{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T04:17:30Z","timestamp":1774239450927,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007613","name":"Majmaah University","doi-asserted-by":"publisher","award":["R-2025-1612"],"award-info":[{"award-number":["R-2025-1612"]}],"id":[{"id":"10.13039\/501100007613","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02047-z","type":"journal-article","created":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:40:09Z","timestamp":1751690409000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Encoder only attention-guided transformer framework for accurate and explainable social media fake profile detection"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3092-2415","authenticated-orcid":false,"given":"Prashant Kumar","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Bala Dhandayuthapani","family":"Veerasamy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3423-0993","authenticated-orcid":false,"given":"Noha","family":"Alduaiji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3286-8224","authenticated-orcid":false,"given":"Santosh Reddy","family":"Addula","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,5]]},"reference":[{"key":"2047_CR1","doi-asserted-by":"crossref","unstructured":"Sabla Y (2023) and Sanjay Gour. Social Media Networking Analytics and Growth Perspectives. In International Conference on Information and Communication Technology for Competitive Strategies, pp. 273\u2013285. Singapore: Springer Nature Singapore","DOI":"10.1007\/978-981-99-9486-1_22"},{"key":"2047_CR2","first-page":"643","volume":"43","author":"AM Matwyshyn","year":"2021","unstructured":"Matwyshyn AM (2021) Miranda Mowbray Fake Cardozo L Rev 43:643","journal-title":"Miranda Mowbray Fake Cardozo L Rev"},{"key":"2047_CR3","doi-asserted-by":"crossref","unstructured":"Oshadi Karunanayaka KAYR, Jahankhani H, El-Deeb S (2024) Isuru Sandakelum will arachchige, and Osama Akram Amin Metwally hussien. Artificial intelligence in digital marketing: the ethical implications of digital influence on markets and consumer. Market grooming: the dark side of AI marketing. Emerald Publishing Limited, pp 173\u2013197","DOI":"10.1108\/978-1-83549-001-320241009"},{"key":"2047_CR4","unstructured":"The escalating presence of such deceptive accounts poses a substantial threat to the credibility, security, and integrity of online communities"},{"key":"2047_CR5","doi-asserted-by":"crossref","unstructured":"Shukla A, Chaurasia S, Asthana T, Prajapati TN, Kushwaha V (2025) Fake social media profile detection using machine learning. Emerging trends in computer science and its application. CRC, pp 432\u2013436","DOI":"10.1201\/9781003606635-74"},{"issue":"3","key":"2047_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2020.2998232","volume":"15","author":"MA Franco","year":"2020","unstructured":"Franco MA, Krasnogor N, Bacardit J (2020) Automatic tuning of rule-based evolutionary machine learning via problem structure identification. IEEE Comput Intell Mag 15(3):28\u201346","journal-title":"IEEE Comput Intell Mag"},{"issue":"5","key":"2047_CR7","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1111\/joms.12639","volume":"58","author":"Andr\u00e9 Hanelt","year":"2021","unstructured":"Hanelt Andr\u00e9, Bohnsack Ren\u00e9 (2021) David marz, and Cl\u00e1udia antunes marante. A systematic review of the literature on digital transformation: insights and implications for strategy and organizational change. J Manage Stud 58(5):1159\u20131197","journal-title":"J Manage Stud"},{"key":"2047_CR8","doi-asserted-by":"crossref","unstructured":"Wilson A (2024) Int Trans Artif Intell 3(1):97\u2013107and Muhammad Rehan Anwar. The Future of Adaptive Machine Learning Algorithms in High-Dimensional Data Processing.","DOI":"10.33050\/italic.v3i1.656"},{"key":"2047_CR9","doi-asserted-by":"crossref","unstructured":"Javed D, Jhanjhi NZ, Khan NA, Ray SK (2025) Arafat Al-Dhaqm, and victor R. Kebande. Identification of Spambots and fake followers on social network via interpretable AI-Based machine learning. IEEE Access","DOI":"10.1109\/ACCESS.2025.3551993"},{"key":"2047_CR10","doi-asserted-by":"crossref","unstructured":"Sharrab YO, Attar H, Eljinini MAH, Al-Omary Y (2025) and WalaA. \u2019Al-Momani. Advancements in speech recognition: A systematic review of deep learning transformer models, trends, innovations, and future directions. IEEE Access","DOI":"10.1109\/ACCESS.2025.3550855"},{"issue":"10","key":"2047_CR11","doi-asserted-by":"publisher","first-page":"4291","DOI":"10.1109\/TNNLS.2020.3019893","volume":"32","author":"A Galassi","year":"2020","unstructured":"Galassi A, Lippi M, Torroni P (2020) Attention in natural Language processing. IEEE Trans Neural Networks Learn Syst 32(10):4291\u20134308","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"2047_CR12","unstructured":"Al-Quayed F, Javed D, Jhanjhi NZ, Humayun M, Thanaa S (2024) Alnusairi. Optimizing fake news detection: A hybrid Transformer-Based model for enhanced performance. IEEE Access"},{"key":"2047_CR13","doi-asserted-by":"crossref","unstructured":"Mishra S, Ranjan H, Mohapatra SA, Edalatpanah, Mahendra Kumar G (2024) Advanced deepfake detection leveraging Swin transformer technology. Engineering review: Me\u0111unarodni \u010casopis Namijenjen Publiciranju Originalnih Istra\u017eivanja s aspekta analize konstrukcija, Materijala i Novih tehnologija u Podru\u010dju strojarstva, brodogradnje, Temeljnih Tehni\u010dkih znanosti, elektrotehnike, Ra\u010dunarstva i Gra\u0111evinarstva 44, 4-SI 2024: 45\u201356","DOI":"10.30765\/er.2583"},{"key":"2047_CR14","doi-asserted-by":"crossref","unstructured":"Kalra S, Sharma Y, Vyas P, Gajendra Singh Chauhan (2023) FakeRevealer: A multimodal framework for revealing the falsity of online tweets using Transformer-Based architectures. In ICPRAM, pp. 956\u2013963","DOI":"10.5220\/0011889800003411"},{"key":"2047_CR15","doi-asserted-by":"crossref","unstructured":"Rane, Rashmi R, Subhashini, Surendran R (2024) An Innovative Fake News Detection in Social Media with an Efficient Attention-Focused Transformer Slimmable Network. In 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 177\u2013183. IEEE","DOI":"10.1109\/3ict64318.2024.10824334"},{"key":"2047_CR16","doi-asserted-by":"crossref","unstructured":"Jing Q, Yao D, Wang XFB, Tan H, Bu X, Bi J (2021) TRANSFAKE: multi-task transformer for multimodal enhanced fake news detection. In 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE","DOI":"10.1109\/IJCNN52387.2021.9533433"},{"key":"2047_CR17","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/LSP.2022.3214768","volume":"29","author":"Z Tan","year":"2022","unstructured":"Tan Z, Yang Z, Changtao Miao, and, Guo G (2022) Transformer-based feature compensation and aggregation for deepfake detection. IEEE Signal Process Lett 29:2183\u20132187","journal-title":"IEEE Signal Process Lett"},{"key":"2047_CR18","unstructured":"Nguyen D, Astrid M, Ghorbel E, Aouada D (2024) FakeFormer: efficient Vulnerability-Driven Transformers for generalisable deepfake detection. ArXiv Preprint ArXiv:2410.21964 ("},{"key":"2047_CR19","doi-asserted-by":"crossref","unstructured":"Sachan T, Pinnaparaju N, Gupta M, Varma V (2021) SCATE: shared cross attention transformer encoders for multimodal fake news detection. In Proceedings of the 2021 IEEE\/ACM international conference on advances in social networks analysis and mining, pp. 399\u2013406","DOI":"10.1145\/3487351.3490965"},{"key":"2047_CR20","doi-asserted-by":"crossref","unstructured":"Thuan P, Minh (2024) B\u00f9i Thu lam, and pham duy trung. DSViT: an enhanced transformer model for deepfake detection. J Sci Technol Inform Secur: 17\u201328","DOI":"10.54654\/isj.v2i22.1055"},{"key":"2047_CR21","doi-asserted-by":"crossref","unstructured":"Unni M, Vasudevan S, Jeevananda JJ, Kalapurackal, Saba Fatma (2024) Enhancing authenticity and trust in social media: an automated approach for detecting fake profiles. Indonesian J Electr Eng Comput Sci 35(1):292\u2013300","DOI":"10.11591\/ijeecs.v35.i1.pp292-300"},{"key":"2047_CR22","doi-asserted-by":"crossref","unstructured":"Kuntur S, Krzywda M, Wr\u00f3blewska A, Paprzycki M (2024) and Maria Ganzha. Comparative analysis of graph neural networks and Transformers for robust fake news detection: A verification and reimplementation study. Electronics 13, 23: 4784","DOI":"10.3390\/electronics13234784"},{"key":"2047_CR23","doi-asserted-by":"crossref","unstructured":"Vadhvani R (2024) and Ashima Yadav. Unmasking Deception: Leveraging advanced Transformer model for detecting Fake images on the Web. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE","DOI":"10.1109\/ICCCNT61001.2024.10724341"},{"key":"2047_CR24","unstructured":"Hashmi A, Shahzad SA, Lin C-W, Yu Tsao, and, Hsin-Min W (2023) Avtenet: Audio-visual transformer-based ensemble network exploiting multiple experts for video deepfake detection. ArXiv Preprint ArXiv:2310.13103 ("},{"key":"2047_CR25","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wang T, Shu M, Wang Y (2022) A robust lightweight deepfake detection network using transformers. In Pacific rim international conference on artificial intelligence, pp. 275\u2013288. Cham: Springer Nature Switzerland","DOI":"10.1007\/978-3-031-20862-1_20"},{"key":"2047_CR26","doi-asserted-by":"crossref","unstructured":"Truic\u0103 C-O, Elena-Simona A (2022) Misrob\u00e6rta: Transformers versus misinformation. Mathematics 10, 4: 569","DOI":"10.3390\/math10040569"},{"key":"2047_CR27","doi-asserted-by":"crossref","unstructured":"Wang P, Liu K, Zhou W, Zhou H, Liu H, Zhang W (2022) and Nenghai Yu. ADT: Anti-deepfake transformer. In ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2899\u20132903. IEEE","DOI":"10.1109\/ICASSP43922.2022.9746888"},{"key":"2047_CR28","doi-asserted-by":"crossref","unstructured":"Vallileka N, Sundaravadivel P, Karthikeyan U, Santhana Krishnan R, Lakshmi Narayanan K, Sundararajan S (2023) DeepTweet: leveraging transformer-based models for enhanced fake news detection in twitter sentiment analysis. In 2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 438\u2013443. IEEE","DOI":"10.1109\/I-SMAC58438.2023.10290217"},{"key":"2047_CR29","doi-asserted-by":"crossref","unstructured":"Dong X, Bao J, Chen D, Zhang T, Zhang W, Yu N, Chen D, Wen F, and Baining Guo (2022). Protecting celebrities from deepfake with identity consistency transformer. In Proceedings of the IEEE\/CVF Conference on Computer VisionPattern Recognition, pp. 9468\u20139478","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"2047_CR30","unstructured":"Cresci, Dataset (2017) Available at: https:\/\/botometer.osome.iu.edu\/bot-repository\/datasets.html, Accessed on: 6 September 2024"},{"issue":"3","key":"2047_CR31","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/app15031252","volume":"15","author":"\u00c7av\u015fi","year":"2025","unstructured":"\u00c7av\u015fi, Zaim (2025) Hande, and Esra nergis yola\u00e7an. FPE\u2013Transformer: A feature positional Encoding-Based transformer model for attack detection. Appl Sci 15(3):1252","journal-title":"Appl Sci"},{"key":"2047_CR32","first-page":"24892","volume":"36","author":"A Kazemnejad","year":"2023","unstructured":"Kazemnejad A, Padhi I, Ramamurthy KN, Das P, Siva Reddy (2023) The impact of positional encoding on length generalization in Transformers. Adv Neural Inf Process Syst 36:24892\u201324928","journal-title":"Adv Neural Inf Process Syst"},{"key":"2047_CR33","unstructured":"Watanabe S (2023) Tree-structured parzen estimator: Understanding its algorithm components and their roles for better empirical performance. arXiv preprint arXiv:2304.11127"},{"issue":"7","key":"2047_CR34","doi-asserted-by":"publisher","first-page":"2516","DOI":"10.3934\/jimo.2024014","volume":"20","author":"J Yang","year":"2024","unstructured":"Yang J, Long Q (2024) A modification of adaptive moment Estimation (adam) for machine learning. J Industrial Manage Optim 20(7):2516\u20132540","journal-title":"J Industrial Manage Optim"},{"key":"2047_CR35","unstructured":"Instagram Fake and real accounts Dataset, Repository K Available at: https:\/\/www.kaggle.com\/datasets\/rezaunderfit\/instagram-fake-and-real-accounts-dataset, Accessed on 10 January 2025"},{"key":"2047_CR36","unstructured":"Facebook Spam Dataset Available at: https:\/\/www.kaggle.com\/datasets\/khajahussainsk\/facebook-spam-dataset, Accessed on 10 January 2025"},{"key":"2047_CR37","unstructured":"Weibo Fake Profile Dataset Available at: https:\/\/www.kaggle.com\/datasets\/bitandatom\/social-network-fake-account-dataset, Accessed on 10 January 2025"},{"key":"2047_CR38","unstructured":"Instagram Fake Profile Dataset Available at: https:\/\/www.kaggle.com\/datasets\/jayaprakashpondy\/instagram-fake-profile\/data, Accessed on 10 January 2025"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02047-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02047-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02047-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:25Z","timestamp":1758986545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02047-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2047"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02047-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"25 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"232"}}