{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T17:31:03Z","timestamp":1776447063721,"version":"3.51.2"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171180"],"award-info":[{"award-number":["62171180"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072158"],"award-info":[{"award-number":["62072158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012554","name":"Foundation for Distinguished Young Talents in Higher Education of Henan","doi-asserted-by":"publisher","award":["222300420006"],"award-info":[{"award-number":["222300420006"]}],"id":[{"id":"10.13039\/501100012554","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The onset of Web 3.0 has catalyzed the rapid advancement of social networking, transforming platforms into essential elements deeply embedded within the fabric of daily life. Researchers have proposed several methods for detecting anomalous behaviors in various scenarios. This article provides a comprehensive review of current research and the latest developments in anomalous behavior detection within social networks. We present a hierarchical three-layer categorization scheme based on the distinct characteristics of base-level detection technologies and various datasets. First, anomaly detection based on user behavioral characteristics can intuitively reflect  deviations in individual behavior. However, it may overlook the overall network structure\u2019s impact. Second, detecting anomalies within a network\u2019s topological structure highlights structural significance, but may overlook the subtle nuances of individual behavior. Finally, the coordinated fusion method, which blends individual behavioral characteristics and the network\u2019s topological structure, addresses the multifaceted nature of anomalies, yielding a more thorough and accurate anomaly detection strategy. This paper provides an overview and assesses the performance of three anomaly detection methods. Furthermore, we explore the challenges associated with social network anomaly detection and the potential pathways for further research.<\/jats:p>","DOI":"10.1007\/s40747-024-01446-8","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T17:01:46Z","timestamp":1715878906000},"page":"5917-5932","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A survey on social network\u2019s anomalous behavior detection"],"prefix":"10.1007","volume":"10","author":[{"given":"Ling","family":"Xing","sequence":"first","affiliation":[]},{"given":"Shiyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Honghai","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Huahong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,16]]},"reference":[{"key":"1446_CR1","doi-asserted-by":"crossref","first-page":"137472","DOI":"10.1109\/ACCESS.2019.2942840","volume":"7","author":"L Xing","year":"2019","unstructured":"Xing L, Deng K, Wu H, Xie P, Zhao HV, Gao F (2019) A survey of across social networks user identification. IEEE Access 7:137472\u2013137488","journal-title":"IEEE Access"},{"issue":"9","key":"1446_CR2","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.3390\/sym11091134","volume":"11","author":"L Xing","year":"2019","unstructured":"Xing L, Deng K, Wu H, Xie P, Gao J (2019) Behavioral habits-based user identification across social networks. Symmetry 11(9):1134","journal-title":"Symmetry"},{"key":"1446_CR3","doi-asserted-by":"crossref","unstructured":"Luo W, Liu J, Liu J, Fan C (2009) An analysis of security in social networks. In: 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE, 648\u2013651","DOI":"10.1109\/DASC.2009.100"},{"key":"1446_CR4","doi-asserted-by":"crossref","first-page":"47114","DOI":"10.1109\/ACCESS.2019.2909089","volume":"7","author":"K Deng","year":"2019","unstructured":"Deng K, Xing L, Zheng L, Wu H, Xie P, Gao F (2019) A user identification algorithm based on user behavior analysis in social networks. IEEE Access 7:47114\u201347123","journal-title":"IEEE Access"},{"issue":"34","key":"1446_CR5","doi-asserted-by":"crossref","first-page":"2307360120","DOI":"10.1073\/pnas.2307360120","volume":"120","author":"PJ Schneider","year":"2023","unstructured":"Schneider PJ, Rizoiu M-A (2023) The effectiveness of moderating harmful online content. Proc Natl Acad Sci 120(34):2307360120","journal-title":"Proc Natl Acad Sci"},{"key":"1446_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3603399","volume":"56","author":"A Arora","year":"2023","unstructured":"Arora A, Nakov P, Hardalov M, Sarwar SM, Nayak V, Dinkov Y, Zlatkova D, Dent K, Bhatawdekar A, Bouchard G et al (2023) Detecting harmful content on online platforms: what platforms need vs. where research efforts go. ACM Comput Surv 56:1\u201317","journal-title":"ACM Comput Surv"},{"issue":"3","key":"1446_CR7","doi-asserted-by":"crossref","first-page":"2827","DOI":"10.1007\/s40747-021-00561-0","volume":"9","author":"J Papcunov\u00e1","year":"2023","unstructured":"Papcunov\u00e1 J, Marton\u010dik M, Fed\u00e1kov\u00e1 D, Kento\u0161 M, Bozog\u00e1\u0148ov\u00e1 M, Srba I, Moro R, Pikuliak M, \u0160imko M, Adamkovi\u010d M (2023) Hate speech operationalization: a preliminary examination of hate speech indicators and their structure. Complex Intell Syst 9(3):2827\u20132842","journal-title":"Complex Intell Syst"},{"issue":"6380","key":"1446_CR8","volume":"162","author":"A-W Li","year":"2022","unstructured":"Li A-W, Xu X-K, Fan Y (2022) Immunization strategies for false information spreading on signed social networks. Chaos Solitons Fractals 162(6380):112489","journal-title":"Chaos Solitons Fractals"},{"key":"1446_CR9","doi-asserted-by":"crossref","unstructured":"Hailun D, Shuyi W, Guorui Z (2014) Multi-agent based research of centralized false information discerning model of micro-blog network. In: 2014 10th International Conference on Natural Computation (ICNC), IEEE, 1026\u20131032","DOI":"10.1109\/ICNC.2014.6975981"},{"issue":"1","key":"1446_CR10","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1111\/jlme.12200","volume":"43","author":"JE Teitcher","year":"2015","unstructured":"Teitcher JE, Bockting WO, Bauermeister JA, Hoefer CJ, Miner MH, Klitzman RL (2015) Detecting, preventing, and responding to \u201cfraudsters\u2019\u2019 in internet research: ethics and tradeoffs. J Law Med Ethics 43(1):116\u2013133","journal-title":"J Law Med Ethics"},{"issue":"9","key":"1446_CR11","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.cose.2017.04.006","volume":"68","author":"A Aleroud","year":"2017","unstructured":"Aleroud A, Zhou L (2017) Phishing environments, techniques, and countermeasures: A survey. Comp Secur 68(9):160\u2013196","journal-title":"Comp Secur"},{"issue":"7","key":"1446_CR12","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.3390\/pr10071356","volume":"10","author":"G Mohamed","year":"2022","unstructured":"Mohamed G, Visumathi J, Mahdal M, Anand J, Elangovan M (2022) An effective and secure mechanism for phishing attacks using a machine learning approach. Processes 10(7):1356","journal-title":"Processes"},{"key":"1446_CR13","doi-asserted-by":"crossref","unstructured":"Yang Y, Manoharan M, Barber KS (2014) Modelling and analysis of identity threat behaviors through text mining of identity theft stories. In: 2014 IEEE Joint Intelligence and Security Informatics Conference, IEEE, 184\u2013191","DOI":"10.1109\/JISIC.2014.35"},{"issue":"3","key":"1446_CR14","first-page":"291","volume":"6","author":"J Woo","year":"2012","unstructured":"Woo J, Choi HJ, Kim HK (2012) An automatic and proactive identity theft detection model in mmorpgs. Appl Math Inform Sci 6(3):291","journal-title":"Appl Math Inform Sci"},{"key":"1446_CR15","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","volume":"479","author":"U Fiore","year":"2019","unstructured":"Fiore U, De Santis A, Perla F, Zanetti P, Palmieri F (2019) Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Inform Sci 479:448\u2013455","journal-title":"Inform Sci"},{"key":"1446_CR16","doi-asserted-by":"crossref","unstructured":"Kolaczek G (2009) An approach to identity theft detection using social network analysis. In: 2009 First Asian Conference on Intelligent Information and Database Systems, IEEE, 78\u201381","DOI":"10.1109\/ACIIDS.2009.44"},{"key":"1446_CR17","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1063\/5.0005105","volume":"30","author":"Z Ruan","year":"2020","unstructured":"Ruan Z, Yu B, Shu X, Zhang Q, Xuan Q (2020) The impact of malicious nodes on the spreading of false information. Chaos 30:125","journal-title":"Chaos"},{"issue":"6380","key":"1446_CR18","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359(6380):1146\u20131151","journal-title":"Science"},{"issue":"8","key":"1446_CR19","first-page":"263","volume":"48","author":"J Wang","year":"2021","unstructured":"Wang J, Wang Y, Huang M (2021) False information in social networks: Definition, detection and control. Comput Sci 48(8):263\u2013277","journal-title":"Comput Sci"},{"issue":"4","key":"1446_CR20","first-page":"730","volume":"39","author":"X Bai-Lin","year":"2016","unstructured":"Bai-Lin X, Sheng-Yi J, Yong-Mei Z, Yi X, Xia L (2016) Misinformation detection based on gatekeepers\u2019 behaviors in microblog. Chin J Comp 39(4):730\u2013744","journal-title":"Chin J Comp"},{"key":"1446_CR21","doi-asserted-by":"crossref","unstructured":"Xu Y, Li F, Liu J, Zhang R, Yao Y, Zhang D (2017) Detecting false information of social network in big data. In: Collaborate Computing: Networking, Applications and Worksharing: 12th International Conference, CollaborateCom 2016, Beijing, China, November 10\u201311, 2016, Proceedings 12, 642\u2013651. Springer","DOI":"10.1007\/978-3-319-59288-6_65"},{"issue":"2","key":"1446_CR22","first-page":"219","volume":"38","author":"W Li","year":"2015","unstructured":"Li W, Xue-Qi C (2015) Dynamic community in online social networks. Chin J Comp 38(2):219\u2013237","journal-title":"Chin J Comp"},{"key":"1446_CR23","unstructured":"Y, L.L., J, A., Z, Q., J, L.: Research on security event real-time monitoring framework based on micro-blog. Netinfo Security 15(1), 16\u201323 (2015)"},{"issue":"4","key":"1446_CR24","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11280-016-0416-y","volume":"20","author":"W Hu","year":"2017","unstructured":"Hu W, Wang H, Qiu Z, Nie C, Yan L, Du B (2017) An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent. World Wide Web 20(4):775\u2013795","journal-title":"World Wide Web"},{"key":"1446_CR25","doi-asserted-by":"crossref","unstructured":"Persia F, Helmer S (2018) A framework for high-level event detection in a social network context via an extension of iseql. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC), IEEE, 140\u2013147","DOI":"10.1109\/ICSC.2018.00028"},{"key":"1446_CR26","first-page":"1","volume":"2021","author":"X Wang","year":"2021","unstructured":"Wang X, Sui Y, Tao Y, Zhang Q, Wei J (2021) Detecting abnormal social network accounts with hurst of interest distribution. Secur Commun Netw 2021:1\u201314","journal-title":"Secur Commun Netw"},{"issue":"7","key":"1446_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11063-023-11189-1","volume":"55","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Stojanovic V (2023) Switching-like event-triggered state estimation for reaction-diffusion neural networks against dos attacks. Neural Process Lett 55(7):1\u201322","journal-title":"Neural Process Lett"},{"issue":"1","key":"1446_CR28","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.jnca.2016.02.021","volume":"68","author":"P Bindu","year":"2016","unstructured":"Bindu P, Thilagam PS (2016) Mining social networks for anomalies: Methods and challenges. J Netw Comp Appl 68(1):213\u2013229","journal-title":"J Netw Comp Appl"},{"issue":"1","key":"1446_CR29","doi-asserted-by":"crossref","first-page":"172","DOI":"10.3390\/e25010172","volume":"25","author":"Y Huang","year":"2023","unstructured":"Huang Y, Zhao P, Zhang Q, Xing L, Wu H, Ma H (2023) A semantic-enhancement-based social network user-alignment algorithm. Entropy 25(1):172","journal-title":"Entropy"},{"issue":"1","key":"1446_CR30","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s13042-023-01786-w","volume":"15","author":"Z Li","year":"2024","unstructured":"Li Z, Wang B, Huang J, Jin Y, Xu Z, Zhang J, Gao J (2024) A graph-powered large-scale fraud detection system. Int J Mach Learn Cybern 15(1):115\u2013128","journal-title":"Int J Mach Learn Cybern"},{"issue":"10","key":"1446_CR31","doi-asserted-by":"crossref","first-page":"1936","DOI":"10.1109\/TKDE.2019.2912817","volume":"32","author":"H Lin","year":"2019","unstructured":"Lin H, Liu G, Wu J, Zuo Y, Wan X, Li H (2019) Fraud detection in dynamic interaction network. IEEE Trans Knowl Data Eng 32(10):1936\u20131950","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1446_CR32","doi-asserted-by":"crossref","first-page":"317","DOI":"10.32604\/cmc.2019.05677","volume":"60","author":"C Zhu","year":"2019","unstructured":"Zhu C, Zhao W, Li Q, Li P, Da Q (2019) Network embedding-based anomalous density searching for multi-group collaborative fraudsters detection in socialmedia. Comp Mater Continua 60(1):317\u2013333","journal-title":"Comp Mater Continua"},{"issue":"3","key":"1446_CR33","first-page":"611","volume":"53","author":"H Yazhou","year":"2016","unstructured":"Yazhou H, Qinghua Z, Yanping C, Caixia Y (2016) Recognition of abnormal behavior based on data of public opinion on the web. J Comp Res Develop 53(3):611\u2013620","journal-title":"J Comp Res Develop"},{"issue":"2","key":"1446_CR34","first-page":"44","volume":"34","author":"T Xiaobin","year":"2017","unstructured":"Xiaobin T, Zhimin Z, Li D (2017) Research on monitoring internet burst events dynamicallyfrom the big data perspective. Stat Res 34(2):44\u201354","journal-title":"Stat Res"},{"key":"1446_CR35","doi-asserted-by":"crossref","unstructured":"Tang B, Wu Z, Fang C (2020) Understanding network characteristics of spam users in social media. In: 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), IEEE, 171\u2013176","DOI":"10.1109\/CBD51900.2020.00039"},{"issue":"1","key":"1446_CR36","first-page":"102","volume":"33","author":"Z Jing-Sheng","year":"2022","unstructured":"Jing-Sheng Z, Meng-Xue S, Xiang G, Xiang G (2022) Research on text representation in natural language processing. J Softw 33(1):102\u2013128","journal-title":"J Softw"},{"issue":"22","key":"1446_CR37","first-page":"1","volume":"2022","author":"I Ali","year":"2022","unstructured":"Ali I, Ayub MNB, Shivakumara P, Noor NFBM (2022) Fake news detection techniques on social media: A survey. Wirel Commun Mob Comput 2022(22):1\u201317","journal-title":"Wirel Commun Mob Comput"},{"issue":"4","key":"1446_CR38","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1109\/TBDATA.2017.2672672","volume":"5","author":"W Yu","year":"2017","unstructured":"Yu W, Li J, Bhuiyan MZA, Zhang R, Huai J (2017) Ring: Real-time emerging anomaly monitoring system over text streams. IEEE Trans Big Data 5(4):506\u2013519","journal-title":"IEEE Trans Big Data"},{"issue":"6","key":"1446_CR39","doi-asserted-by":"crossref","first-page":"3856","DOI":"10.1109\/TNET.2016.2557849","volume":"24","author":"T Zhu","year":"2016","unstructured":"Zhu T, Gao H, Yang Y, Bu K, Chen Y, Downey D, Lee K, Choudhary AN (2016) Beating the artificial chaos: Fighting osn spam using its own templates. IEEE\/ACM Trans Netw 24(6):3856\u20133869","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"1446_CR40","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.comcom.2021.08.016","volume":"178","author":"J Mu","year":"2021","unstructured":"Mu J, Zhang X, Li Y, Guo J (2021) Deep neural network for text anomaly detection in siot. Comp Commun 178(1):286\u2013296","journal-title":"Comp Commun"},{"issue":"2","key":"1446_CR41","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/TII.2017.2753202","volume":"14","author":"M Al-Qurishi","year":"2017","unstructured":"Al-Qurishi M, Hossain MS, Alrubaian M, Rahman SMM, Alamri A (2017) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Indus Inform 14(2):799\u2013813","journal-title":"IEEE Trans Indus Inform"},{"key":"1446_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/3498123","volume":"2022","author":"R Qasim","year":"2022","unstructured":"Qasim R, Bangyal WH, Alqarni MA, Ali Almazroi A et al (2022) A fine-tuned bert-based transfer learning approach for text classification. J Healthcare Eng 2022:1\u201317","journal-title":"J Healthcare Eng"},{"key":"1446_CR43","unstructured":"Drif A, Ferhat Z, Giordano S (2019) Fake news detection method based on text-features. In: The Ninth International Conference on Advances in Information Mining and Management, IMMM, 26\u201331"},{"issue":"1","key":"1446_CR44","first-page":"1932","volume":"58","author":"AAA Ahmed","year":"2021","unstructured":"Ahmed AAA, Aljabouh A, Donepudi PK, Choi MS (2021) Detecting fake news using machine learning: A systematic literature review. Phys Edu J 58(1):1932\u20131939","journal-title":"Phys Edu J"},{"key":"1446_CR45","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1016\/j.procs.2017.11.106","volume":"121","author":"\u00c1 Figueira","year":"2017","unstructured":"Figueira \u00c1, Oliveira L (2017) The current state of fake news: challenges and opportunities. Proc Comp Sci 121:817\u2013825","journal-title":"Proc Comp Sci"},{"issue":"19","key":"1446_CR46","doi-asserted-by":"crossref","first-page":"9292","DOI":"10.3390\/app11199292","volume":"11","author":"N Islam","year":"2021","unstructured":"Islam N, Shaikh A, Qaiser A, Asiri Y, Almakdi S, Sulaiman A, Moazzam V, Babar SA (2021) Ternion: An autonomous model for fake news detection. Appl Sci 11(19):9292","journal-title":"Appl Sci"},{"issue":"7","key":"1446_CR47","first-page":"7590","volume":"35","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Ren F, Zhang J, Su S, Yan Y, Wei Q, Sun L, Zhu G, Guo C (2022) When behavior analysis meets social network alignment. IEEE Trans Knowl Data Eng 35(7):7590\u20137607","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1446_CR48","doi-asserted-by":"crossref","unstructured":"Jin G, Chen Z, Zhang J, Yue W (2020) Detecting user interaction anomaly based on social network graph similarity. In: 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC), IEEE, 131\u2013136","DOI":"10.1109\/ICEIEC49280.2020.9152339"},{"issue":"4","key":"1446_CR49","doi-asserted-by":"crossref","first-page":"0215856","DOI":"10.1371\/journal.pone.0215856","volume":"14","author":"R Aljably","year":"2019","unstructured":"Aljably R, Tian Y, Al-Rodhaan M, Al-Dhelaan A (2019) Anomaly detection over differential preserved privacy in online social networks. PloS one 14(4):0215856","journal-title":"PloS one"},{"key":"1446_CR50","doi-asserted-by":"crossref","unstructured":"Elhadad MK, Li KF, Gebali F (2019) Fake news detection on social media: a systematic survey. In: 2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), IEEE, 131\u2013136","DOI":"10.1109\/PACRIM47961.2019.8985062"},{"key":"1446_CR51","doi-asserted-by":"crossref","unstructured":"Wang K, Chen D (2016) Graph structure based anomaly behavior detection. In: 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017), Atlantis Press, 531\u2013538","DOI":"10.2991\/iccia-17.2017.90"},{"key":"1446_CR52","doi-asserted-by":"crossref","unstructured":"Yang P, Zheng Z (2020) Fake account detection with attention-based graph convolution networks. In: 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), IEEE, 106\u2013110","DOI":"10.1109\/AUTEEE50969.2020.9315597"},{"issue":"10","key":"1446_CR53","first-page":"2011","volume":"38","author":"Z Yu-Qing","year":"2015","unstructured":"Yu-Qing Z, Shao-Qing L, Dan F (2015) Anomaly detection in online social networks. Chin J Comp 38(10):2011\u20132027","journal-title":"Chin J Comp"},{"issue":"6","key":"1446_CR54","first-page":"5865","volume":"35","author":"N Jiang","year":"2023","unstructured":"Jiang N, Jie W, Li J, Liu X, Jin D (2023) Gatrust: A multi-aspect graph attention network model for trust assessment in osns. IEEE Trans Knowl Data Eng 35(6):5865\u20135878","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1446_CR55","doi-asserted-by":"crossref","unstructured":"Liu X, Jiang F, Zhang R (2020) A new social user anomaly behavior detection system based on blockchain and smart contract. In: 2020 IEEE International Conference on Networking, Sensing and Control (ICNSC), IEEE, pp. 1\u20135","DOI":"10.1109\/ICNSC48988.2020.9238118"},{"key":"1446_CR56","doi-asserted-by":"crossref","unstructured":"Jia B, Dong C, Chen Z, Chang K-C, Sullivan N, Chen G (2018) Pattern discovery and anomaly detection via knowledge graph. In: 2018 21st International Conference on Information Fusion (FUSION), IEEE, 2392\u20132399","DOI":"10.23919\/ICIF.2018.8455737"},{"issue":"1","key":"1446_CR57","first-page":"117","volume":"44","author":"H Tao","year":"2018","unstructured":"Tao H, Yuqing L, Limin X, Yanfang L (2018) Incremental and parallel algorithm for anomaly detection in dynamic graphs. J Beijing Univ Aeron Astron 44(1):117\u2013124","journal-title":"J Beijing Univ Aeron Astron"},{"key":"1446_CR58","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1177\/0020720919891065","volume":"60","author":"Big data multi-community anomaly detection in social networks","year":"2023","unstructured":"Big data multi-community anomaly detection in social networks (2023) HC, M. Int J Electr Eng Educ 60:1736\u20131749","journal-title":"Int J Electr Eng Educ"},{"issue":"60","key":"1446_CR59","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1007\/s10115-018-1276-9","volume":"60","author":"X Wu","year":"2019","unstructured":"Wu X (2019) A trust-based detection scheme to explore anomaly prevention in social networks. Knowl Inform Syst 60(60):1565\u20131586","journal-title":"Knowl Inform Syst"},{"issue":"2","key":"1446_CR60","first-page":"7","volume":"43","author":"W Xiaoyan","year":"2022","unstructured":"Xiaoyan W, Qiang L, Chengzhang Z (2022) Research on application of collaborative public opinion fraud detection method in social network. J Zhengzhou Univ 43(2):7\u201314","journal-title":"J Zhengzhou Univ"},{"key":"1446_CR61","doi-asserted-by":"crossref","unstructured":"Deepak S, Chitturi B (2020) Deep neural approach to fake-news identification. Proc Comp Sci 167:2236\u20132243","DOI":"10.1016\/j.procs.2020.03.276"},{"key":"1446_CR62","doi-asserted-by":"crossref","unstructured":"Zheng L, Li Z, Li J, Li Z, Gao J (2019) Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, pp. 4419\u20134425, IJCAI","DOI":"10.24963\/ijcai.2019\/614"},{"key":"1446_CR63","doi-asserted-by":"crossref","unstructured":"Keshavarzi A, Kannan N, Kochut K (2021) Regpattern2vec: link prediction in knowledge graphs. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), IEEE, 1\u20137","DOI":"10.1109\/IEMTRONICS52119.2021.9422604"},{"issue":"5","key":"1446_CR64","first-page":"1260","volume":"8","author":"L Bahri","year":"2018","unstructured":"Bahri L, Carminati B, Ferrari E (2018) Knowledge-based approaches for identity management in online social networks. Wiley Interdisciplinary Rev 8(5):1260","journal-title":"Wiley Interdisciplinary Rev"},{"key":"1446_CR65","doi-asserted-by":"crossref","unstructured":"Fan H, Zhang F, Li Z (2020) Anomalydae: Dual autoencoder for anomaly detection on attributed networks. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 5685\u20135689","DOI":"10.1109\/ICASSP40776.2020.9053387"},{"issue":"1\u20132","key":"1446_CR66","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.neucom.2020.04.047","volume":"407","author":"L Xue","year":"2020","unstructured":"Xue L, Chen Y, Luo M, Peng Z, Liu J (2020) An anomaly detection framework for time-evolving attributed networks. Neurocomputing 407(1\u20132):39\u201349","journal-title":"Neurocomputing"},{"issue":"6","key":"1446_CR67","doi-asserted-by":"crossref","DOI":"10.1063\/1.5026855","volume":"28","author":"Y Yasami","year":"2018","unstructured":"Yasami Y, Safaei F (2018) Detecting chaotic behaviors in dynamic complex social networks using a feature diffusion-aware model. Chaos 28(6):061106","journal-title":"Chaos"},{"issue":"4","key":"1446_CR68","first-page":"11","volume":"20","author":"Z Min","year":"2020","unstructured":"Min Z (2020) Construction of forensic model of social network intrusion behavior based on naive bayes. J Langfang Normal Univ 20(4):11\u201315","journal-title":"J Langfang Normal Univ"},{"issue":"8","key":"1446_CR69","first-page":"1","volume":"2022","author":"H Chen","year":"2022","unstructured":"Chen H, Lee S, Jeong D et al (2022) Application of a fl time series building model in mobile network interaction anomaly detection in the internet of things environment. Comput Intell Neurosci 2022(8):1","journal-title":"Comput Intell Neurosci"},{"key":"1446_CR70","doi-asserted-by":"crossref","first-page":"2567","DOI":"10.1007\/s11280-020-00811-0","volume":"23","author":"X Zhao","year":"2020","unstructured":"Zhao X, Jia Y, Li A, Jiang R, Song Y (2020) Multi-source knowledge fusion: a survey. World Wide Web 23:2567\u20132592","journal-title":"World Wide Web"},{"key":"1446_CR71","doi-asserted-by":"crossref","unstructured":"Zhou H, Li M, Gu Z (2020) Knowledge fusion and spatiotemporal data cleaning: A review. In: 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), IEEE, 295\u2013301","DOI":"10.1109\/DSC50466.2020.00052"},{"key":"1446_CR72","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1007\/s00530-020-00731-z","volume":"28","author":"NEH Ben Chaabene","year":"2022","unstructured":"Ben Chaabene NEH, Bouzeghoub A, Guetari R, Ghezala HHB (2022) Deep learning methods for anomalies detection in social networks using multidimensional networks and multimodal data: A survey. Multimedia Syst 28:2133\u20132143","journal-title":"Multimedia Syst"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01446-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01446-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01446-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:27:10Z","timestamp":1721237230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01446-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,16]]},"references-count":72,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1446"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01446-8","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,16]]},"assertion":[{"value":"20 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}