{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:17:32Z","timestamp":1775067452195,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T00:00:00Z","timestamp":1564444800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T00:00:00Z","timestamp":1564444800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11227-019-02948-w","type":"journal-article","created":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T11:02:47Z","timestamp":1564484567000},"page":"6085-6105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9509-6943","authenticated-orcid":false,"given":"M.","family":"BalaAnand","sequence":"first","affiliation":[]},{"given":"N.","family":"Karthikeyan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Karthik","sequence":"additional","affiliation":[]},{"given":"R.","family":"Varatharajan","sequence":"additional","affiliation":[]},{"given":"Gunasekaran","family":"Manogaran","sequence":"additional","affiliation":[]},{"given":"C. B.","family":"Sivaparthipan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,30]]},"reference":[{"issue":"3","key":"2948_CR1","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.bushor.2011.01.007","volume":"54","author":"R Hanna","year":"2011","unstructured":"Hanna R, Rohm A, Crittenden VL (2011) We\u2019re all connected: the power of the social media ecosystem. Bus Horiz 54(3):265\u2013273","journal-title":"Bus Horiz"},{"issue":"4","key":"2948_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1924421.1924442","volume":"54","author":"A Doan","year":"2011","unstructured":"Doan A, Ramakrishnan R, Halevy AY (2011) Crowdsourcing systems on the World-Wide Web. Commun ACM 54(4):86\u201396","journal-title":"Commun ACM"},{"key":"2948_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.comcom.2015.07.007","volume":"73","author":"Y Ding","year":"2016","unstructured":"Ding Y, Yan S, Zhang Y, Dai W, Dong L (2016) Predicting the attributes of social network users using a graph-based machine learning method. Comput Commun 73:3\u201311","journal-title":"Comput Commun"},{"issue":"2","key":"2948_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s12927-012-0008-z","volume":"4","author":"K Krombholz","year":"2012","unstructured":"Krombholz K, Merkl D, Weippl E (2012) Fake identities in social media: a case study on the sustainability of the Facebook business model. J Serv Sci Res 4(2):175\u2013212","journal-title":"J Serv Sci Res"},{"issue":"6","key":"2948_CR5","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of Twitter accounts: are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811\u2013824","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2948_CR6","doi-asserted-by":"crossref","unstructured":"Gilani Z, Farahbakhsh R, Tyson G, Wang L, Crowcroft J (2017) Of bots and humans (on Twitter), In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp 349\u2013354. ACM","DOI":"10.1145\/3110025.3110090"},{"key":"2948_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.cose.2017.08.014","volume":"72","author":"F Qiang","year":"2018","unstructured":"Qiang F, Feng B, Guo D, Li Q (2018) Combating the evolving spammers in online social networks. Comput Secur 72:60\u201373","journal-title":"Comput Secur"},{"issue":"8","key":"2948_CR8","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang C, Harkreader R, Guofei G (2013) Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans Inf Forensics Secur 8(8):1280\u20131293","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2948_CR9","doi-asserted-by":"crossref","unstructured":"Aggarwal A, Rajadesingan A, Kumaraguru P (2012) PhishAri: Automatic Realtime Phishing Detection on Twitter, eCrime Researchers Summit (eCrime), 2012, pp 1\u201312, IEEE","DOI":"10.1109\/eCrime.2012.6489521"},{"issue":"2","key":"2948_CR10","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.comnet.2012.07.016","volume":"57","author":"G Yan","year":"2013","unstructured":"Yan G (2013) Peri-Watchdog: hunting for hidden botnets in the periphery of online social networks. Comput Netw 57(2):540\u2013555","journal-title":"Comput Netw"},{"key":"2948_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.sbspro.2016.12.003","volume":"236","author":"Y Drevs","year":"2016","unstructured":"Drevs Y, Svodtsev A (2016) Formalization of criteria for social bots detection systems. Procedia-Soc Behav Sci 236:9\u201313","journal-title":"Procedia-Soc Behav Sci"},{"issue":"1","key":"2948_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13278-015-0289-6","volume":"5","author":"A Farasat","year":"2015","unstructured":"Farasat A, Nikolaev A, Srihari NS, Blair RH (2015) Probabilistic graphical models in modern social network analysis. Soc Netw Anal Min 5(1):5\u201362","journal-title":"Soc Netw Anal Min"},{"key":"2948_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","volume":"65","author":"D Ramalingam","year":"2017","unstructured":"Ramalingam D, Chinnaiah V (2017) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65:165\u2013177","journal-title":"Comput Electr Eng"},{"key":"2948_CR14","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.cose.2016.05.005","volume":"61","author":"Y Boshmaf","year":"2016","unstructured":"Boshmaf Y, Logothetis D, Siganos G, Ler\u00eda J, Lorenzo J, Ripeanu M, Beznosov K, Halawa H (2016) \u00cdntegro: leveraging victim prediction for robust fake account detection in large scale OSNs. Comput Secur 61:142\u2013168","journal-title":"Comput Secur"},{"key":"2948_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.eswa.2017.07.040","volume":"89","author":"HJ Escalante","year":"2017","unstructured":"Escalante HJ, Villatoro-Tello E, Garza SE, L\u00f3pez-Monroy AP, Montes-y-G\u00f3mez M, Villase\u00f1or-Pineda L (2017) Early detection of deception and aggressiveness using profile-based representations. Expert Syst Appl 89:99\u2013111","journal-title":"Expert Syst Appl"},{"key":"2948_CR16","first-page":"1","volume":"99","author":"M Tsikerdekis","year":"2017","unstructured":"Tsikerdekis M (2017) Real-time identity deception detection techniques for social media: optimizations and challenges. IEEE Internet Comput 99:1\u201311","journal-title":"IEEE Internet Comput"},{"key":"2948_CR17","doi-asserted-by":"crossref","unstructured":"Kuruvilla AM, Varghese S (2015) A detection system to counter identity deception in social media applications, In: International Conference Circuit, Power and Computing Technologies (ICCPCT), 2015, pp 1\u20135, IEEE","DOI":"10.1109\/ICCPCT.2015.7159321"},{"key":"2948_CR18","doi-asserted-by":"crossref","unstructured":"Gera T, Singh J (2015) A parameterized approach to deal with sock puppets, In: 2015 Third International Conference Computer, Communication, Control and Information Technology (C3IT), pp 1\u20136, IEEE","DOI":"10.1109\/C3IT.2015.7060150"},{"key":"2948_CR19","unstructured":"Jiang X, Li Q, Ma Z, Dong M, Wu J, Guo D (2018) QuickSquad: a new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Netw Appl 1\u201318"},{"key":"2948_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/trit.2018.1025","volume":"3","author":"W Yuan","year":"2018","unstructured":"Yuan W, Yang M, Li H, Wang C, Wang B (2018) End-to-end learning for high-precision lane keeping via multi-state model. CAAI Trans Intell Technol 3:185\u2013190","journal-title":"CAAI Trans Intell Technol"},{"issue":"4","key":"2948_CR21","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1049\/trit.2018.1007","volume":"3","author":"Q Shi","year":"2018","unstructured":"Shi Q, Lam HK, Xiao B, Tsai SH (2018) Adaptive PID controller based on Q-learning algorithm. CAAI Trans Intell Technol 3(4):235\u2013244","journal-title":"CAAI Trans Intell Technol"},{"issue":"4","key":"2948_CR22","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1049\/trit.2018.1041","volume":"3","author":"K Wang","year":"2018","unstructured":"Wang K, Zhu N, Cheng Y, Li R, Zhou T, Long X (2018) Fast feature matching based on r-nearest k-means searching. CAAI Trans Intell Technol 3(4):198\u2013207","journal-title":"CAAI Trans Intell Technol"},{"key":"2948_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0598-2","author":"M BalaAnand","year":"2018","unstructured":"BalaAnand M, Karthikeyan N, Karthik S (2018) Designing a framework for communal software: based on the assessment using relation modelling. Int J Parallel Prog. \n                    https:\/\/doi.org\/10.1007\/s10766-018-0598-2","journal-title":"Int J Parallel Prog"},{"key":"2948_CR24","doi-asserted-by":"publisher","unstructured":"Solomon Z, Sivaparthipan CB, Punitha P, BalaAnand M, Karthikeyan N (2018) Certain investigation on power preservation in sensor networks. In: 2018 International Conference on Soft-Computing and Network Security (ICSNS), Coimbatore, India, \n                    https:\/\/doi.org\/10.1109\/icsns.2018.8573688","DOI":"10.1109\/icsns.2018.8573688"},{"key":"2948_CR25","doi-asserted-by":"crossref","unstructured":"Sivaparthipan CB, Karthikeyan N, Karthik S (2018) Designing statistical assessment healthcare information system for diabetics analysis using big data. Multimed Tools Appl","DOI":"10.1007\/s11042-018-6648-3"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02948-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-02948-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02948-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T23:17:30Z","timestamp":1595978250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-02948-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,30]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["2948"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-02948-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,30]]},"assertion":[{"value":"30 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}