"975_CR24","unstructured":"Hijjawi, W.: Email features extraction. (2017) https:\/\/github.com\/WadeaHijjawi\/EmailFeaturesExtraction.git accessed on 2021"},{"key":"975_CR25","unstructured":"The CSDMC2010 Corpus: http:\/\/www.aueb.gr\/users\/ion\/data\/ accessed on (2020)"},{"key":"975_CR26","doi-asserted-by":"publisher","first-page":"102274","DOI":"10.1016\/j.cose.2021.102274","volume":"106","author":"A Neisari","year":"2021","unstructured":"Neisari, A., Rueda, L., Saad, S.: Spam review detection using self-organizing maps and convolutional neural networks. Comput. Secur. 106, 102274 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102274","journal-title":"Comput. Secur."},{"issue":"9","key":"975_CR27","doi-asserted-by":"publisher","first-page":"156","DOI":"10.3390\/fi12090156","volume":"12","author":"A Ghourabi","year":"2020","unstructured":"Ghourabi, A., Mahmood, M.A., Alzubi, Q.M.: A hybrid CNN-LSTM model for sms spam detection in arabic and english messages. Future Internet 12(9), 156 (2020). https:\/\/doi.org\/10.3390\/fi12090156","journal-title":"Future Internet"},{"key":"975_CR28","doi-asserted-by":"publisher","unstructured":"Yu, X., Tang, L., Rao, Y., Huang, T., Zhou, J., Lu, J.: Point-bert: Pre-training 3d point cloud transformers with masked point modeling. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 19313\u201319322 (2022) https:\/\/doi.org\/10.48550\/arXiv.2111.14819","DOI":"10.48550\/arXiv.2111.14819"},{"key":"975_CR29","doi-asserted-by":"publisher","unstructured":"Zhou, P., Qi, Z., Zheng, S., Xu ,J., Bao, H., Xu, B.: Text classification improved by integrating bidirectional lstm with two-dimensional max pooling. arXiv preprint (2016) arXiv:1611.06639 21 https:\/\/doi.org\/10.48550\/arXiv.2111.14819","DOI":"10.48550\/arXiv.2111.14819"},{"key":"975_CR30","doi-asserted-by":"publisher","first-page":"100036","DOI":"10.1016\/j.jcmds.2022.100036","volume":"3","author":"G Andresini","year":"2022","unstructured":"Andresini, G., Iovine, A., Gasbarro, R., Lomolino, M., Gemmis, M., Appice, A.: Euphoria: a neural multi-view approach to combine content and behavioral features in review spam detection. J. Comput. Math. Data Sci. 3, 100036 (2022). https:\/\/doi.org\/10.1016\/j.jcmds.2022.100036","journal-title":"J. Comput. Math. Data Sci."},{"issue":"3","key":"975_CR31","first-page":"495","volume":"21","author":"E Aljadani","year":"2024","unstructured":"Aljadani, E., Assiri, F., Alshutayri, A.: Detecting spam reviews in Arabic by deep learning. Int. Arab J. Infor. Technol. 21(3), 495\u2013505 (2024)","journal-title":"Int. Arab J. Infor. Technol."},{"key":"975_CR32","doi-asserted-by":"publisher","first-page":"80253","DOI":"10.1109\/ACCESS.2021.3081479","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu, X., Lu, H., Nayak, A.: A spam transformer model for SMS spam detection. IEEE Access 9, 80253\u201380263 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3081479","journal-title":"IEEE Access"},{"key":"975_CR33","doi-asserted-by":"publisher","unstructured":"Liaw, R., Liang, E., Nishihara, R., Moritz, P., Gonzalez, J.E., Stoica, I.: Tune: a research platform for distributed model selection and training. CoRR abs\/1807.05118. (2018) https:\/\/doi.org\/10.48550\/arXiv.1807.05118","DOI":"10.48550\/arXiv.1807.05118"},{"key":"975_CR34","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.procs.2021.03.107","volume":"13","author":"S Kotni","year":"2022","unstructured":"Kotni, S., Chandrasekhar, P., Laxman, S.: Spam detection using deep learning models. Int. J. Adv. Res. Eng. Technol. 13, 55\u201364 (2022). https:\/\/doi.org\/10.1016\/j.procs.2021.03.107","journal-title":"Int. J. Adv. Res. Eng. Technol."},{"key":"975_CR35","doi-asserted-by":"publisher","unstructured":"Shinde, P.P., Shah, S.: A review of machine learning and deep learning applications. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), IEEE, pp 1-6 (2018) https:\/\/doi.org\/10.1109\/ICCUBEA.2018.8697857.","DOI":"10.1109\/ICCUBEA.2018.8697857."},{"issue":"5","key":"975_CR36","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.beth.2020.05.002","volume":"51","author":"T Jiang","year":"2020","unstructured":"Jiang, T., Gradus, J.L., Rosellini, A.J.: Supervised machine learning: a brief primer. Behav. Ther. 51(5), 675\u2013687 (2020). https:\/\/doi.org\/10.1016\/j.beth.2020.05.002","journal-title":"Behav. Ther."},{"issue":"10","key":"975_CR37","first-page":"864","volume":"3","author":"G Kaur","year":"2014","unstructured":"Kaur, G., Oberai, E.N.: A review article on Naive Bayes classifier with various smoothing techniques. Int. J. Comput. Sci. Mob. Comput. 3(10), 864\u2013868 (2014)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"975_CR38","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.knosys.2014.03.015","volume":"64","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, S., Phillips, P., Ji, G.: Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl. Based Syst. 64, 22\u201331 (2014). https:\/\/doi.org\/10.1016\/j.knosys.2014.03.015","journal-title":"Knowl. Based Syst."},{"key":"975_CR39","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10462-010-9166-x","volume":"34","author":"O Amayri","year":"2010","unstructured":"Amayri, O., Bouguila, N.: A study of spam filtering using support vector machines. Artif. Intell. Rev. 34, 73\u2013108 (2010). https:\/\/doi.org\/10.1007\/s10462-010-9166-x","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"975_CR40","first-page":"181","volume":"5","author":"S Amjad","year":"2019","unstructured":"Amjad, S., Soleimanian Gharehchopogh, F.: A novel hybrid approach for email spam detection based on scatter search algorithm and k-nearest neighbors. J. Adv. Comput. Eng. Technol. 5(3), 181\u2013194 (2019)","journal-title":"J. Adv. Comput. Eng. Technol."},{"issue":"1","key":"975_CR41","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.11591\/ijece.v10i1.pp997-1005","volume":"10","author":"F Khan","year":"2020","unstructured":"Khan, F., Ahamed, J., Kadry, S., Ramasamy, L.K.: Detecting malicious URLS using binary classification through ADA boost algorithm. Int. J. Electr. Comput. Eng. 10(1), 2088\u20138708 (2020). https:\/\/doi.org\/10.11591\/ijece.v10i1.pp997-1005","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"11","key":"975_CR42","first-page":"2182","volume":"12","author":"P Anitha","year":"2021","unstructured":"Anitha, P., Rao, C.G., Babu, D.S.: Email spam filtering using machine learning based XGboost classifier method. Turkish J. Comput. Math. Educ. 12(11), 2182\u20132190 (2021)","journal-title":"Turkish J. Comput. Math. Educ."},{"key":"975_CR43","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., Polosukhin, I.: Attention is all you need. Advances in neural information processing systems (2017) https:\/\/doi.org\/10.48550\/arXiv.1706.03762"},{"key":"975_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00738-y","volume":"11","author":"D Mehta","year":"2021","unstructured":"Mehta, D., Dwivedi, A., Patra, A., Anand Kumar, M.: A transformer-based architecture for fake news classification. Soc. Netw. Anal. Min. 11, 1\u201312 (2021). https:\/\/doi.org\/10.1007\/s13278-021-00738-y","journal-title":"Soc. Netw. Anal. Min."},{"key":"975_CR45","doi-asserted-by":"publisher","unstructured":"Kihal, M., Hamza, L.: Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest. Multimedia Tools and Applications pp 1\u201319 (2023) https:\/\/doi.org\/10.1007\/s11042-023-15170-x","DOI":"10.1007\/s11042-023-15170-x"},{"key":"975_CR46","doi-asserted-by":"publisher","unstructured":"Bindu, P., Mishra, R., Thilagam, P.S.: Discovering spammer communities in twitter. J. Intell. Infor. Syst. 51, 503\u2013527 (2018). https:\/\/doi.org\/10.1007\/s10844-017-0494-z","DOI":"10.1007\/s10844-017-0494-z"},{"key":"975_CR47","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10844-017-0454-7","volume":"50","author":"RK Dewang","year":"2018","unstructured":"Dewang, R.K., Singh, A.K.: State-of-art approaches for review spammer detection: a survey. J. Intell. Infor. Syst. 50, 231\u2013264 (2018). https:\/\/doi.org\/10.1007\/s10844-017-0454-7","journal-title":"J. Intell. Infor. Syst."},{"key":"975_CR48","doi-asserted-by":"publisher","unstructured":"Chouikhi, H., Chniter, H., Jarray, F.: Arabic sentiment analysis using bert model. In: Advances in Computational Collective Intelligence: 13th International Conference, ICCCI 2021, Kallithea, Rhodes, Greece, September 29 October 1, 2021, Proceedings 13, Springer, pp 621\u2013632 (2021) https:\/\/doi.org\/10.1007\/978-3-030-88113-9_50","DOI":"10.1007\/978-3-030-88113-9_50"},{"key":"975_CR49","unstructured":"Takaoka, K., Hisamoto, S., Kawahara, N., Sakamoto, M., Uchida, Y., Matsumoto, Y.: Sudachi: A japanese tokenizer for business. In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018) (2018)"},{"key":"975_CR50","unstructured":"Si, C., Zhang, Z., Chen, Y., Qi, F., Wang, X., Liu ,Z., Sun, M.: Shuowen-jiezi: Linguistically informed tokenizers for chinese language model pretraining. arXiv preprint (2021) arXiv:2106.00400"},{"key":"975_CR51","doi-asserted-by":"crossref","unstructured":"Lee, S., Shin, H.: The korean morphologically tight-fitting tokenizer for noisy user-generated texts. In: Proceedings of the Seventh Workshop on Noisy User generated Text (W-NUT 2021), pp 410\u2013416 (2021) http:\/\/dx.doi.org\/10.18653\/v1\/2021.wnut-1.45","DOI":"10.18653\/v1\/2021.wnut-1.45"},{"issue":"4","key":"975_CR52","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/info10040150","volume":"10","author":"K Kowsari","year":"2019","unstructured":"Kowsari, K., Jafari Meimandi, K., Heidarysafa, M., Mendu, S., Barnes, L., Brown, D.: Text classification algorithms: a survey. Information 10(4), 150 (2019). https:\/\/doi.org\/10.3390\/info10040150","journal-title":"Information"},{"key":"975_CR53","doi-asserted-by":"publisher","unstructured":"Imam, N.: Health-related Spam Campaigns, Mendeley Data, V1, (2020) https:\/\/doi.org\/10.17632\/rgrvt5x4tk.1","DOI":"10.17632\/rgrvt5x4tk.1"},{"key":"975_CR54","unstructured":"Bhidya, M.: Utkml\u2019s twitter spam detection competition. (2019) https:\/\/kaggle.com\/competitions\/utkmls-twitter-spam-detection-competition accessed on 2021"},{"key":"975_CR55","doi-asserted-by":"publisher","unstructured":"Safaya, A., Abdullatif, M., Yuret, D.: Kuisail at semeval-2020 task 12: Bert-cnn for offensive speech identification in social media. arXiv preprint (2020) arXiv:2007.13184https:\/\/doi.org\/10.48550\/arXiv.2007.13184","DOI":"10.48550\/arXiv.2007.13184"},{"key":"975_CR56","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.W., Lee, K., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint (2018) arXiv:1810.04805https:\/\/doi.org\/10.48550\/arXiv.1810.04805","DOI":"10.48550\/arXiv.1810.04805"},{"issue":"03","key":"975_CR57","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter, J.D.: Matplotlib: a 2d graphics environment. Comput. Sci. Eng. 9(03), 90\u201395 (2007). https:\/\/doi.org\/10.1109\/MCSE.2007.55","journal-title":"Comput. Sci. Eng."},{"key":"975_CR58","doi-asserted-by":"publisher","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint (2014) arXiv:1409.1556https:\/\/doi.org\/10.48550\/arXiv.1409.1556","DOI":"10.48550\/arXiv.1409.1556"},{"key":"975_CR59","doi-asserted-by":"publisher","unstructured":"Wang, H., Zheng, H.: True Positive Rate, Springer New York, New York, NY, pp 2302\u20132303. (2013) https:\/\/doi.org\/10.1007\/978-1-4419-9863-7","DOI":"10.1007\/978-1-4419-9863-7"},{"issue":"1","key":"975_CR60","first-page":"24","volume":"14","author":"A Ahraminezhad","year":"2022","unstructured":"Ahraminezhad, A., Mojarad, M., Arfaeinia, H.: An intelligent ensemble classification method for spam diagnosis in social networks. Int. J. Intell. Syst. Appl. 14(1), 24\u201331 (2022)","journal-title":"Int. J. Intell. Syst. Appl."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00975-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00975-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00975-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T15:25:50Z","timestamp":1739373950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00975-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,7]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["975"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00975-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,1,7]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"56"}}