{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:56Z","timestamp":1740181616806,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03562-1","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T14:08:20Z","timestamp":1734617300000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Deceptive Identities: A Machine Learning Approach to Unveiling Fake Profiles on Social Media"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7338-5920","authenticated-orcid":false,"given":"P.","family":"Kaviya","sequence":"first","affiliation":[]},{"given":"I.","family":"Sudharsana","sequence":"additional","affiliation":[]},{"given":"B.","family":"Bala Chibi Hariesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"issue":"7","key":"3562_CR1","doi-asserted-by":"publisher","first-page":"4802","DOI":"10.1007\/s11227-018-2641-x","volume":"76","author":"KS Adewole","year":"2018","unstructured":"Adewole KS, Han T, Wu W, et al. Twitter spam account detection based on clustering and classification methods. J Supercomput. 2018;76(7):4802\u201337. https:\/\/doi.org\/10.1007\/s11227-018-2641-x.","journal-title":"J Supercomput"},{"key":"3562_CR2","doi-asserted-by":"publisher","unstructured":"Adikari S, Dutta K. Identifying fake profiles in linkedin. 2020. https:\/\/doi.org\/10.48550\/ARXIV.2006.01381","DOI":"10.48550\/ARXIV.2006.01381"},{"key":"3562_CR3","doi-asserted-by":"publisher","unstructured":"Al-Zoubi AM, Alqatawna J, Paris H. Spam profile detection in social networks based on public features. In: 2017 8th international conference on information and communication Ssystems (ICICS). IEEE, 2017. https:\/\/doi.org\/10.1109\/iacs.2017.7921959","DOI":"10.1109\/iacs.2017.7921959"},{"key":"3562_CR4","doi-asserted-by":"publisher","unstructured":"Alam MN, Sarma D, Lima FF, et\u00a0al. Phishing attacks detection using machine learning approach. In: 2020 third international conference on smart systems and inventive technology (ICSSIT). IEEE, 2020. https:\/\/doi.org\/10.1109\/icssit48917.2020.9214225","DOI":"10.1109\/icssit48917.2020.9214225"},{"key":"3562_CR5","doi-asserted-by":"publisher","unstructured":"Bhattacharya A, Bathla R, Rana A, et\u00a0al. Application of machine learning techniques in detecting fake profiles on social media. In: 2021 9th international conference on reliability, infocom technologies and optimization (trends and future Ddirections) (ICRITO). IEEE, 2021. https:\/\/doi.org\/10.1109\/icrito51393.2021.9596373","DOI":"10.1109\/icrito51393.2021.9596373"},{"issue":"10","key":"3562_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4236\/jcc.2022.1010006","volume":"10","author":"P Chakraborty","year":"2022","unstructured":"Chakraborty P, Shazan MM, Nahid M, et al. Fake profile detection using machine learning techniques. J Comput Commun. 2022;10(10):74\u201387. https:\/\/doi.org\/10.4236\/jcc.2022.1010006.","journal-title":"J Comput Commun"},{"issue":"6","key":"3562_CR7","doi-asserted-by":"publisher","first-page":"9029","DOI":"10.1007\/s11042-022-12788-1","volume":"82","author":"D Choudhury","year":"2022","unstructured":"Choudhury D, Acharjee T. A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers. Multimedia Tools and Applications. 2022;82(6):9029\u201345. https:\/\/doi.org\/10.1007\/s11042-022-12788-1.","journal-title":"Multimedia Tools and Applications"},{"key":"3562_CR8","doi-asserted-by":"publisher","unstructured":"Elyusufi Y, Elyusufi Z, Kbir MA. Social networks fake profiles detection using machine learning algorithms. Springer, New York. 2020;30\u201340. https:\/\/doi.org\/10.1007\/978-3-030-37629-1_3.","DOI":"10.1007\/978-3-030-37629-1_3"},{"key":"3562_CR9","doi-asserted-by":"publisher","unstructured":"Goyal B, Gill NS, Gulia P, et\u00a0al. Detection of fake accounts on social media using multimodal data with deep learning. IEEE Trans Comput Soc Syst 2024:1-12. https:\/\/doi.org\/10.1109\/tcss.2023.3296837","DOI":"10.1109\/tcss.2023.3296837"},{"key":"3562_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2020.11.022","volume":"117","author":"S Hakak","year":"2021","unstructured":"Hakak S, Alazab M, Khan S, et al. An ensemble machine learning approach through effective feature extraction to classify fake news. Futur Gener Comput Syst. 2021;117:47\u201358. https:\/\/doi.org\/10.1016\/j.future.2020.11.022.","journal-title":"Futur Gener Comput Syst"},{"key":"3562_CR11","doi-asserted-by":"publisher","unstructured":"Harris P, Gojal J, Chitra R. Fake instagram profile identification and classification using machine learning. In: et al. 2nd Global conference for advancement in technology (GCAT). IEEE. 2021. https:\/\/doi.org\/10.1109\/gcat52182.2021.9587858.","DOI":"10.1109\/gcat52182.2021.9587858"},{"key":"3562_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118558","volume":"211","author":"A Kishwar","year":"2023","unstructured":"Kishwar A, Zafar A. Fake news detection on pakistani news using machine learning and deep learning. Expert Syst Appl. 2023;211: 118558. https:\/\/doi.org\/10.1016\/j.eswa.2022.118558.","journal-title":"Expert Syst Appl"},{"key":"3562_CR13","doi-asserted-by":"publisher","unstructured":"Kondeti P, Yerramreddy LP, Pradhan A, et\u00a0al. Fake account detection using machine learning. Springer Singapore, 2020;791\u2013802. https:\/\/doi.org\/10.1007\/978-981-15-5258-8_73","DOI":"10.1007\/978-981-15-5258-8_73"},{"issue":"17","key":"3562_CR14","doi-asserted-by":"publisher","first-page":"26353","DOI":"10.1007\/s11042-023-14347-8","volume":"82","author":"A Mughaid","year":"2023","unstructured":"Mughaid A, Obeidat I, AlZu\u2019bi S, et al. A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks. Multimed Tools Appl. 2023;82(17):26353\u201378. https:\/\/doi.org\/10.1007\/s11042-023-14347-8.","journal-title":"Multimed Tools Appl"},{"key":"3562_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18644-8","author":"SH Nawal","year":"2024","unstructured":"Nawal SH, Noria T, Abdelkader IKM. Behavioral biometrics to detect fake expert profiles during negotiation. Multimed Tools Appl. 2024. https:\/\/doi.org\/10.1007\/s11042-024-18644-8.","journal-title":"Multimed Tools Appl"},{"key":"3562_CR16","doi-asserted-by":"publisher","unstructured":"P L, V S, Sasikala V, et\u00a0al. Fake profile identification in social network using machine learning and nlp. In: 2022 international conference on communication, computing and internet of things (IC3IoT). IEEE, 2022. https:\/\/doi.org\/10.1109\/ic3iot53935.2022.9767958","DOI":"10.1109\/ic3iot53935.2022.9767958"},{"key":"3562_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","volume":"65","author":"D Ramalingam","year":"2018","unstructured":"Ramalingam D, Chinnaiah V. Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng. 2018;65:165\u201377. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.020.","journal-title":"Comput Electr Eng"},{"key":"3562_CR18","doi-asserted-by":"publisher","unstructured":"Ravi\u00a0Kumar G, Nagamani K, Anjan\u00a0Babu G. A framework of dimensionality reduction utilizing PCA for neural network prediction. Springer, Singapore, 2020;173\u2013180. https:\/\/doi.org\/10.1007\/978-981-15-0978-0_16,","DOI":"10.1007\/978-981-15-0978-0_16"},{"issue":"3","key":"3562_CR19","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/tai.2021.3064901","volume":"1","author":"PK Roy","year":"2020","unstructured":"Roy PK, Chahar S. Fake profile detection on social networking websites: a comprehensive review. IEEE Trans Artif Intell. 2020;1(3):271\u201385. https:\/\/doi.org\/10.1109\/tai.2021.3064901.","journal-title":"IEEE Trans Artif Intell"},{"key":"3562_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106983","volume":"100","author":"SR Sahoo","year":"2021","unstructured":"Sahoo SR, Gupta B. Multiple features based approach for automatic fake news detection on social networks using deep learning. Appl Soft Comput. 2021;100: 106983. https:\/\/doi.org\/10.1016\/j.asoc.2020.106983.","journal-title":"Appl Soft Comput"},{"issue":"1","key":"3562_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11277-021-08095-x","volume":"127","author":"M Senthil Raja","year":"2021","unstructured":"Senthil Raja M, Arun Raj L. Detection of malicious profiles and protecting users in online social networks. Wirel Pers Commun. 2021;127(1):107\u201324. https:\/\/doi.org\/10.1007\/s11277-021-08095-x.","journal-title":"Wirel Pers Commun"},{"key":"3562_CR22","doi-asserted-by":"publisher","unstructured":"Shah A, Varshney S, Mehrotra M. Detection of fake profiles on online social network platforms: performance evaluation of artificial intelligence techniques. SN Computer Science, 2024;5(5). https:\/\/doi.org\/10.1007\/s42979-024-02839-9","DOI":"10.1007\/s42979-024-02839-9"},{"key":"3562_CR23","doi-asserted-by":"publisher","unstructured":"Umbrani K, Shah D, Pile A. Fake profile detection using machine learning. In: et al. ASU international conference in emerging technologies for sustainability and intelligent systems (ICETSIS). IEEE. 2024. https:\/\/doi.org\/10.1109\/icetsis61505.2024.10459570.","DOI":"10.1109\/icetsis61505.2024.10459570"},{"key":"3562_CR24","doi-asserted-by":"publisher","first-page":"156695","DOI":"10.1109\/access.2020.3019735","volume":"8","author":"M Umer","year":"2020","unstructured":"Umer M, Imtiaz Z, Ullah S, et al. Fake news stance detection using deep learning architecture (cnn-lstm). IEEE Access. 2020;8:156695\u2013706. https:\/\/doi.org\/10.1109\/access.2020.3019735.","journal-title":"IEEE Access"},{"key":"3562_CR25","doi-asserted-by":"publisher","first-page":"6540","DOI":"10.1109\/access.2018.2796018","volume":"6","author":"E Van Der Walt","year":"2018","unstructured":"Van Der Walt E, Eloff J. Using machine learning to detect fake identities: bots vs humans. IEEE Access. 2018;6:6540\u20139. https:\/\/doi.org\/10.1109\/access.2018.2796018.","journal-title":"IEEE Access"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03562-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03562-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03562-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T15:06:24Z","timestamp":1734620784000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03562-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["3562"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03562-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"26 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors assure that this work is the outcome of the research work and it has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere. This article does not contain any studies involving human participants \/ animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}}],"article-number":"16"}}