{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T08:00:16Z","timestamp":1770019216029,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2020YFG0076"],"award-info":[{"award-number":["2020YFG0076"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-022-13633-1","type":"journal-article","created":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T02:03:33Z","timestamp":1663293813000},"page":"9891-9912","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Semi-supervised internet water army detection based on graph embedding"],"prefix":"10.1007","volume":"82","author":[{"given":"Ying","family":"He","sequence":"first","affiliation":[]},{"given":"Pin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pengsen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,16]]},"reference":[{"issue":"7","key":"13633_CR1","doi-asserted-by":"publisher","first-page":"4802","DOI":"10.1007\/s11227-018-2641-x","volume":"76","author":"KS Adewole","year":"2020","unstructured":"Adewole KS, Han T, Wu W, Song H, Sangaiah AK (2020) Twitter spam account detection based on clustering and classification methods. J Supercomput 76(7):4802","journal-title":"J Supercomput"},{"key":"13633_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal A, Rajadesingan A, Kumaraguru P (2012) Phishari:, Automatic realtime phishing detection on twitter. In: 2012 eCrime Researchers Summit (IEEE), pp 1\u201312","DOI":"10.1109\/eCrime.2012.6489521"},{"issue":"10-11","key":"13633_CR3","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.comcom.2013.04.004","volume":"36","author":"F Ahmed","year":"2013","unstructured":"Ahmed F, Abulaish M (2013) A generic statistical approach for spam detection in online social networks. Comput Commun 36(10-11):1120","journal-title":"Comput Commun"},{"key":"13633_CR4","doi-asserted-by":"crossref","unstructured":"Al-Thelaya KA, Al-Nethary TS, Ramadan EY (2020) Social networks spam detection using graph-based features analysis and sequence of interactions between users. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (IEEE), pp 206\u2013211","DOI":"10.1109\/ICIoT48696.2020.9089509"},{"key":"13633_CR5","doi-asserted-by":"crossref","unstructured":"Ali Alhosseini S, Bin Tareaf R, Najafi P, Meinel C (2019) Detect me if you can:, Spam bot detection using inductive representation learning. In: Companion Proceedings of The 2019 World Wide Web Conference, pp 148\u2013153","DOI":"10.1145\/3308560.3316504"},{"issue":"5","key":"13633_CR6","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10207-016-0321-5","volume":"15","author":"A Almaatouq","year":"2016","unstructured":"Almaatouq A, Shmueli E, Nouh M, Alabdulkareem A, Singh VK, Alsaleh M, Alarifi A, Alfaris A, et al. (2016) If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int J Inf Secur 15(5):475","journal-title":"Int J Inf Secur"},{"key":"13633_CR7","doi-asserted-by":"crossref","unstructured":"Benevenuto F, Rodrigues T, Almeida V, Almeida J, Gon\u010balves M. (2009) Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, pp 620\u2013627","DOI":"10.1145\/1571941.1572047"},{"key":"13633_CR8","doi-asserted-by":"crossref","unstructured":"Bhat SY, Abulaish M (2013) Community-based features for identifying spammers in online social networks. In: 2013 IEEE\/ACM International conference on advances in social networks analysis and mining (ASONAM 2013) (IEEE), pp 100\u2013107","DOI":"10.1145\/2492517.2492567"},{"issue":"3","key":"13633_CR9","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10844-017-0494-z","volume":"51","author":"P Bindu","year":"2018","unstructured":"Bindu P, Mishra R, Thilagam PS (2018) Discovering spammer communities in twitter. J Intell Inf Syst 51(3):503","journal-title":"J Intell Inf Syst"},{"issue":"9","key":"13633_CR10","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai H, Zheng VW, Chang KCC (2018) A comprehensive survey of graph embedding: Problems, techniques, and applications. IEEE Trans Knowl Data Eng 30(9):1616","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"13633_CR11","unstructured":"Cao Q, Sirivianos M, Yang X, Pregueiro T (2012) Aiding the detection of fake accounts in large scale social online services. In: Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI}, 12), pp 197\u2013210"},{"key":"13633_CR12","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"13633_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.inffus.2017.11.002","volume":"44","author":"H Chen","year":"2018","unstructured":"Chen H, Liu J, Lv Y, Li MH, Liu M, Zheng Q (2018) Semi-supervised clue fusion for spammer detection in sina weibo. Infor Fusion 44:22","journal-title":"Infor Fusion"},{"key":"13633_CR14","doi-asserted-by":"crossref","unstructured":"Chen C, Wu K, Srinivasan V, Zhang X (2013) Battling the internet water army:, Detection of hidden paid posters. In: 2013 IEEE\/ACM International conference on advances in social networks analysis and mining (ASONAM 2013) (IEEE), pp 116\u2013120","DOI":"10.1145\/2492517.2492637"},{"issue":"6","key":"13633_CR15","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: are you a human, bot, or cyborg?. IEEE Trans Dependable Secure Comput 9(6):811","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"13633_CR16","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIS.2016.29","volume":"31","author":"S Cresci","year":"2016","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2016) Dna-inspired online behavioral modeling and its application to spambot detection. IEEE Intell Syst 31(5):58","journal-title":"IEEE Intell Syst"},{"issue":"11","key":"13633_CR17","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","volume":"13","author":"M Fazil","year":"2018","unstructured":"Fazil M, Abulaish M (2018) A hybrid approach for detecting automated spammers in twitter. IEEE Trans Inf Forensics Secur 13(11):2707","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"13633_CR18","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s13278-014-0194-4","volume":"4","author":"M Fire","year":"2014","unstructured":"Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? fake profile identification in online social networks. Soc Netw Anal Min 4(1):194","journal-title":"Soc Netw Anal Min"},{"issue":"6","key":"13633_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3086637","volume":"8","author":"H Fu","year":"2017","unstructured":"Fu H, Xie X, Rui Y, Gong NZ, Sun G, Chen E (2017) Robust spammer detection in microblogs: Leveraging user carefulness. ACM Trans Intell Syst Technol 8(6):1","journal-title":"ACM Trans Intell Syst Technol"},{"key":"13633_CR20","unstructured":"Goldberg Y, Levy O (2014) word2vec explained:, deriving mikolov et al.\u2019s negative-sampling word-embedding method arXiv:1402.3722"},{"key":"13633_CR21","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","volume":"151","author":"P Goyal","year":"2018","unstructured":"Goyal P, Ferrara E (2018) Graph embedding techniques, applications, and performance: a survey. Knowl-Based Syst 151:78","journal-title":"Knowl-Based Syst"},{"key":"13633_CR22","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"13633_CR23","doi-asserted-by":"crossref","unstructured":"Guo Z, Wang L, Wang Y, Zeng G, Liu S, De Melo G (2018) Public opinion spamming: a model for content and users on sina weibo. In: Proceedings of the 10th ACM Conference on Web Science, pp 210\u2013214","DOI":"10.1145\/3201064.3201104"},{"key":"13633_CR24","doi-asserted-by":"crossref","unstructured":"Harsule SR, Nighot MK (2016) In Innovations in Computer Science and Engineering (Springer), pp 21\u201328","DOI":"10.1007\/978-981-10-0419-3_3"},{"key":"13633_CR25","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.ins.2016.07.033","volume":"369","author":"S Jeong","year":"2016","unstructured":"Jeong S, Noh G, Oh H, Kim CK (2016) Follow spam detection based on cascaded social information. Inf Sci 369:481","journal-title":"Inf Sci"},{"key":"13633_CR26","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks, arXiv:1609.02907"},{"key":"13633_CR27","doi-asserted-by":"crossref","unstructured":"Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp 435\u2013442","DOI":"10.1145\/1835449.1835522"},{"key":"13633_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2014.08.006","volume":"54","author":"S Lee","year":"2014","unstructured":"Lee S, Kim J (2014) Early filtering of ephemeral malicious accounts on twitter. Comput Commun 54:48","journal-title":"Comput Commun"},{"key":"13633_CR29","doi-asserted-by":"publisher","first-page":"55108","DOI":"10.1109\/ACCESS.2019.2913005","volume":"7","author":"Y Lian","year":"2019","unstructured":"Lian Y, Dong X, Chi Y, Tang X, Liu Y (2019) An internet water army detection supernetwork model. IEEE Access 7:55108","journal-title":"IEEE Access"},{"key":"13633_CR30","doi-asserted-by":"crossref","unstructured":"Lim EP, Nguyen VA, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on Information and knowledge management, pp 939\u2013948","DOI":"10.1145\/1871437.1871557"},{"key":"13633_CR31","doi-asserted-by":"crossref","unstructured":"Lin C, He J, Zhou Y, Yang X, Chen K, Song L (2013) Analysis and identification of spamming behaviors in sina weibo microblog. In: Proceedings of the 7th Workshop on social network mining and analysis, pp 1\u20139","DOI":"10.1145\/2501025.2501035"},{"key":"13633_CR32","doi-asserted-by":"crossref","unstructured":"Liu D, Mei B, Chen J, Lu Z, Du X (2015) Community based spammer detection in social networks. In: International conference on Web-Age information management (Springer), pp 554\u2013558","DOI":"10.1007\/978-3-319-21042-1_61"},{"issue":"8","key":"13633_CR33","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992","journal-title":"Expert Syst Appl"},{"key":"13633_CR34","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64","journal-title":"Inf Sci"},{"issue":"1","key":"13633_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal M (2005) Random forest classifier for remote sensing classification. Int J Remote Sens 26(1):217","journal-title":"Int J Remote Sens"},{"key":"13633_CR36","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"13633_CR37","doi-asserted-by":"publisher","first-page":"101715","DOI":"10.1016\/j.cose.2020.101715","volume":"91","author":"J Rodr\u00edguez-Ruiz","year":"2020","unstructured":"Rodr\u00edguez-Ruiz J, Mata-S\u00e1nchez JI, Monroy R, Loyola-Gonz\u00e1lez O, L\u00f3pez-Cuevas A (2020) A one-class classification approach for bot detection on twitter. Comput Secur 91:101715","journal-title":"Comput Secur"},{"key":"13633_CR38","doi-asserted-by":"crossref","unstructured":"Rout RR, Lingam G, Somayajulu D (2020) Detection of malicious social bots using learning automata with url features in twitter network, IEEE Transactions on Computational Social Systems","DOI":"10.1109\/TCSS.2020.2992223"},{"key":"13633_CR39","unstructured":"Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A bayesian approach to filtering junk e-mail. In: Learning for Text Categorization: Papers from the 1998 workshop, (Madison, Wisconsin), vol 62, pp 98\u2013105"},{"key":"13633_CR40","doi-asserted-by":"crossref","unstructured":"Singh M, Bansal D, Sofat S (2014) Detecting malicious users in twitter using classifiers. In: proceedings of the 7th International conference on security of information and networks, pp 247\u2013253","DOI":"10.1145\/2659651.2659736"},{"key":"13633_CR41","doi-asserted-by":"crossref","unstructured":"Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the 4th workshop on social network systems, pp 1\u20138","DOI":"10.1145\/1989656.1989664"},{"key":"13633_CR42","doi-asserted-by":"crossref","unstructured":"Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference, pp 1\u20139","DOI":"10.1145\/1920261.1920263"},{"issue":"1","key":"13633_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-019-56847-4","volume":"10","author":"W Wang","year":"2020","unstructured":"Wang W, Chen X, Jiang S, Wang H, Yin M, Wang P (2020) Exploring the construction and infiltration strategies of social bots in sina microblog. Sci Rep 10(1):1","journal-title":"Sci Rep"},{"key":"13633_CR44","unstructured":"Wang G, Mohanlal M, Wilson C, Wang X, Metzger M, Zheng H, Zhao BY (2012) Social turing tests:, Crowdsourcing sybil detection, arXiv:1205.3856"},{"key":"13633_CR45","doi-asserted-by":"crossref","unstructured":"Wang K, Xiao Y, Xiao Z (2014) Detection of internet water army in social network. In: 2014 International Conference on Computer, Communications and Information Technology (CCIT 2014) (Atlantis Press)","DOI":"10.2991\/ccit-14.2014.50"},{"issue":"2","key":"13633_CR46","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/21642583.2019.1620658","volume":"7","author":"J Wang","year":"2019","unstructured":"Wang J, Xu J, Zhao C, Peng Y, Wang H (2019) An ensemble feature selection method for high-dimensional data based on sort aggregation. Syst Sci Control 7(2):32","journal-title":"Syst Sci Control"},{"issue":"4","key":"13633_CR47","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TDSC.2015.2410792","volume":"13","author":"Z Yang","year":"2015","unstructured":"Yang Z, Xue J, Yang X, Wang X, Dai Y (2015) Votetrust: Leveraging friend invitation graph to defend against social network sybils. IEEE Trans Dependable Secure Comput 13(4):488","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"13633_CR48","doi-asserted-by":"crossref","first-page":"9858","DOI":"10.3182\/20140824-6-ZA-1003.01402","volume":"47","author":"K Zeng","year":"2014","unstructured":"Zeng K, Wang X, Zhang Q, Zhang X, Wang FY (2014) Behavior modeling of internet water army in online forums. IFAC Proceedings 47 (3):9858","journal-title":"IFAC Proceedings"},{"issue":"11","key":"13633_CR49","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/TKDE.2005.186","volume":"17","author":"ZH Zhou","year":"2005","unstructured":"Zhou ZH, Li M (2005) Tri-training: Exploiting unlabeled data using three classifiers. IEEE Trans Knowl Data Eng 17(11):1529","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13633-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13633-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13633-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T23:34:14Z","timestamp":1727998454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13633-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,16]]},"references-count":49,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["13633"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13633-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,16]]},"assertion":[{"value":"20 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}