{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:39:27Z","timestamp":1776127167259,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00521-5","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T03:23:37Z","timestamp":1714620217000},"page":"669-680","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Social media bot detection using Dropout-GAN"],"prefix":"10.1007","volume":"20","author":[{"given":"Anant","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Martin","family":"Jure\u010dek","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Stamp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,2]]},"reference":[{"key":"521_CR1","doi-asserted-by":"crossref","unstructured":"Cai, C., Li, L., Zeng, D.: Detecting social bots by jointly modeling deep behavior and content information. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1995\u20131998 (2017)","DOI":"10.1145\/3132847.3133050"},{"key":"521_CR2","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di\u00a0Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"key":"521_CR3","unstructured":"Cresci, S., Di\u00a0Pietro, R., Spognardi, A., Tesconi, M., Petrocchi, M.: Demystifying misconceptions in social bots research. arXiv:2303.17251 (2023)"},{"key":"521_CR4","doi-asserted-by":"crossref","unstructured":"David, I., Siordia, O.S., Moctezuma, D.: Features combination for the detection of malicious twitter accounts. In: 2016 IEEE International Autumn Meeting on Power, Electronics and Computing, ROPEC, pp. 1\u20136 (2016)","DOI":"10.1109\/ROPEC.2016.7830623"},{"key":"521_CR5","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273\u2013274 (2016)","DOI":"10.1145\/2872518.2889302"},{"key":"521_CR6","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805 (2018)"},{"key":"521_CR7","doi-asserted-by":"crossref","unstructured":"Feng, F., Yang, Y., Cer, D., Arivazhagan, N., Wang, W.: Language-agnostic BERT sentence embedding. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics, vol.\u00a01, pp. 878\u2013891 (2022)","DOI":"10.18653\/v1\/2022.acl-long.62"},{"key":"521_CR8","doi-asserted-by":"crossref","unstructured":"Feng, S., Tan, Z., Li, R., Luo, M.: Heterogeneity-aware twitter bot detection with relational graph transformers. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 3977\u20133985 (2022)","DOI":"10.1609\/aaai.v36i4.20314"},{"key":"521_CR9","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng, S., Tan, Z., Wan, H., Wang, N., Chen, Z., Zhang, B., Zheng, Q., Zhang, W., Lei, Z., Yang, S., et al.: TwiBot-22: towards graph-based twitter bot detection. Adv. Neural Inf. Process. Syst. 35, 35254\u201335269 (2022)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"521_CR10","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Luo, M.: BotRGCN: twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236\u2013239 (2021)","DOI":"10.1145\/3487351.3488336"},{"issue":"7","key":"521_CR11","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"issue":"1","key":"521_CR12","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s13278-022-00897-6","volume":"12","author":"S Gera","year":"2022","unstructured":"Gera, S., Sinha, A.: T-Bot: AI-based social media bot detection model for trend-centric twitter network. Soc. Netw. Anal. Min. 12(1), 76 (2022)","journal-title":"Soc. Netw. Anal. Min."},{"issue":"11","key":"521_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Bing, X., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"521_CR14","doi-asserted-by":"crossref","unstructured":"Hu, Z., Dong, Y., Wang, K., Sun, Y.: Heterogeneous graph transformer. In: Proceedings of the Web Conference, vol. 2020, pp. 2704\u20132710 (2020)","DOI":"10.1145\/3366423.3380027"},{"key":"521_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32661-5","volume-title":"A Primer on Generative Adversarial Networks","author":"S Kaddoura","year":"2023","unstructured":"Kaddoura, S.: A Primer on Generative Adversarial Networks. Springer Nature, Berlin (2023)"},{"key":"521_CR16","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467, 312\u2013322 (2018)","journal-title":"Inf. Sci."},{"key":"521_CR17","unstructured":"Mordido, G., Yang, H., Meinel, C.: Dropout-GAN: learning from a dynamic ensemble of discriminators. In: 24th ACM SIGKDD Conference On Knowledge Discovery and Data Mining (2018)"},{"key":"521_CR18","doi-asserted-by":"crossref","unstructured":"Morstatter, F., Wu, L., Nazer, T.H., Carley, K.M., Liu, H.: A new approach to bot detection: striking the balance between precision and recall. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pp. 533\u2013540 (2016)","DOI":"10.1109\/ASONAM.2016.7752287"},{"key":"521_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00800-9","volume":"12","author":"S Najari","year":"2022","unstructured":"Najari, S., Salehi, M., Farahbakhsh, R.: GANBOT: a GAN-based framework for social bot detection. Soc. Netw. Anal. Min. 12, 1\u201311 (2022)","journal-title":"Soc. Netw. Anal. Min."},{"issue":"4","key":"521_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102250","volume":"57","author":"M Orabi","year":"2020","unstructured":"Orabi, M., Mouheb, D., Al Aghbari, Z., Kamel, I.: Detection of bots in social media: a systematic review. Inf. Process. Manage. 57(4), 102250 (2020)","journal-title":"Inf. Process. Manage."},{"key":"521_CR21","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., Desmaison, A., Kopf, A., Yang, E., DeVito, Z., Raison, M., Tejani, A., Chilamkurthy, S., Steiner, B., Fang, L., Bai, J., Chintala, S.: Pytorch: An imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, vol.\u00a032, pp. 8024\u20138035. Curran Associates Inc. (2019)"},{"key":"521_CR22","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: Global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"521_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Langs, G., Schmidt-Erfurth, U.: f-AnoGAN: fast unsupervised anomaly detection with generative adversarial networks. Med. Image Anal. 54, 30\u201344 (2019)","journal-title":"Med. Image Anal."},{"key":"521_CR24","unstructured":"Shi, S., Qiao, K., Chen, J., Yang, S., Yang, J., Song, B., Wang, L., Yan, B.: MGTAB: a multi-relational graph-based twitter account detection benchmark. arXiv:2301.01123 (2023)"},{"key":"521_CR25","unstructured":"Shi, S., Qiao, K., Wang, Z., Yang, J., Song, B., Chen, J., Yan, B.: Muti-scale graph neural network with signed-attention for social bot detection: a frequency perspective. arXiv:2307.01968 (2023)"},{"key":"521_CR26","doi-asserted-by":"crossref","unstructured":"Shi, S., Qiao, K., Yang, J., Song, B., Chen, J., Yan, B.: Over-sampling strategy in feature space for graphs based class-imbalanced bot detection. arXiv:2307.01968 (2023)","DOI":"10.1145\/3589335.3651544"},{"key":"521_CR27","unstructured":"Shi, S., Qiao, K., Yang, J., Song, B., Chen, J., Yan, B.: RF-GNN: random forest boosted graph neural network for social bot detection. arXiv:2304.08239 (2023)"},{"key":"521_CR28","doi-asserted-by":"crossref","unstructured":"Shukla, H., Jagtap, N., Patil, B.: Enhanced twitter bot detection using ensemble machine learning. In: 2021 6th International Conference on Inventive Computation Technologies, ICICT, pp. 930\u2013936 (2021)","DOI":"10.1109\/ICICT50816.2021.9358734"},{"key":"521_CR29","unstructured":"Toth, P., Rezende, D.J., Jaegle, A., Racani\u00e8re, S., Botev, A., Higgins, I.: Hamiltonian generative networks. arXiv:1909.13789 (2019)"},{"key":"521_CR30","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 11, pp. 280\u2013289 (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"521_CR31","unstructured":"Ye, S., Tan, Z., Lei, Z., He, R., Wang, H., Zheng, Q., Luo, M.: HOFA: twitter bot detection with homophily-oriented augmentation and frequency adaptive attention. arXiv:2306.12870 (2023)"},{"issue":"1","key":"521_CR32","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/TKDE.2020.2981333","volume":"34","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Cui, P., Zhu, W.: Deep learning on graphs: a survey. IEEE Trans. Knowl. Data Eng. 34(1), 249\u2013270 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"521_CR33","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ins.2020.03.113","volume":"537","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H.: Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537, 380\u2013393 (2020)","journal-title":"Inf. Sci."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00521-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00521-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00521-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:09:49Z","timestamp":1729004989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00521-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,2]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["521"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00521-5","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,2]]},"assertion":[{"value":"28 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Financial interests"}}]}}