{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T13:26:46Z","timestamp":1769347606644,"version":"3.49.0"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16685-z","type":"journal-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T02:01:37Z","timestamp":1694484097000},"page":"29419-29454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["CIPF: Identifying fake profiles on social media using a CNN-based communal influence propagation framework"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4680-611X","authenticated-orcid":false,"given":"Arvind","family":"Mewada","sequence":"first","affiliation":[]},{"given":"Rupesh Kumar","family":"Dewang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"issue":"1","key":"16685_CR1","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd DM, Ellison NB (2007) Social network sites: Definition, history, and scholarship. J. Comput. Mediat. Commun 13(1):210\u2013230","journal-title":"J. Comput. Mediat. Commun"},{"issue":"5","key":"16685_CR2","doi-asserted-by":"crossref","first-page":"5516","DOI":"10.1007\/s11227-022-04881-x","volume":"79","author":"A Mewada","year":"2023","unstructured":"Mewada A, Dewang RK (2023) Sa-asba: A hybrid model for aspect-based sentiment analysis using synthetic attention in pre-trained language bert model with extreme gradient boosting. J Supercomput 79(5):5516\u20135551","journal-title":"J Supercomput"},{"key":"16685_CR3","unstructured":"Rezaul H, Naimul I, Mayisha T (2023) Amit Kumar Das Multi-class sentiment classification on bengali social media comments using machine learning. Int J Cogn Comput Eng"},{"key":"16685_CR4","doi-asserted-by":"crossref","unstructured":"Zhang Y, Shirakawa M, Hara T (2022) Predicting temporary deal success with social media timing signals. J Intell Inf Syst 1\u201319","DOI":"10.1007\/s10844-021-00681-6"},{"key":"16685_CR5","volume":"194","author":"H Songqiao","year":"2020","unstructured":"Songqiao H, Hailiang H, Yuqing T (2020) Knowledge of words: An interpretable approach for personality recognition from social media. Knowl Based Syst 194:105550","journal-title":"Knowl Based Syst"},{"key":"16685_CR6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.knosys.2019.02.009","volume":"172","author":"JI Pel\u00e1ez","year":"2019","unstructured":"Pel\u00e1ez JI, Mart\u00ednez EA, Vargas LG (2019) Decision making in social media with consistent data. Knowl Based Syst 172:33\u201341","journal-title":"Knowl Based Syst"},{"key":"16685_CR7","unstructured":"Dixon S (2023) Number of monthly active facebook users worldwide from 4th quarter 2008 to 1st quarter 2023 (in billions). https:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/, Online; Accessed 11 May 2023"},{"key":"16685_CR8","unstructured":"Wise J (2023) How many people use twitter? https:\/\/earthweb.com\/how-many-people-use-twitter\/ Online; Accessed 11 May 2023"},{"key":"16685_CR9","unstructured":"Bianchi T (2023) Most popular websites worldwide as of november 2022, by total visits(in billions). https:\/\/www.statista.com\/statistics\/1201880\/most-visited-websites-worldwide\/ Online; Accessed 11 May 2023"},{"issue":"9","key":"16685_CR10","first-page":"7530","volume":"34","author":"A Mewada","year":"2022","unstructured":"Mewada A, Dewang RK (2022) Research on false review detection methods: A state-of-the-art review. J King Saud Univ Comput Inf Sci 34(9):7530\u20137546","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"16685_CR11","volume":"60","author":"C Enrico","year":"2021","unstructured":"Enrico C, Antonino N, Domenico U, Luca V (2021) Investigating negative reviews and detecting negative influencers in yelp through a multi-dimensional social network based model. Int J Inf Manage 60:102377","journal-title":"Int J Inf Manage"},{"key":"16685_CR12","doi-asserted-by":"crossref","unstructured":"Mewada A, Dewang RK (2022) A comprehensive survey of various methods in opinion spam detection. Multimed Tools Appl 1\u201341","DOI":"10.1007\/s11042-022-13702-5"},{"key":"16685_CR13","doi-asserted-by":"crossref","unstructured":"Maity SK, Chakraborty A, Goyal P, Mukherjee A (2017) Detection of sockpuppets in social media. In: Companion of the 2017 ACM conference on computer supported cooperative work and social computing. pp. 243\u2013246","DOI":"10.1145\/3022198.3026360"},{"key":"16685_CR14","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.knosys.2018.03.002","volume":"149","author":"Z Yamak","year":"2018","unstructured":"Yamak Z, Saunier J, Vercouter L (2018) Sockscatch: Automatic detection and grouping of sockpuppets in social media. Knowl Based Syst 149:124\u2013142","journal-title":"Knowl Based Syst"},{"key":"16685_CR15","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ins.2017.12.004","volume":"432","author":"H-J Kim","year":"2018","unstructured":"Kim H-J, Lee J, Chae D-K, Kim S-W (2018) Crowdsourced promotions in doubt: Analyzing effective crowdsourced promotions. Inf Sci 432:185\u2013198","journal-title":"Inf Sci"},{"key":"16685_CR16","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.105522","volume":"194","author":"J Jiang","year":"2020","unstructured":"Jiang J, Zhou Y, Jiang Y, Bu Z, Cao J (2020) Batch allocation for decomposition-based complex task crowdsourcing e-markets in social networks. Knowl Based Syst 194:105522","journal-title":"Knowl Based Syst"},{"key":"16685_CR17","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.knosys.2018.07.010","volume":"159","author":"J Song","year":"2018","unstructured":"Song J, Wang H, Gao Y, An B (2018) Active learning with confidence-based answers for crowdsourcing labeling tasks. Knowl Based Syst 159:244\u2013258","journal-title":"Knowl Based Syst"},{"key":"16685_CR18","doi-asserted-by":"crossref","unstructured":"Sowmya P, Chatterjee M (2020) Detection of fake and clone accounts in twitter using classification and distance measure algorithms. In: 2020 international conference on communication and signal processing (ICCSP). IEEE pp. 0067\u20130070","DOI":"10.1109\/ICCSP48568.2020.9182353"},{"key":"16685_CR19","doi-asserted-by":"crossref","first-page":"6540","DOI":"10.1109\/ACCESS.2018.2796018","volume":"6","author":"E Van Der Walt","year":"2018","unstructured":"Van Der Walt E, Eloff J (2018) Using machine learning to detect fake identities: bots vs humans. IEEE Access 6:6540\u20136549","journal-title":"IEEE Access"},{"key":"16685_CR20","doi-asserted-by":"crossref","first-page":"213154","DOI":"10.1109\/ACCESS.2020.3040604","volume":"8","author":"G Sansonetti","year":"2020","unstructured":"Sansonetti G, Gasparetti F, Daniello G, Micarelli A (2020) Unreliable users detection in social media: deep learning techniques for automatic detection. IEEE Access 8:213154\u2013213167","journal-title":"IEEE Access"},{"key":"16685_CR21","doi-asserted-by":"crossref","first-page":"4211","DOI":"10.1109\/TIFS.2021.3102498","volume":"16","author":"M Fazil","year":"2021","unstructured":"Fazil M, Sah AK, Abulaish M (2021) Deepsbd: a deep neural network model with attention mechanism for socialbot detection. IEEE Trans Inf Forensics Secur 16:4211\u20134223","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16685_CR22","unstructured":"Mello JP Jr (2023) A third of us social media users creating fake accounts. https:\/\/www.technewsworld.com\/story\/a-third-of-us-social-media-users-creating-fake-accounts-176987.html Accessed: 11 May 2023"},{"key":"16685_CR23","doi-asserted-by":"crossref","unstructured":"Rout JK, Sahoo KS, Dalmia A, Bakshi S, Bilal M, Song H (2023) Understanding large-scale network effects in detecting review spammers. IEEE Trans Comput Soc Syst","DOI":"10.1109\/TCSS.2023.3243139"},{"key":"16685_CR24","doi-asserted-by":"crossref","unstructured":"Sakib MN, Spezzano F (2022) Automated detection of sockpuppet accounts in wikipedia. In: 2022 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE pp 155\u2013158","DOI":"10.1109\/ASONAM55673.2022.10068604"},{"key":"16685_CR25","doi-asserted-by":"crossref","unstructured":"Yu H, Hu F, Liu L, Li Z, Li X, Lin Z (2021) Sockpuppet detection in social network based on adaptive multi-source features. In: Modern industrial IoT, big data and supply chain: proceedings of the IIoTBDSC 2020. Springer pp 187\u2013194","DOI":"10.1007\/978-981-33-6141-6_19"},{"key":"16685_CR26","doi-asserted-by":"crossref","unstructured":"Li J, Hu J, Zhang P, Yang L (2023) Exposing collaborative spammer groups through the review-response graph. Multimed Tools Appl 1\u201314","DOI":"10.1007\/s11042-023-14650-4"},{"key":"16685_CR27","volume":"216","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Zhou M, Wan J, Lu K, Chen G, Liao H (2023) Spammer detection via ranking aggregation of group behavior. Expert Syst Appl 216:119454","journal-title":"Expert Syst Appl"},{"issue":"3","key":"16685_CR28","volume":"60","author":"F Zhang","year":"2023","unstructured":"Zhang F, Wu J, Zhang P, Ma R, Yu H (2023) Detecting collusive spammers with heterogeneous graph attention network. Inf Process Manag 60(3):103282","journal-title":"Inf Process Manag"},{"key":"16685_CR29","doi-asserted-by":"crossref","unstructured":"Balakrishna V, Bag S, Sarkar S (2022) Identifying spammer groups in consumer reviews using meta-data via bipartite graph approach. In: 2022 international conference on data analytics for business and industry (ICDABI). IEEE pp 650\u2013654","DOI":"10.1109\/ICDABI56818.2022.10041687"},{"key":"16685_CR30","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. pp. 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"16685_CR31","doi-asserted-by":"crossref","unstructured":"Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining. pp 420\u2013429","DOI":"10.1145\/1281192.1281239"},{"key":"16685_CR32","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"16685_CR33","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE international conference on data mining. IEEE pp. 88\u201397","DOI":"10.1109\/ICDM.2010.118"},{"key":"16685_CR34","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LVS (2011) Simpath: An efficient algorithm for influence maximization under the linear threshold model. In: 2011 IEEE 11th international conference on data mining. IEEE pp. 211\u2013220","DOI":"10.1109\/ICDM.2011.132"},{"key":"16685_CR35","doi-asserted-by":"crossref","unstructured":"Jung K, Heo W, Chen W (2012) Irie: Scalable and robust influence maximization in social networks. In: 2012 IEEE 12th international conference on data mining. IEEE pp. 918\u2013923","DOI":"10.1109\/ICDM.2012.79"},{"key":"16685_CR36","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.eswa.2018.05.001","volume":"108","author":"A Zareie","year":"2018","unstructured":"Zareie A, Sheikhahmadi A, Khamforoosh K (2018) Influence maximization in social networks based on topsis. Expert Syst Appl 108:96\u2013107","journal-title":"Expert Syst Appl"},{"key":"16685_CR37","volume":"169","author":"W Li","year":"2021","unstructured":"Li W, Zhong K, Wang J, Chen D (2021) A dynamic algorithm based on cohesive entropy for influence maximization in social networks. Expert Syst Appl 169:114207","journal-title":"Expert Syst Appl"},{"key":"16685_CR38","doi-asserted-by":"crossref","unstructured":"Cao B, Kong X, PS Yu (2014) Collective prediction of multiple types of links in heterogeneous information networks. In: 2014 IEEE international conference on data mining. IEEE pp. 50\u201359","DOI":"10.1109\/ICDM.2014.25"},{"key":"16685_CR39","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.eswa.2019.01.044","volume":"123","author":"Y Du","year":"2019","unstructured":"Du Y, Guo W, Liu J, Yao C (2019) Classification by multi-semantic meta path and active weight learning in heterogeneous information networks. Expert Syst Appl 123:227\u2013236","journal-title":"Expert Syst Appl"},{"issue":"5","key":"16685_CR40","first-page":"1960","volume":"33","author":"Y Xiong","year":"2019","unstructured":"Xiong Y, Zhang Y, Kong X, Chen H, Zhu Y (2019) Graphinception: Convolutional neural networks for collective classification in heterogeneous information networks. IEEE Trans Knowl Data Eng 33(5):1960\u20131972","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"16685_CR41","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118702","volume":"212","author":"C Dong","year":"2023","unstructured":"Dong C, Xu G, Yang P, Meng L (2023) Tsifim: A three-stage iterative framework for influence maximization in complex networks. Expert Syst Appl 212:118702","journal-title":"Expert Syst Appl"},{"key":"16685_CR42","doi-asserted-by":"crossref","first-page":"132631","DOI":"10.1109\/ACCESS.2021.3115605","volume":"9","author":"D Liu","year":"2021","unstructured":"Liu D, Li L (2021) A label propagation based node clustering algorithm in heterogeneous information networks. IEEE Access 9:132631\u2013132640","journal-title":"IEEE Access"},{"key":"16685_CR43","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105458","volume":"194","author":"S Zhou","year":"2020","unstructured":"Zhou S, Bu J, Zhang Z, Wang C, Ma L, Zhang J (2020) Cross multi-type objects clustering in attributed heterogeneous information network. Knowl Based Syst 194:105458","journal-title":"Knowl Based Syst"},{"key":"16685_CR44","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s10618-019-00626-2","volume":"33","author":"J-P Mei","year":"2019","unstructured":"Mei J-P, Lv H, Yang L, Li Y (2019) Clustering for heterogeneous information networks with extended star-structure. Data Mining Knowl Disc 33:1059\u20131087","journal-title":"Data Mining Knowl Disc"},{"issue":"2","key":"16685_CR45","volume":"60","author":"M Xie","year":"2023","unstructured":"Xie M, Zhan X-X, Liu C, Zhang Z-K (2023) An efficient adaptive degree-based heuristic algorithm for influence maximization in hypergraphs. Inf Process Manag 60(2):103161","journal-title":"Inf Process Manag"},{"key":"16685_CR46","doi-asserted-by":"crossref","unstructured":"Li C-T, Lin S-D, Shan M-K (2012) Influence propagation and maximization for heterogeneous social networks. In: Proceedings of the 21st international conference on world wide web. pp. 559\u2013560","DOI":"10.1145\/2187980.2188126"},{"key":"16685_CR47","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s10618-012-0252-3","volume":"25","author":"L Liu","year":"2012","unstructured":"Liu L, Tang J, Han J, Yang S (2012) Learning influence from heterogeneous social networks. Data Min Knowl Discov 25:511\u2013544","journal-title":"Data Min Knowl Discov"},{"key":"16685_CR48","doi-asserted-by":"crossref","unstructured":"Wang Y, Huang H, Feng C, Yang X (2015) A co-ranking framework to select optimal seed set for influence maximization in heterogeneous network. In: Web technologies and applications: 17th asia-pacific web conference, APWeb 2015, Guangzhou, China, September 18-20, 2015, Proceedings 17. Springer pp. 141\u2013153","DOI":"10.1007\/978-3-319-25255-1_12"},{"key":"16685_CR49","doi-asserted-by":"crossref","unstructured":"Yang Y, Zhou L, Jin Z, Yang J (2019) Meta path-based information entropy for modeling social influence in heterogeneous information networks. In: 2019 20th IEEE international conference on mobile data management (MDM). IEEE pp. 557\u2013562","DOI":"10.1109\/MDM.2019.00119"},{"key":"16685_CR50","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113580","volume":"160","author":"S Molaei","year":"2020","unstructured":"Molaei S, Farahbakhsh R, Salehi M, Crespi N (2020) Identifying influential nodes in heterogeneous networks. Expert Syst Appl 160:113580","journal-title":"Expert Syst Appl"},{"key":"16685_CR51","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2019.112905","volume":"140","author":"MM Keikha","year":"2020","unstructured":"Keikha MM, Rahgozar M, Asadpour M, Abdollahi MF (2020) Influence maximization across heterogeneous interconnected networks based on deep learning. Expert Syst Appl 140:112905","journal-title":"Expert Syst Appl"},{"issue":"3","key":"16685_CR52","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1007\/s12083-022-01309-4","volume":"15","author":"J Wu","year":"2022","unstructured":"Wu J, Xia J, Gou F (2022) Information transmission mode and iot community reconstruction based on user influence in opportunistic social networks. Peer-to-Peer Netw Appl 15(3):1398\u20131416","journal-title":"Peer-to-Peer Netw Appl"},{"key":"16685_CR53","doi-asserted-by":"crossref","unstructured":"Beni HA, Bouyer A, Azimi S, Rouhi A, Arasteh B (2023) A fast module identification and filtering approach for influence maximization problem in social networks. Inf Sci 119105","DOI":"10.1016\/j.ins.2023.119105"},{"key":"16685_CR54","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.neucom.2018.02.023","volume":"289","author":"A Tommasel","year":"2018","unstructured":"Tommasel A, Godoy D (2018) Multi-view community detection with heterogeneous information from social media data. Neurocomputing 289:195\u2013219","journal-title":"Neurocomputing"},{"key":"16685_CR55","doi-asserted-by":"crossref","unstructured":"Hanteer O, Rossi L, D\u2019aurelio DV, Magnani M (2018) From interaction to participation: The role of the imagined audience in social media community detection and an application to political communication on twitter. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE pp. 531\u2013534","DOI":"10.1109\/ASONAM.2018.8508575"},{"key":"16685_CR56","doi-asserted-by":"crossref","first-page":"24660","DOI":"10.1109\/ACCESS.2018.2815904","volume":"6","author":"F Wang","year":"2018","unstructured":"Wang F, Orton K, Wagenseller P, Xu K (2018) Towards understanding community interests with topic modeling. IEEE Access 6:24660\u201324668","journal-title":"IEEE Access"},{"key":"16685_CR57","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.11.026","volume":"94","author":"A Singh","year":"2019","unstructured":"Singh A, Garg S, Batra S, Kumar N (2019) Probabilistic data structure-based community detection and storage scheme in online social networks. Future Gener Comput Syst 94:173\u2013184","journal-title":"Future Gener Comput Syst"},{"key":"16685_CR58","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.123590","volume":"545","author":"A Ahmad","year":"2020","unstructured":"Ahmad A, Ahmad T, Bhatt A (2020) Hwsmcb: A community-based hybrid approach for identifying influential nodes in the social network. Phys A Stat Mech Appl 545:123590","journal-title":"Phys A Stat Mech Appl"},{"key":"16685_CR59","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.procs.2019.09.184","volume":"159","author":"S Guesmi","year":"2019","unstructured":"Guesmi S, Trabelsi C, Latiri C (2019) Community detection in multi-relational social networks based on relational concept analysis. Procedia Comput Sci 159:291\u2013300","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"16685_CR60","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1109\/JSYST.2021.3117815","volume":"16","author":"N-L Nguyen","year":"2021","unstructured":"Nguyen N-L, Wang M-H, Dow C-R (2021) Learning to recognize sockpuppets in online political discussions. IEEE Syst J 16(2):1873\u20131884","journal-title":"IEEE Syst J"},{"key":"16685_CR61","doi-asserted-by":"crossref","unstructured":"Liu Y-H, Kuo C-Y (2023) Simaim: identifying sockpuppets and puppetmasters on a single forum-oriented social media site. J Supercomp 1\u201332","DOI":"10.1007\/s11227-023-05376-z"},{"key":"16685_CR62","doi-asserted-by":"crossref","first-page":"3074","DOI":"10.1109\/TMM.2021.3092571","volume":"24","author":"X Zhu","year":"2021","unstructured":"Zhu X, Guo K, Fang H, Chen L, Ren S, Hu B (2021) Cross view capture for stereo image super-resolution. IEEE Trans Multimed 24:3074\u20133086","journal-title":"IEEE Trans Multimed"},{"key":"16685_CR63","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.compeleceng.2019.03.003","volume":"76","author":"SR Sahoo","year":"2019","unstructured":"Sahoo SR, Gupta BB (2019) Hybrid approach for detection of malicious profiles in twitter. Comput Elect Eng 76:65\u201381","journal-title":"Comput Elect Eng"},{"key":"16685_CR64","doi-asserted-by":"crossref","unstructured":"Cresci S, Di\u00a0Pietro R, Petrocchi M, Spognardi A, Tesconi M (2017) The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In: Proceedings of the 26th international conference on world wide web companion. pp. 963\u2013972","DOI":"10.1145\/3041021.3055135"},{"key":"16685_CR65","doi-asserted-by":"crossref","first-page":"91192","DOI":"10.1109\/ACCESS.2022.3171846","volume":"10","author":"H Shen","year":"2022","unstructured":"Shen H, Wang B, Liu X, Zhang X (2022) Social spammer detection via convex nonnegative matrix factorization. IEEE Access 10:91192\u201391202","journal-title":"IEEE Access"},{"key":"16685_CR66","volume":"222","author":"C Zhang","year":"2022","unstructured":"Zhang C, Hu D, Yang T (2022) Anomaly detection and diagnosis for wind turbines using long short-term memory-based stacked denoising autoencoders and xgboost. Reliab Eng Syst Saf 222:108445","journal-title":"Reliab Eng Syst Saf"},{"key":"16685_CR67","volume":"191","author":"T Wang","year":"2022","unstructured":"Wang T, Liu R, Qi G (2022) Multi-classification assessment of bank personal credit risk based on multi-source information fusion. Expert Syst Appl 191:116236","journal-title":"Expert Syst Appl"},{"issue":"1","key":"16685_CR68","doi-asserted-by":"crossref","first-page":"12458","DOI":"10.1038\/s41598-022-16576-7","volume":"12","author":"S Liu","year":"2022","unstructured":"Liu S, Li X, Hu C, Yao J, Han X, Wang J (2022) Spammer detection using multi-classifier information fusion based on evidential reasoning rule. Sci Rep 12(1):12458","journal-title":"Sci Rep"},{"key":"16685_CR69","doi-asserted-by":"crossref","unstructured":"Concone F, Re GL, Morana M, Das SK (2022) Spade: Multi-stage spam account detection for online social networks. IEEE Trans Depend Secure Comp","DOI":"10.1109\/TDSC.2022.3198830"},{"key":"16685_CR70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/6356152","volume":"2022","author":"B Prabhu Kavin","year":"2022","unstructured":"Prabhu Kavin B, Karki S, Hemalatha S, Singh D, Vijayalakshmi R, Thangamani M, Haleem SLA, Jose D, Tirth V, Kshirsagar PR et al (2022) Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks. Wirel Commun Mob Comput 2022:1\u201310","journal-title":"Wirel Commun Mob Comput"},{"key":"16685_CR71","doi-asserted-by":"crossref","unstructured":"Borkar BS, Patil DR, Markad AV, Sharma M (2022) Real or fake identity deception of social media accounts using recurrent neural network. In: 2022 international conference on fourth industrial revolution based technology and practices (ICFIRTP). IEEE pp. 80\u201384","DOI":"10.1109\/ICFIRTP56122.2022.10059430"},{"issue":"23","key":"16685_CR72","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"Mark EJ Newman","year":"2006","unstructured":"Newman Mark EJ (2006) Modularity and community structure in networks. Proc Nat Acad Sci 103(23):8577\u20138582","journal-title":"Proc Nat Acad Sci"},{"key":"16685_CR73","volume":"221","author":"D Li","year":"2021","unstructured":"Li D, Zhong X, Dou Z, Gong M, Ma X (2021) Detecting dynamic community by fusing network embedding and nonnegative matrix factorization. Knowl Based Syst 221:106961","journal-title":"Knowl Based Syst"},{"key":"16685_CR74","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.physa.2017.10.018","volume":"492","author":"M Jebabli","year":"2018","unstructured":"Jebabli M, Cherifi H, Cherifi C, Hamouda A (2018) Community detection algorithm evaluation with ground-truth data. Phys A Stat Mech Appl 492:651\u2013706","journal-title":"Phys A Stat Mech Appl"},{"key":"16685_CR75","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.ins.2021.07.072","volume":"576","author":"G Xu","year":"2021","unstructured":"Xu G, Hu M, Ma C (2021) Secure and smart autonomous multi-robot systems for opinion spammer detection. Inf Sci 576:681\u2013693","journal-title":"Inf Sci"},{"key":"16685_CR76","doi-asserted-by":"crossref","first-page":"109646","DOI":"10.1109\/ACCESS.2019.2930474","volume":"7","author":"M Tang","year":"2019","unstructured":"Tang M, Liu Q, Ma T, Cao J, Tian Y, Al-Dhelaan A, Al-Dhelaan M (2019) k-lowest-influence overlapping nodes based community detection in complex networks. IEEE Access 7:109646\u2013109661","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16685-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16685-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16685-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T08:24:01Z","timestamp":1709799841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16685-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":76,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16685"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16685-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,12]]},"assertion":[{"value":"13 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}