{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T19:00:34Z","timestamp":1770490834796,"version":"3.49.0"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s42979-020-0110-0","type":"journal-article","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T18:03:25Z","timestamp":1584554605000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Detection of Fake Tweets Using Sentiment Analysis"],"prefix":"10.1007","volume":"1","author":[{"given":"C.","family":"Monica","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Nagarathna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"110_CR1","doi-asserted-by":"publisher","first-page":"6540","DOI":"10.1109\/ACCESS.2018.2796018","volume":"6","author":"E Van Der Walt","year":"2018","unstructured":"Van Der Walt E, Eloff J. Using machine learning to detect fake identities: bots vs humans. IEEE Access. 2018;6:6540\u20139.","journal-title":"IEEE Access"},{"issue":"4","key":"110_CR2","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/TIFS.2016.2621888","volume":"12","author":"C Chen","year":"2017","unstructured":"Chen C, Wang Yu, Zhang J, Xiang Y, Zhou W, Min G. Statistical features-based real-time detection of drifted Twitter spam. IEEE Trans Inf Forensics Secur. 2017;12(4):914\u201325.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"110_CR3","unstructured":"Ala\u2019M A, Faris H. Spam profile detection in social networks based on public features. In: 2017 8th International conference on information and communication systems (ICICS); 2017, IEEE, p. 130\u2013135."},{"key":"110_CR4","doi-asserted-by":"crossref","unstructured":"Ashour M, Salama C, Watheq El-Kharashi M. Detecting spam tweets using character N-gram features. In: 2018 13th International conference on computer engineering and systems (ICCES); 2018, IEEE, p. 190\u2013195.","DOI":"10.1109\/ICCES.2018.8639297"},{"key":"110_CR5","unstructured":"Thakkar H, Patel D. Approaches for sentiment analysis on twitter: a state-of-art study; 2015.\u00a0arXiv preprint arXiv:1512.01043."},{"issue":"1","key":"110_CR6","first-page":"11","volume":"23","author":"A Hasan","year":"2018","unstructured":"Hasan A, et al. Machine learning-based sentiment analysis for Twitter accounts. Math Comput Appl. 2018;23(1):11.","journal-title":"Math Comput Appl"},{"issue":"6","key":"110_CR7","first-page":"434","volume":"5","author":"AS Raghuwanshi","year":"2017","unstructured":"Raghuwanshi AS, Pawar SK. Polarity classification of Twitter data using sentiment analysis. Int J Recent Innov Trends Comput Commun. 2017;5(6):434\u20139.","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"110_CR8","doi-asserted-by":"crossref","unstructured":"Ramadhani AM, Goo HS. Twitter sentiment analysis using deep learning methods. In: 2017 7th International annual engineering seminar (InAES); 2017, IEEE, p. 1\u20134.","DOI":"10.1109\/INAES.2017.8068556"},{"key":"110_CR9","unstructured":"Cui H, Lin Y, Utsuro T. Sentiment analysis of tweets by CNN utilizing Tweets with Emojis as training data, ACM; 2018."},{"key":"110_CR10","doi-asserted-by":"crossref","unstructured":"Stojanovski D., et al. Twitter sentiment analysis using deep convolutional neural network. In: International conference on hybrid artificial intelligence systems, Springer, Cham; 2015.","DOI":"10.1007\/978-3-319-19644-2_60"}],"updated-by":[{"DOI":"10.1007\/s42979-023-02168-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000}}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-0110-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-0110-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-0110-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T13:21:21Z","timestamp":1695907281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-0110-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["110"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-0110-0","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]},"assertion":[{"value":"18 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2023","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s42979-023-02168-3","URL":"https:\/\/doi.org\/10.1007\/s42979-023-02168-3","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"89"}}