{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T01:36:56Z","timestamp":1775785016629,"version":"3.50.1"},"reference-count":101,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00448-w","type":"journal-article","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T08:00:31Z","timestamp":1755504031000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Challenges in machine learning-based social bot detection: a systematic review"],"prefix":"10.1007","volume":"5","author":[{"given":"Nasser","family":"Alkathiri","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Slhoub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,18]]},"reference":[{"key":"448_CR1","doi-asserted-by":"crossref","unstructured":"Caruccio L, Desiato D, Polese G. Fake account identification in social networks. In: 2018 IEEE international conference on big data (big data); 2018. pp. 5078\u20135085. IEEE.","DOI":"10.1109\/BigData.2018.8622011"},{"issue":"7","key":"448_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A. The rise of social bots. Commun ACM. 2016; 59(7): 96\u2013104.","journal-title":"Commun ACM"},{"issue":"5","key":"448_CR3","doi-asserted-by":"publisher","first-page":"26933","DOI":"10.2196\/26933","volume":"23","author":"M Himelein-Wachowiak","year":"2021","unstructured":"Himelein-Wachowiak M, Giorgi S, Devoto A, Rahman M, Ungar L, Schwartz HA, Epstein DH, Leggio L, Curtis B. Bots and misinformation spread on social media: Implications for covid-19. J Med Internet Res. 2021; 23(5): 26933.","journal-title":"J Med Internet Res"},{"issue":"4","key":"448_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102250","volume":"57","author":"M Orabi","year":"2020","unstructured":"Orabi M, Mouheb D, Al Aghbari Z, Kamel I. Detection of bots in social media: a systematic review. Inform Process Manage. 2020;57(4): 102250.","journal-title":"Inform Process Manage"},{"key":"448_CR5","doi-asserted-by":"crossref","unstructured":"Alothali E, Zaki N, Mohamed EA, Alashwal H. Detecting social bots on twitter: a literature review. In: 2018 international conference on innovations in information technology (IIT); 2018. pp. 175\u2013180. IEEE.","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"key":"448_CR6","unstructured":"Yang K-C, Varol O, Nwala AC, Sayyadiharikandeh M, Ferrara E, Flammini A, Menczer F. Social bots: detection and challenges 2023. arXiv preprint arXiv:2312.17423."},{"issue":"12","key":"448_CR7","first-page":"8903","volume":"35","author":"K Hayawi","year":"2023","unstructured":"Hayawi K, Saha S, Masud MM, Mathew SS, Kaosar M. Social media bot detection with deep learning methods: a systematic review. Neural Comput Appl. 2023; 35(12): 8903\u201318.","journal-title":"Neural Comput Appl"},{"issue":"10","key":"448_CR8","doi-asserted-by":"publisher","first-page":"0241045","DOI":"10.1371\/journal.pone.0241045","volume":"15","author":"A Rauchfleisch","year":"2020","unstructured":"Rauchfleisch A, Kaiser J. The false positive problem of automatic bot detection in social science research. PLoS ONE. 2020; 15(10): 0241045.","journal-title":"PLoS ONE"},{"issue":"69","key":"448_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4114\/intartif.vol25iss69pp57-86","volume":"25","author":"R Al-azawi","year":"2022","unstructured":"Al-azawi R, Safaa O. Feature extractions and selection of bot detection on twitter a systematic literature review: feature extractions and selection of bot detection on twitter a systematic literature review. Intel Artif. 2022;25(69):57\u201386.","journal-title":"Intel Artif"},{"issue":"5","key":"448_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.04.004","volume":"35","author":"Z Ellaky","year":"2023","unstructured":"Ellaky Z, Benabbou F, Ouahabi S. Systematic literature review of social media bots detection systems. J King Saud Univ-Comput Inf Sci. 2023;35(5): 101551.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"448_CR11","unstructured":"Karata\u015f A, \u015eahin S. A review on social bot detection techniques and research directions. In: Proceedings of international security and cryptology conference Turkey; 2017. pp. 156\u2013161."},{"issue":"6","key":"448_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2016.183","volume":"49","author":"VS Subrahmanian","year":"2016","unstructured":"Subrahmanian VS, Azaria A, Durst S, Kagan V, Galstyan A, Lerman K, Zhu L, Ferrara E, Flammini A, Menczer F. The darpa twitter bot challenge. Computer. 2016;49(6):38\u201346.","journal-title":"Computer"},{"key":"448_CR13","unstructured":"DataReportal: Digital 2024: Global overview report\u2013 datareportal\u2013 global digital insights. Accessed: 2024-05-01. https:\/\/datareportal.com\/reports\/digital-2024-global-overview-report"},{"key":"448_CR14","doi-asserted-by":"crossref","unstructured":"Giorgi S, Ungar L, Schwartz HA. Characterizing social spambots by their human traits. In: Findings of the association for computational linguistics: ACL-IJCNLP 2021. pp. 5148\u20135158.","DOI":"10.18653\/v1\/2021.findings-acl.457"},{"key":"448_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jnca.2016.11.030","volume":"79","author":"KS Adewole","year":"2017","unstructured":"Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA. Malicious accounts: dark of the social networks. J Netw Comput Appl. 2017;79:41\u201367.","journal-title":"J Netw Comput Appl"},{"key":"448_CR16","volume-title":"Introduction to Machine Learning","author":"E Alpaydin","year":"2020","unstructured":"Alpaydin E. Introduction to Machine Learning. 4th ed. Cambridge, MA: MIT Press; 2020.","edition":"4"},{"key":"448_CR17","unstructured":"Kitchenham B, Charters S, et al. Guidelines for performing systematic literature reviews in software engineering. UK 2007."},{"issue":"2","key":"448_CR18","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1002\/cl2.1230","volume":"18","author":"NR Haddaway","year":"2022","unstructured":"Haddaway NR, Page MJ, Pritchard CC, McGuinness LA. Prisma 2020: An r package and shiny app for producing prisma 2020-compliant flow diagrams, with interactivity for optimised digital transparency and open synthesis. Campbell Syst Rev. 2022;18(2):1230. https:\/\/doi.org\/10.1002\/cl2.1230","journal-title":"Campbell Syst Rev"},{"key":"448_CR19","doi-asserted-by":"crossref","unstructured":"David I, Siordia OS, Moctezuma D. Features combination for the detection of malicious twitter accounts. In: 2016 IEEE international autumn meeting on power, electronics and computing (ROPEC); 2016. pp. 1\u20136. IEEE.","DOI":"10.1109\/ROPEC.2016.7830626"},{"key":"448_CR20","doi-asserted-by":"crossref","unstructured":"Davis CA, Varol O, Ferrara E, Flammini A, Menczer F. Botornot: A system to evaluate social bots. In: Proceedings of the 25th international conference companion on world wide web; 2016. pp. 273\u2013274. ACM.","DOI":"10.1145\/2872518.2889302"},{"key":"448_CR21","doi-asserted-by":"crossref","unstructured":"Kantepe M, Ganiz MC. Preprocessing framework for twitter bot detection. In: 2017 international conference on computer science and engineering (UBMK); 2017. pp. 630\u2013634. IEEE.","DOI":"10.1109\/UBMK.2017.8093483"},{"key":"448_CR22","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.ins.2016.08.036","volume":"372","author":"A Alarifi","year":"2016","unstructured":"Alarifi A, Alsaleh M, Al-Salman A. Twitter turing test: Identifying social machines. Inf Sci. 2016;372:332\u201346.","journal-title":"Inf Sci"},{"key":"448_CR23","doi-asserted-by":"publisher","unstructured":"Khaled S, El-Tazi N, Mokhtar HMO. Detecting fake accounts on social media. In: 2018 IEEE International Conference on Big Data (Big Data); 2018. pp. 3672\u20133681. https:\/\/doi.org\/10.1109\/BigData.2018.8621913.","DOI":"10.1109\/BigData.2018.8621913"},{"key":"448_CR24","doi-asserted-by":"crossref","unstructured":"Velayutham T, Tiwari PK. Bot identification: Helping analysts for right data in twitter. In: 2017 3rd international conference on advances in computing, communication and automation (ICACCA)(fall); 2017. pp. 1\u20135. IEEE.","DOI":"10.1109\/ICACCAF.2017.8344722"},{"key":"448_CR25","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.cose.2016.01.007","volume":"58","author":"Y Ji","year":"2016","unstructured":"Ji Y, He Y, Jiang X, Cao J, Li Q. Combating the evasion mechanisms of social bots. Comput Secur. 2016;58:230\u201349.","journal-title":"Comput Secur"},{"key":"448_CR26","doi-asserted-by":"crossref","unstructured":"Daouadi KE, Reba\u00ef RZ, Amous I. Bot detection on online social networks using deep forest. In: Artificial intelligence methods in intelligent algorithms: proceedings of 8th computer science on-line conference 2019. 2019;2(8):307\u2013315. Springer.","DOI":"10.1007\/978-3-030-19810-7_30"},{"key":"448_CR27","doi-asserted-by":"crossref","unstructured":"Teljstedt C, Rosell M, Johansson F. A semi-automatic approach for labeling large amounts of automated and non-automated social media user accounts. In: 2015 second european network intelligence conference; 2015. pp. 155\u2013159. IEEE.","DOI":"10.1109\/ENIC.2015.31"},{"key":"448_CR28","doi-asserted-by":"crossref","unstructured":"Gilani Z, Kochmar E, Crowcroft J. Classification of twitter accounts into automated agents and human users. In: Proceedings of the 2017 IEEE\/ACM international conference on advances in social networks analysis and mining 2017; 2017. pp. 489\u2013496.","DOI":"10.1145\/3110025.3110091"},{"key":"448_CR29","doi-asserted-by":"crossref","unstructured":"Yang W, Dong G, Wang W, Shen G, Gong L, Yu M, Lv J, Hu Y. Detecting bots in follower markets. In: Proceedings of 9th international conference bio-inspired computing-theories and applications: BIC-TA 2014, Wuhan, China, October 16-19, 2014. pp. 525\u2013530. Springer.","DOI":"10.1007\/978-3-662-45049-9_85"},{"issue":"8","key":"448_CR30","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang C, Harkreader R, Gu G. Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans Inf Forensics Secur. 2013;8(8):1280\u201393.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"448_CR31","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","volume":"13","author":"M Fazil","year":"2018","unstructured":"Fazil M, Abulaish M. A hybrid approach for detecting automated spammers in twitter. IEEE Trans Inf Forensics Secur. 2018;13(11):2707\u201319.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"448_CR32","doi-asserted-by":"crossref","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S. Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th annual computer security applications conference; 2010. pp. 21\u201330.","DOI":"10.1145\/1920261.1920265"},{"key":"448_CR33","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta S, Ferrara E. Deep neural networks for bot detection. Inf Sci. 2018;467:312\u201322.","journal-title":"Inf Sci"},{"key":"448_CR34","doi-asserted-by":"crossref","unstructured":"Wang Y, Wu C, Zheng K, Wang X. Social bot detection using tweets similarity. In: International conference on security and privacy in communication systems; 2018. pp. 63\u201378. Springer.","DOI":"10.1007\/978-3-030-01704-0_4"},{"key":"448_CR35","doi-asserted-by":"crossref","unstructured":"Ping H, Qin S. A social bots detection model based on deep learning algorithm. In: 2018 IEEE 18th international conference on communication technology (ICCT); 2018. pp. 1435\u20131439. IEEE.","DOI":"10.1109\/ICCT.2018.8600029"},{"key":"448_CR36","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2015.10.039","volume":"332","author":"RA Igawa","year":"2016","unstructured":"Igawa RA, Barbon S Jr, Paulo KCS, Kido GS, Guido RC, J\u00fanior MLP, Silva IN. Account classification in online social networks with lbca and wavelets. Inf Sci. 2016;332:72\u201383.","journal-title":"Inf Sci"},{"key":"448_CR37","doi-asserted-by":"crossref","unstructured":"Dickerson JP, Kagan V, Subrahmanian V. Using sentiment to detect bots on twitter: Are humans more opinionated than bots? In: 2014 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM 2014); 2014. pp. 620\u2013627. IEEE.","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"448_CR38","doi-asserted-by":"crossref","unstructured":"Morstatter F, Wu L, Nazer TH, Carley KM, Liu H. A new approach to bot detection: striking the balance between precision and recall. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM); 2016. pp. 533\u2013540. IEEE.","DOI":"10.1109\/ASONAM.2016.7752287"},{"key":"448_CR39","doi-asserted-by":"crossref","unstructured":"Jr SB, Campos GF, Tavares GM, Igawa RA Jr, MLP, Guido RC. Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Trans Multimed Comput Commun Appl. 2018;14(1):1\u201317.","DOI":"10.1145\/3183506"},{"issue":"4","key":"448_CR40","first-page":"561","volume":"15","author":"S Cresci","year":"2017","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M. Social fingerprinting: detection of spambot groups through dna-inspired behavioral modeling. IEEE Trans Dependable Secure Comput. 2017;15(4):561\u201376.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"448_CR41","doi-asserted-by":"publisher","first-page":"45800","DOI":"10.1109\/ACCESS.2019.2904220","volume":"7","author":"O Loyola-Gonz\u00e1lez","year":"2019","unstructured":"Loyola-Gonz\u00e1lez O, Monroy R, Rodr\u00edguez J, L\u00f3pez-Cuevas A, Mata-S\u00e1nchez JI. Contrast pattern-based classification for bot detection on twitter. IEEE Access. 2019;7:45800\u201317.","journal-title":"IEEE Access"},{"key":"448_CR42","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10588-018-09290-1","volume":"25","author":"DM Beskow","year":"2019","unstructured":"Beskow DM, Carley KM. Its all in a name: detecting and labeling bots by their name. Comput Math Organ Theory. 2019;25:24\u201335.","journal-title":"Comput Math Organ Theory"},{"key":"448_CR43","doi-asserted-by":"crossref","unstructured":"Beskow DM, Carley KM. Bot conversations are different: leveraging network metrics for bot detection in twitter. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM); 2018. pp. 825\u2013832. IEEE.","DOI":"10.1109\/ASONAM.2018.8508322"},{"issue":"10\u201311","key":"448_CR44","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.comcom.2013.04.004","volume":"36","author":"F Ahmed","year":"2013","unstructured":"Ahmed F, Abulaish M. A generic statistical approach for spam detection in online social networks. Comput Commun. 2013;36(10\u201311):1120\u20139.","journal-title":"Comput Commun"},{"key":"448_CR45","doi-asserted-by":"crossref","unstructured":"Sujith K, Chowdhury S, Goyal A, Hegde AV, Srinath R. Twitter bot detection and ranking using supervised machine learning models. In: 2022 international conference on data science, agents & artificial intelligence (ICDSAAI). 2022;1:1\u20136. IEEE.","DOI":"10.1109\/ICDSAAI55433.2022.10028860"},{"key":"448_CR46","doi-asserted-by":"crossref","unstructured":"Pramitha FN, Hadiprakoso RB, Qomariasih N, et al Twitter bot account detection using supervised machine learning. In: 2021 4th international seminar on research of information technology and intelligent systems (ISRITI); 2021. pp. 379\u2013383. IEEE.","DOI":"10.1109\/ISRITI54043.2021.9702789"},{"key":"448_CR47","doi-asserted-by":"crossref","unstructured":"Al-Ibadi SEN, Cevik M. Performance comparison of deep learning algorithms in twitter bot detection. In: 2022 fifth college of science international conference of recent trends in information technology (CSCTIT); 2022. pp. 225\u2013229. IEEE.","DOI":"10.1109\/CSCTIT56299.2022.10145657"},{"key":"448_CR48","doi-asserted-by":"crossref","unstructured":"Gannarapu S, Dawoud A, Ali RS, Alwan A. Bot detection using machine learning algorithms on social media platforms. In: 2020 5th international conference on innovative technologies in intelligent systems and industrial applications (CITISIA); 2020. pp. 1\u20138. IEEE.","DOI":"10.1109\/CITISIA50690.2020.9371778"},{"key":"448_CR49","doi-asserted-by":"crossref","unstructured":"Belokurov D, Shamakova E, Kolomoitcev V. Using machine learning techniques to identify bot accounts on a social network. In: 2021 wave electronics and its application in information and telecommunication systems (WECONF); 2021. pp. 1\u20135. IEEE.","DOI":"10.1109\/WECONF51603.2021.9470605"},{"key":"448_CR50","doi-asserted-by":"crossref","unstructured":"Messai A, Hamida ZF, Drif A, Giordano S. Multi-input bilstm deep learning model for social bot detection. In: 2023 international conference on advances in electronics, control and communication systems (ICAECCS); 2023. pp. 1\u20136. IEEE.","DOI":"10.1109\/ICAECCS56710.2023.10104646"},{"key":"448_CR51","doi-asserted-by":"crossref","unstructured":"Tyagi T, Sharma P, Bansal R, Jain K, Bansal P, Malik K, et al. Twitter bot detection using machine learning models. In: 2023 13th international conference on cloud computing, data science and engineering (confluence); 2023. pp. 26\u201330. IEEE.","DOI":"10.1109\/Confluence56041.2023.10048796"},{"key":"448_CR52","doi-asserted-by":"crossref","unstructured":"Bui T, Potika K. Detecting twitter bots with machine learning and propagation graph analysis. In: 2023 fifth international conference on transdisciplinary AI (TransAI); 2023. pp. 87\u201390. IEEE.","DOI":"10.1109\/TransAI60598.2023.00022"},{"key":"448_CR53","doi-asserted-by":"crossref","unstructured":"Madahali L, Tian J. Bots: Genuine or malicious. In: 2023 IEEE 14th annual ubiquitous computing, electronics & mobile communication conference (UEMCON); 2023. pp. 0669\u20130673. IEEE.","DOI":"10.1109\/UEMCON59035.2023.10316169"},{"key":"448_CR54","doi-asserted-by":"crossref","unstructured":"Alothali E, Alashwal H, Salih M, Hayawi K. Real time detection of social bots on twitter using machine learning and apache Kafka. In: 2021 5th cyber security in networking conference (CSNet); 2021. pp. 98\u2013102. IEEE.","DOI":"10.1109\/CSNet52717.2021.9614282"},{"key":"448_CR55","doi-asserted-by":"crossref","unstructured":"Bab\u00fcr Z, Bekdemir U, \u015een A, \u00c7ark\u0131t \u015e\u00d6, Gen\u00e7 O, G\u00fclc\u00fc A, G\u00fcm\u00fc\u015fta\u015f C, Soyak EG. Unmasking twitter bots: feature engineering and machine learning for bot account identification. In: 2023 innovations in intelligent systems and applications conference (ASYU); 2023. pp. 1\u20136. IEEE.","DOI":"10.1109\/ASYU58738.2023.10296706"},{"key":"448_CR56","doi-asserted-by":"crossref","unstructured":"Wei F, Nguyen UT. Twitter bot detection using bidirectional long short-term memory neural networks and word embeddings. In: 2019 First IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS-ISA); 2019. pp. 101\u2013109. IEEE.","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"key":"448_CR57","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1109\/TIFS.2023.3254429","volume":"18","author":"E Arin","year":"2023","unstructured":"Arin E, Kutlu M. Deep learning based social bot detection on twitter. IEEE Trans Inf Forensics Secur. 2023;18:1763\u201372.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"448_CR58","doi-asserted-by":"crossref","unstructured":"Ellaky Z, Benabbou F, Ouahabi S, Sael N. Word embedding for social bot detection systems. In: 2021 fifth international conference on intelligent computing in data sciences (ICDS); 2021. pp. 1\u20138. IEEE.","DOI":"10.1109\/ICDS53782.2021.9626752"},{"key":"448_CR59","doi-asserted-by":"crossref","unstructured":"Ting I-H, Minetaki K, Hsu M-Y, Yen C-S. Applying social network embedding and word embedding for socialbots detection. In: Proceedings of the international conference on advances in social networks analysis and mining; 2023. pp. 712\u2013718.","DOI":"10.1145\/3625007.3627306"},{"key":"448_CR60","doi-asserted-by":"crossref","unstructured":"Liu Y, Tan Z, Wang H, Feng S, Zheng Q, Luo M. Botmoe: Twitter bot detection with community-aware mixtures of modal-specific experts. In: Proceedings of the 46th International ACM SIGIR conference on research and development in information retrieval; 2023. pp. 485\u2013495.","DOI":"10.1145\/3539618.3591646"},{"key":"448_CR61","doi-asserted-by":"crossref","unstructured":"Lu Q, Li S, Li K, Zhou W, Zang L. Adaptive mixture of domain-aware experts for detecting social bots. In: 2024 27th international conference on computer supported cooperative work in design (CSCWD); 2024. pp. 2072\u20132077. IEEE.","DOI":"10.1109\/CSCWD61410.2024.10580022"},{"key":"448_CR62","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/OJCS.2023.3302286","volume":"4","author":"F Wei","year":"2023","unstructured":"Wei F, Nguyen UT. Twitter bot detection using neural networks and linguistic embeddings. IEEE Open J Comput Soc. 2023;4:218\u201330.","journal-title":"IEEE Open J Comput Soc"},{"key":"448_CR63","doi-asserted-by":"crossref","unstructured":"Kolomeets M, Tushkanova O, Levshun D, Chechulin A. Camouflaged bot detection using the friend list. In: 2021 29th Euromicro international conference on parallel, distributed and network-based processing (PDP); 2021. pp. 253\u2013259. IEEE.","DOI":"10.1109\/PDP52278.2021.00048"},{"key":"448_CR64","doi-asserted-by":"crossref","unstructured":"Mohanty S, Dwivedy SP, Acharya AA, Mohapatra S, Sahoo SS, Samal S, Samal S. Enhancing the detection of social bots on twitter using ensemble machine learning technique. In: 2022 international conference on advancements in smart, secure and intelligent computing (ASSIC); 2022. pp. 1\u20136. IEEE.","DOI":"10.1109\/ASSIC55218.2022.10088372"},{"key":"448_CR65","doi-asserted-by":"crossref","unstructured":"Chen Y, Bouazizi M, Ohtsuki T. Social robot detection using roberta classifier and random forest regressor with similarity analysis. In: GLOBECOM 2022-2022 IEEE global communications conference; 2022. pp. 6433\u20136438. IEEE.","DOI":"10.1109\/GLOBECOM48099.2022.10001445"},{"key":"448_CR66","doi-asserted-by":"publisher","first-page":"108365","DOI":"10.1109\/ACCESS.2023.3320687","volume":"11","author":"A Aguilera","year":"2023","unstructured":"Aguilera A, Quinteros P, Dongo I. Cardinale Y Credibot: applying bot detection for credibility analysis on twitter. IEEE Access. 2023;11:108365\u201385.","journal-title":"IEEE Access"},{"key":"448_CR67","doi-asserted-by":"crossref","unstructured":"Abreu JVF, Ralha CG, Gondim JJC. Twitter bot detection with reduced feature set. In: 2020 IEEE international conference on intelligence and security informatics (ISI); 2020. pp. 1\u20136. IEEE.","DOI":"10.1109\/ISI49825.2020.9280525"},{"key":"448_CR68","doi-asserted-by":"crossref","unstructured":"Boreggah B, Alrazooq A, Al-Razgan M, AlShabib H. Analysis of arabic bot behaviors. In: 2018 21st Saudi computer society national computer conference (NCC); 2018. pp. 1\u20136. IEEE.","DOI":"10.1109\/NCG.2018.8592980"},{"key":"448_CR69","doi-asserted-by":"crossref","unstructured":"Javed D, Jhanjhi NZ, Khan NA. Explainable twitter bot detection model for limited features. In: International conference on green energy, computing and intelligent technology (GEn-CITy 2023). 2023;2023:476\u2013481.","DOI":"10.1049\/icp.2023.1822"},{"key":"448_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107360","volume":"107","author":"L Ilias","year":"2021","unstructured":"Ilias L, Roussaki I. Detecting malicious activity in twitter using deep learning techniques. Appl Soft Comput. 2021;107: 107360.","journal-title":"Appl Soft Comput"},{"key":"448_CR71","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.neucom.2018.07.044","volume":"315","author":"I Inuwa-Dutse","year":"2018","unstructured":"Inuwa-Dutse I, Liptrott M, Korkontzelos I. Detection of spam-posting accounts on twitter. Neurocomputing. 2018;315:496\u2013511.","journal-title":"Neurocomputing"},{"key":"448_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106525","volume":"211","author":"Y Wu","year":"2021","unstructured":"Wu Y, Fang Y, Shang S, Jin J, Wei L, Wang H. A novel framework for detecting social bots with deep neural networks and active learning. Knowl-Based Syst. 2021;211: 106525.","journal-title":"Knowl-Based Syst"},{"key":"448_CR73","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Alhosseini S, Bin\u00a0Tareaf R, Najafi P, Meinel C. Detect me if you can: Spam bot detection using inductive representation learning. In: Companion proceedings of the 2019 world wide web conference; 2019. pp. 148\u2013153.","DOI":"10.1145\/3308560.3316504"},{"key":"448_CR74","doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Luo M. Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM international conference on advances in social networks analysis and mining; 2021. pp. 236\u2013239.","DOI":"10.1145\/3487351.3488336"},{"key":"448_CR75","doi-asserted-by":"crossref","unstructured":"Albadi N, Kurdi M, Mishra S. Hateful people or hateful bots? detection and characterization of bots spreading religious hatred in Arabic social media. Proc ACM Human-Comput Interact 3(CSCW); 2019. pp. 1\u201325.","DOI":"10.1145\/3359163"},{"key":"448_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2023.102245","volume":"149","author":"I Dimitriadis","year":"2024","unstructured":"Dimitriadis I, Dialektakis G, Vakali A. Caleb: A conditional adversarial learning framework to enhance bot detection. Data Knowle Eng. 2024;149: 102245.","journal-title":"Data Knowle Eng"},{"issue":"1","key":"448_CR77","doi-asserted-by":"publisher","first-page":"6525","DOI":"10.1038\/s41598-024-57227-3","volume":"14","author":"M Mendoza","year":"2024","unstructured":"Mendoza M, Providel E, Santos M, Valenzuela S. Detection and impact estimation of social bots in the Chilean twitter network. Sci Rep. 2024;14(1):6525.","journal-title":"Sci Rep"},{"key":"448_CR78","doi-asserted-by":"crossref","unstructured":"Gurajala S, White JS, Hudson B, Matthews JN. Fake twitter accounts: profile characteristics obtained using an activity-based pattern detection approach. In: Proceedings of the 2015 international conference on social media & society; 2015. pp. 1\u20137.","DOI":"10.1145\/2789187.2789206"},{"key":"448_CR79","doi-asserted-by":"crossref","unstructured":"Chavoshi N, Hamooni H, Mueen A. Debot: Twitter bot detection via warped correlation. In: Icdm. 2016;18:28\u201365.","DOI":"10.1109\/ICDM.2016.0096"},{"key":"448_CR80","doi-asserted-by":"crossref","unstructured":"Minnich A, Chavoshi N, Koutra D, Mueen A. Botwalk: Efficient adaptive exploration of twitter bot networks. In: Proceedings of the 2017 IEEE\/ACM international conference on advances in social networks analysis and mining 2017; 2017. pp. 467\u2013474.","DOI":"10.1145\/3110025.3110163"},{"key":"448_CR81","unstructured":"Chen Z, Subramanian D. An unsupervised approach to detect spam campaigns that use botnets on Twitter. arXiv 2018."},{"key":"448_CR82","doi-asserted-by":"crossref","unstructured":"Khalil H, Khan MU, Ali M. Feature selection for unsupervised bot detection. In: 2020 3rd international conference on computing, mathematics and engineering technologies (iCoMET); 2020. pp. 1\u20137. IEEE.","DOI":"10.1109\/iCoMET48670.2020.9074131"},{"key":"448_CR83","doi-asserted-by":"crossref","unstructured":"Wu J, Teng E, Cao Z. Twitter bot detection through unsupervised machine learning. In: 2022 IEEE international conference on big data (big data); 2022. pp. 5833\u20135839. IEEE.","DOI":"10.1109\/BigData55660.2022.10020983"},{"key":"448_CR84","doi-asserted-by":"crossref","unstructured":"Mannocci L, Cresci S, Monreale A, Vakali A, Tesconi M. Mulbot: Unsupervised bot detection based on multivariate time series. In: 2022 IEEE international conference on big data (big data); 2022. pp. 1485\u20131494. IEEE.","DOI":"10.1109\/BigData55660.2022.10020363"},{"key":"448_CR85","doi-asserted-by":"crossref","unstructured":"Zhou M, Zhang D, Wang Y, Geng Y-A, Tang J. Detecting social bot on the fly using contrastive learning. In: Proceedings of the 32nd ACM international conference on information and knowledge management; 2023. pp. 4995\u20135001.","DOI":"10.1145\/3583780.3615468"},{"key":"448_CR86","doi-asserted-by":"crossref","unstructured":"Cresci S, Petrocchi M, Spognardi A, Tognazzi S. Better safe than sorry: an adversarial approach to improve social bot detection. In: Proceedings of the 10th ACM conference on web science; 2019. pp. 47\u201356.","DOI":"10.1145\/3292522.3326030"},{"key":"448_CR87","doi-asserted-by":"crossref","unstructured":"Mazza M, Cresci S, Avvenuti M, Quattrociocchi W, Tesconi M. Rtbust: Exploiting temporal patterns for botnet detection on twitter. In: Proceedings of the 10th ACM conference on web science; 2019. pp. 183\u2013192.","DOI":"10.1145\/3292522.3326015"},{"key":"448_CR88","doi-asserted-by":"crossref","unstructured":"Li Y, Li Z, Gong D, Hu Q, Lu H. Botcl: a social bot detection model based on graph contrastive learning. Knowl. Inf. Syst. 2024. pp. 1\u201318.","DOI":"10.21203\/rs.3.rs-3644532\/v1"},{"key":"448_CR89","doi-asserted-by":"publisher","first-page":"28855","DOI":"10.1109\/ACCESS.2019.2901864","volume":"7","author":"P Shi","year":"2019","unstructured":"Shi P, Zhang Z, Choo K-KR. Detecting malicious social bots based on clickstream sequences. IEEE Access. 2019;7:28855\u201362.","journal-title":"IEEE Access"},{"key":"448_CR90","doi-asserted-by":"crossref","unstructured":"Dorri A, Abadi M, Dadfarnia M. Socialbothunter: Botnet detection in twitter-like social networking services using semi-supervised collective classification. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th international conference on pervasive intelligence and computing, 4th International conference on big data intelligence and computing and cyber science and technology Congress; 2018. pp. 496\u2013503. IEEE.","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00097"},{"issue":"1","key":"448_CR91","doi-asserted-by":"publisher","first-page":"8022","DOI":"10.1038\/s41598-022-11854-w","volume":"12","author":"R Gilmary","year":"2022","unstructured":"Gilmary R, Venkatesan A, Vaiyapuri G, Balamurali D. Dna-influenced automated behavior detection on twitter through relative entropy. Sci Rep. 2022;12(1):8022.","journal-title":"Sci Rep"},{"issue":"15","key":"448_CR92","doi-asserted-by":"publisher","first-page":"11109","DOI":"10.1007\/s00500-020-04689-y","volume":"24","author":"NR Aljohani","year":"2020","unstructured":"Aljohani NR, Fayoumi A, Hassan S-U. Bot prediction on social networks of twitter in altmetrics using deep graph convolutional networks. Soft Comput. 2020;24(15):11109\u201320.","journal-title":"Soft Comput"},{"issue":"5","key":"448_CR93","doi-asserted-by":"publisher","first-page":"6528","DOI":"10.1109\/TCSS.2024.3396413","volume":"11","author":"H Huang","year":"2024","unstructured":"Huang H, Tian H, Zheng X, Zhang X, Zeng DD, Wang F-Y. Cgnn: A compatibility-aware graph neural network for social media bot detection. IEEE Trans Comput Soc Syst. 2024;11(5):6528\u201343.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"448_CR94","doi-asserted-by":"crossref","unstructured":"Qiao B, Zhou W, Li K, Li S, Hu S. Dispelling the fake: Social bot detection based on edge confidence evaluation. IEEE Trans Neural Netw Learning Syst (2024).","DOI":"10.1109\/TNNLS.2024.3396192"},{"issue":"4","key":"448_CR95","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1109\/TCSS.2020.2992223","volume":"7","author":"RR Rout","year":"2020","unstructured":"Rout RR, Lingam G, Somayajulu DV. Detection of malicious social bots using learning automata with url features in twitter network. IEEE Trans Comput Soc Syst. 2020;7(4):1004\u201318.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"448_CR96","doi-asserted-by":"crossref","unstructured":"Lingam G, Rout RR, Somayajulu DV. Deep q-learning and particle swarm optimization for bot detection in online social networks. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT); 2019. pp. 1\u20136. IEEE.","DOI":"10.1109\/ICCCNT45670.2019.8944493"},{"key":"448_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111690","volume":"293","author":"X Wang","year":"2024","unstructured":"Wang X, Wang K, Chen K, Wang Z, Zheng K. Unsupervised twitter social bot detection using deep contrastive graph clustering. Knowl-Based Syst. 2024; 293: 111690.","journal-title":"Knowl-Based Syst"},{"key":"448_CR98","unstructured":"Adams T. Ai-powered social bots. arXiv preprint arXiv:1706.05143 2017."},{"key":"448_CR99","doi-asserted-by":"crossref","unstructured":"Cresci S, Di\u00a0Pietro R, Petrocchi M, Spognardi A, Tesconi M. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In: Proceedings of the 26th international conference on world wide web companion; 2017. pp. 963\u2013972.","DOI":"10.1145\/3041021.3055135"},{"key":"448_CR100","doi-asserted-by":"crossref","unstructured":"Sallah A, Agoujil S, Wani MA, Hammad M, Abd\u00a0El-Latif AA, Maleh Y, et al. Fine-tuned understanding: Enhancing social bot detection with transformer-based classification. IEEE Access 2024.","DOI":"10.1109\/ACCESS.2024.3440657"},{"key":"448_CR101","doi-asserted-by":"crossref","unstructured":"Gupta S, Sinha A. Machine learning classifiers for social media bots detection on twitter using explainable AI. In: 2023 second international conference on informatics (ICI); 2023. pp. 1\u20135. IEEE.","DOI":"10.1109\/ICI60088.2023.10421550"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00448-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00448-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00448-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T15:40:08Z","timestamp":1757432408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00448-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,18]]},"references-count":101,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["448"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00448-w","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,18]]},"assertion":[{"value":"2 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participatec"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"214"}}