{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T22:35:09Z","timestamp":1776638109436,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Math Artif Intell"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10472-018-9612-z","type":"journal-article","created":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T02:55:34Z","timestamp":1546397734000},"page":"21-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":130,"title":["Spam detection in social media using convolutional and long short term memory neural network"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2461-662X","authenticated-orcid":false,"given":"Gauri","family":"Jain","sequence":"first","affiliation":[]},{"given":"Manisha","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Basant","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"9612_CR1","doi-asserted-by":"publisher","unstructured":"Agarwal, B., Mittal, N.: Sentiment analysis using conceptnet ontology and context information. In: Prominent Feature Extraction for Sentiment Analysis. Springer. https:\/\/doi.org\/10.1007\/978-3-319-25343-5 https:\/\/doi.org\/10.1007\/978-3-319-25343-5 (2016)","DOI":"10.1007\/978-3-319-25343-5 10.1007\/978-3-319-25343-5"},{"key":"9612_CR2","unstructured":"Almeida, T.A., Yamakami, A., Almeida, J.: Evaluation of approaches for dimensionality reduction applied with naive bayes anti-spam filters. In: International Conference on Machine Learning and Applications, 2009. ICMLA\u201909, pp 517\u2013522. IEEE (2009)"},{"key":"9612_CR3","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Spyropoulos, C.D.: An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and development in information retrieval, pp 160\u2013167. ACM (2000)","DOI":"10.1145\/345508.345569"},{"key":"9612_CR4","doi-asserted-by":"crossref","unstructured":"Cho, K., van Merrienboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using rnn encoder\u2013decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, pp. 1724\u20131734 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"9612_CR5","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K., Kuksa, P.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"9612_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cose.2003.10.001","volume":"23","author":"A Cournane","year":"2004","unstructured":"Cournane, A., Hunt, R.: An analysis of the tools used for the generation and prevention of spam. Comput. Secur. 23(2), 154\u2013166 (2004)","journal-title":"Comput. Secur."},{"key":"9612_CR7","unstructured":"DeBarr, D., Wechsler, H.: Spam detection using clustering, random forests, and active learning. In: Sixth Conference on Email and Anti-Spam. Mountain View (2009)"},{"key":"9612_CR8","doi-asserted-by":"crossref","unstructured":"Devlin, J., Kamali, M., Subramanian, K., Prasad, R., Natarajan, P.: Statistical machine translation as a language model for handwriting recognition. In: International Conference on Frontiers in Handwriting Recognition (ICFHR), pp. 291\u2013296. IEEE (2012)","DOI":"10.1109\/ICFHR.2012.273"},{"key":"9612_CR9","doi-asserted-by":"crossref","unstructured":"Gao, Y., Mi, G., Tan, Y.: Variable length concentration based feature construction method for spam detection. In: International Joint Conference on Neural Networks (IJCNN), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/IJCNN.2015.7280346"},{"key":"9612_CR10","unstructured":"Grier, C., Thomas, K., Paxson, V.: Zhang, M.: spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27\u201337. ACM (2010)"},{"key":"9612_CR11","unstructured":"Havasi, C., Speer, R., Alonso, J.: Conceptnet 3: a flexible, multilingual semantic network for common sense knowledge. In: Recent Advances in Natural Language Processing (RANLP). John Benjamins Philadelphia, pp 27\u201329 (2007)"},{"key":"9612_CR12","unstructured":"Healy, M., Delany, S.J., Zamolotskikh, A.: An assessment of case base reasoning for short text message classification. In: Proceedings of the 15th Irish Conference on Artificial Intelligence and Cognitive Sciences (AICS\u201904), pp. 9\u201318 (2004)"},{"key":"9612_CR13","doi-asserted-by":"crossref","unstructured":"Jain, G., Sharma, M.: Social media: a review. In: Information Systems Design and Intelligent Applications, pp. 387\u2013395. Springer (2016)","DOI":"10.1007\/978-81-322-2755-7_41"},{"key":"9612_CR14","doi-asserted-by":"crossref","unstructured":"Jain, G., Sharma, M., Agarwal, B.: Optimizing semantic lstm for spam detection. Int. J. Inf. Technol. 1\u201312 (2018)","DOI":"10.4018\/IJKDB.2018010102"},{"issue":"1","key":"9612_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.4018\/IJKDB.2018010102","volume":"8","author":"G Jain","year":"2018","unstructured":"Jain, G., Sharma, M., Agarwal, B.: Spam detection on social media using semantic convolutional neural network. Int. J. Knowl. Disc. Bioinfo 8(1), 12\u201326 (2018)","journal-title":"Int. J. Knowl. Disc. Bioinfo"},{"key":"9612_CR16","unstructured":"Karami, A., Zhou, L.: Improving static sms spam detection by using new content-based features. In: Twentieth Americas Conference on Information Systems, Savannah, pp. 1\u20139 (2014)"},{"key":"9612_CR17","unstructured":"Kim, C., Hwang, K.B.: Naive bayes classifier learning with feature selection for spam detection in social bookmarking. In: ECML PKDD Discovery Challenge, p 32 (2008)"},{"key":"9612_CR18","doi-asserted-by":"crossref","unstructured":"Kim, J., Chung, K., Choi, K.: Spam filtering with dynamically updated url statistics. IEEE Secur. Priv. 5(4) (2007)","DOI":"10.1109\/MSP.2007.95"},{"key":"9612_CR19","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1746\u20131751. Association for Computational Linguistics (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"9612_CR20","unstructured":"Kolari, P., Finin, T., Joshi, A.: SVMS for the blogosphere: Blog identification and splog detection. In: AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, pp. 92\u201399 (2006)"},{"key":"9612_CR21","doi-asserted-by":"crossref","unstructured":"Lai, S., Xu, L., Liu, K., Zhao, J.: Recurrent convolutional neural networks for text classification. In: Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI), vol. 333, pp. 2267\u20132273 (2015)","DOI":"10.1609\/aaai.v29i1.9513"},{"key":"9612_CR22","doi-asserted-by":"crossref","unstructured":"Lei, T., Barzilay, R., Jaakkola, T.: Molding cnns for text: non-linear, non-consecutive convolutions. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1565\u20131575. Association for Computational Linguistics (2015)","DOI":"10.18653\/v1\/D15-1180"},{"key":"9612_CR23","unstructured":"Levine, J.R.: Experiences with greylisting. In: Second Conference on Email and Anti-Spam (CEAS), pp. 1\u20132 (2005)"},{"key":"9612_CR24","unstructured":"Ma, J., Gao, W., Mitra, P., Kwon, S., Jansen, B.J., Wong, K.F., Cha, M.: Detecting rumors from microblogs with recurrent neural networks. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI), pp. 3818\u20133824 (2016)"},{"issue":"8","key":"9612_CR25","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst Appl"},{"key":"9612_CR26","doi-asserted-by":"crossref","unstructured":"Mccord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: International Conference on Autonomic and Trusted Computing, pp. 175\u2013186. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23496-5_13"},{"key":"9612_CR27","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv: 1301.3781 (2013)"},{"issue":"11","key":"9612_CR28","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: Wordnet: a lexical database for english. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"key":"9612_CR29","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter spammer detection using data stream clustering. Inf. Sci. 260, 64\u201373 (2014)","journal-title":"Inf. Sci."},{"key":"9612_CR30","doi-asserted-by":"crossref","unstructured":"Mou, L., Peng, H., Li, G., Xu, Y., Zhang, L., Jin, Z.: Discriminative neural sentence modeling by tree-based convolution. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2315\u20132325. Association for Computational Linguistics (2015)","DOI":"10.18653\/v1\/D15-1279"},{"issue":"3","key":"9612_CR31","first-page":"525","volume":"42","author":"AT Sabri","year":"2010","unstructured":"Sabri, A.T., Mohammads, A.H., Al-Shargabi, B., Hamdeh, M.A.: Developing new continuous learning approach for spam detection using artificial neural network. Eur. J. Sci. Res. 42(3), 525\u2013535 (2010)","journal-title":"Eur. J. Sci. Res."},{"key":"9612_CR32","doi-asserted-by":"crossref","unstructured":"Sainath, T.N., Vinyals, O., Senior, A., Sak, H.: Convolutional, long short-term memory, fully connected deep neural networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4580\u20134584. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178838"},{"key":"9612_CR33","unstructured":"Silva, R.M., Almeida, T.A., Yamakami, A.: Artificial neural networks for content-based web spam detection. In: Proceedings on the International Conference on Artificial Intelligence (ICAI), p. 1 (2012)"},{"key":"9612_CR34","unstructured":"Socher, R., Bauer, J., Manning, C.D., Manning, C.D., Andrew, Y.N.: Parsing with compositional vector grammars. In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, pp. 455\u2013465 (2013)"},{"key":"9612_CR35","unstructured":"Stern, H.: A survey of modern spam tools. In: The Fifth Conference on Email and Anti-Spam (CEAS), pp. 1\u201310 (2008)"},{"key":"9612_CR36","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC\u201910), pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"9612_CR37","doi-asserted-by":"crossref","unstructured":"Tai, K.S., Socher, R., Manning, C.D.: Improved semantic representations from tree-structured long short-term memory networks. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics, pp. 1556\u20131566. Association for Computational Linguistics (2015)","DOI":"10.3115\/v1\/P15-1150"},{"key":"9612_CR38","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"9612_CR39","doi-asserted-by":"crossref","unstructured":"Tseng, C.Y., Chen, M.S.: Incremental SVM model for spam detection on dynamic email social networks. In: International Conference on Computational Science and Engineering, (CSE\u201909), vol. 4, pp. 128\u2013135. IEEE (2009)","DOI":"10.1109\/CSE.2009.260"},{"key":"9612_CR40","doi-asserted-by":"crossref","unstructured":"Wang, H.B., Yu, Y., Liu, Z.: SVM classifier incorporating feature selection using ga for spam detection. In: Embedded and Ubiquitous Computing\u2013EUC, vol. 2005, pp 1147\u20131154 (2005)","DOI":"10.1007\/11596356_113"},{"key":"9612_CR41","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2016.03.036","volume":"201","author":"F Wu","year":"2016","unstructured":"Wu, F., Shu, J., Huang, Y., Yuan, Z.: Co-detecting social spammers and spam messages in microblogging via exploiting social contexts. Neurocomputing 201, 51\u201365 (2016)","journal-title":"Neurocomputing"},{"key":"9612_CR42","doi-asserted-by":"crossref","unstructured":"Wu, T., Liu, S., Zhang, J., Xiang, Y.: Twitter spam detection based on deep learning. In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW \u201917, pp. 3:1\u20133:8. ACM, New York (2017)","DOI":"10.1145\/3014812.3014815"},{"issue":"4","key":"9612_CR43","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1039621.1039625","volume":"3","author":"L Zhang","year":"2004","unstructured":"Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. ACM Trans. Asian Lang. Inf. Process. (TALIP) 3(4), 243\u2013269 (2004)","journal-title":"ACM Trans. Asian Lang. Inf. Process. (TALIP)"},{"key":"9612_CR44","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.knosys.2014.03.015","volume":"64","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, S., Phillips, P., Ji, G.: Binary pso with mutation operator for feature selection using decision tree applied to spam detection. Knowl.-Based Syst. 64, 22\u201331 (2014)","journal-title":"Knowl.-Based Syst."}],"container-title":["Annals of Mathematics and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10472-018-9612-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-018-9612-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-018-9612-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T13:10:23Z","timestamp":1662729023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10472-018-9612-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["9612"],"URL":"https:\/\/doi.org\/10.1007\/s10472-018-9612-z","relation":{},"ISSN":["1012-2443","1573-7470"],"issn-type":[{"value":"1012-2443","type":"print"},{"value":"1573-7470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}