{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:33:00Z","timestamp":1768595580303,"version":"3.49.0"},"reference-count":90,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.engappai.2025.113421","type":"journal-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:09:35Z","timestamp":1765354175000},"page":"113421","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PB","title":["Enhanced information processing for smart detection of clone accounts on social media"],"prefix":"10.1016","volume":"165","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4783-3857","authenticated-orcid":false,"given":"Rupa","family":"Rani","sequence":"first","affiliation":[]},{"given":"Kuldeep Kumar","family":"Yogi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2634-5600","authenticated-orcid":false,"given":"Satya Prakash","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"30","key":"10.1016\/j.engappai.2025.113421_bib1","doi-asserted-by":"crossref","DOI":"10.1126\/sciadv.abb5824","article-title":"Content-based features predict social media influence operations","volume":"6","author":"Alizadeh","year":"2020","journal-title":"Sci. Adv."},{"issue":"2","key":"10.1016\/j.engappai.2025.113421_bib2","doi-asserted-by":"crossref","DOI":"10.1177\/2053168019848554","article-title":"Trends in the diffusion of misinformation on social media","volume":"6","author":"Allcott","year":"2019","journal-title":"Res. Politics"},{"key":"10.1016\/j.engappai.2025.113421_bib3","article-title":"A deep learning model for Twitter spam detection","volume":"18","author":"Alom","year":"2020","journal-title":"Online Soc. Netw. Media"},{"key":"10.1016\/j.engappai.2025.113421_bib4","article-title":"A deep learning model for Twitter spam detection","volume":"18","author":"Alom","year":"2020","journal-title":"Online Soc. Netw. Media"},{"issue":"21","key":"10.1016\/j.engappai.2025.113421_bib5","doi-asserted-by":"crossref","DOI":"10.3390\/app132111731","article-title":"The development of a secure online system to protect social networking platforms from security attacks","volume":"13","author":"Alothman","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2025.113421_bib6","series-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","first-page":"1","article-title":"The human in emotion recognition on social media: attitudes, outcomes, risks","author":"Andalibi","year":"2020"},{"key":"10.1016\/j.engappai.2025.113421_bib7","doi-asserted-by":"crossref","DOI":"10.1051\/itmconf\/20235601003","article-title":"A novel approach for clone app detection using VADER's algorithm","volume":"56","author":"Antad","year":"2023","journal-title":"ITM Web Conf."},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib8","doi-asserted-by":"crossref","first-page":"4315","DOI":"10.1007\/s12652-019-01527-4","article-title":"Exploring deep neural networks for rumor detection","volume":"12","author":"Asghar","year":"2021","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib9","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1038\/s41562-021-01050-7","article-title":"Individuals with depression express more distorted thinking on social media","volume":"5","author":"Bathina","year":"2021","journal-title":"Nat. Hum. Behav."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib10","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102435","article-title":"Co-LSTM: convolutional LSTM model for sentiment analysis in social big data","volume":"58","author":"Behera","year":"2021","journal-title":"Inf. Process. Manag."},{"issue":"33","key":"10.1016\/j.engappai.2025.113421_bib11","doi-asserted-by":"crossref","DOI":"10.1126\/sciadv.abe5641","article-title":"How social learning amplifies moral outrage expression in online social networks","volume":"7","author":"Brady","year":"2021","journal-title":"Sci. Adv."},{"key":"10.1016\/j.engappai.2025.113421_bib12","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.122372","article-title":"A new direction in social network analysis: online social network analysis problems and applications","volume":"535","author":"Can","year":"2019","journal-title":"Phys. Stat. Mech. Appl."},{"key":"10.1016\/j.engappai.2025.113421_bib13","author":"Chakravarthi"},{"key":"10.1016\/j.engappai.2025.113421_bib14","series-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"1503","article-title":"Multi-level graph convolutional networks for cross-platform anchor link prediction","author":"Chen","year":"2020"},{"key":"10.1016\/j.engappai.2025.113421_bib15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2020.100286","article-title":"Community detection in node-attributed social networks: a survey","volume":"37","author":"Chunaev","year":"2020","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib16","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1177\/0963721417730833","article-title":"Social network sites and well-being: the role of social connection","volume":"27","author":"Clark","year":"2018","journal-title":"Curr. Dir. Psychol. Sci."},{"key":"10.1016\/j.engappai.2025.113421_bib17","series-title":"Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"2051","article-title":"User preference-aware fake news detection","author":"Dou","year":"2021"},{"issue":"6","key":"10.1016\/j.engappai.2025.113421_bib18","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2023.103496","article-title":"A contest between users and marketers? The economic value of social media content for adverse events","volume":"60","author":"Du","year":"2023","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib19","doi-asserted-by":"crossref","first-page":"341","DOI":"10.14704\/WEB\/V19I1\/WEB19026","article-title":"Cheating detection in online exams during Covid-19 pandemic using data mining techniques","volume":"19","author":"Duhaim","year":"2022","journal-title":"Webology"},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib20","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1007\/s11280-020-00800-3","article-title":"A deep-learning model for urban traffic flow prediction with traffic events mined from Twitter","volume":"24","author":"Essien","year":"2021","journal-title":"World Wide Web"},{"key":"10.1016\/j.engappai.2025.113421_bib21","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101862","article-title":"Susceptibility to phishing on social network sites: a personality information processing model","volume":"94","author":"Frauenstein","year":"2020","journal-title":"Comput. Secur."},{"issue":"3","key":"10.1016\/j.engappai.2025.113421_bib22","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1177\/0894439320914853","article-title":"Black trolls matter: racial and ideological asymmetries in social media disinformation","volume":"40","author":"Freelon","year":"2022","journal-title":"Soc. Sci. Comput. Rev."},{"key":"10.1016\/j.engappai.2025.113421_bib23","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.112083","article-title":"A novel photovoltaic cell defect detection method: a deep learning model based on multi-scale enhanced feature extraction","volume":"161","author":"Gao","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.engappai.2025.113421_bib24","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.107057","article-title":"Topic detection and sentiment analysis in Twitter content related to COVID-19 from Brazil and the USA","volume":"101","author":"Garcia","year":"2021","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"10.1016\/j.engappai.2025.113421_bib25","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1002\/poi3.184","article-title":"Unpacking the social media bot: a typology to guide research and policy","volume":"12","author":"Gorwa","year":"2020","journal-title":"Policy Internet"},{"key":"10.1016\/j.engappai.2025.113421_bib26","first-page":"1","article-title":"Detection of fake accounts on social media using multimodal data with deep learning","author":"Goyal","year":"2024","journal-title":"IEEE Transact. Comput. Soc. Syst."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib27","doi-asserted-by":"crossref","DOI":"10.2196\/26933","article-title":"Bots and misinformation spread on social media: implications for COVID-19","volume":"23","author":"Himelein-Wachowiak","year":"2021","journal-title":"J. Med. Internet Res."},{"key":"10.1016\/j.engappai.2025.113421_bib28","series-title":"LSTM Based Sentiment Analysis for Cryptocurrency Prediction","first-page":"617","author":"Huang","year":"2021"},{"key":"10.1016\/j.engappai.2025.113421_bib29","doi-asserted-by":"crossref","first-page":"21932","DOI":"10.1109\/ACCESS.2020.2969041","article-title":"Duplicate questions pair detection using Siamese MaLSTM","volume":"8","author":"Imtiaz","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib30","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s13278-020-00696-x","article-title":"Deep learning for misinformation detection on online social networks: a survey and new perspectives","volume":"10","author":"Islam","year":"2020","journal-title":"Soc. Netw. Anal. Min."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib31","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/s13755-018-0046-0","article-title":"Depression detection from social network data using machine learning techniques","volume":"6","author":"Islam","year":"2018","journal-title":"Health Inf. Sci. Syst."},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib32","first-page":"431","article-title":"Behavioral consequences of customer inspiration: the role of social media inspirational content and cultural orientation","volume":"14","author":"Izogo","year":"2020","journal-title":"J. Res. Indian Med."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib33","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.1007\/s40747-021-00409-7","article-title":"Online social networks security and privacy: comprehensive review and analysis","volume":"7","author":"Jain","year":"2021","journal-title":"Compl. Intell. Syst."},{"key":"10.1016\/j.engappai.2025.113421_bib34","doi-asserted-by":"crossref","DOI":"10.1016\/j.csl.2024.101743","article-title":"A knowledge-Aware NLP-driven conversational model to detect deceptive contents on social media posts","volume":"90","author":"Jain","year":"2025","journal-title":"Comput. Speech Lang"},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib35","doi-asserted-by":"crossref","first-page":"79","DOI":"10.9734\/air\/2023\/v24i4950","article-title":"A novel approach to detection of fake news in online communities","volume":"24","author":"Jakku","year":"2023","journal-title":"Adv. Res."},{"issue":"13","key":"10.1016\/j.engappai.2025.113421_bib36","doi-asserted-by":"crossref","first-page":"9713","DOI":"10.1007\/s00521-019-04504-2","article-title":"Stock closing price prediction based on sentiment analysis and LSTM","volume":"32","author":"Jin","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.engappai.2025.113421_bib37","series-title":"Companion Proceedings of the Web Conference 2022","first-page":"621","article-title":"TweetBoost: influence of social media on NFT valuation","author":"Kapoor","year":"2022"},{"key":"10.1016\/j.engappai.2025.113421_bib38","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/j.indmarman.2019.08.003","article-title":"A framework for big data analytics in commercial social networks: a case study on sentiment analysis and fake review detection for marketing decision-making","volume":"90","author":"Kauffmann","year":"2020","journal-title":"Ind. Mark. Manag."},{"key":"10.1016\/j.engappai.2025.113421_bib39","series-title":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","first-page":"528","article-title":"Facial emotion recognition","author":"Kaur","year":"2022"},{"issue":"7","key":"10.1016\/j.engappai.2025.113421_bib40","doi-asserted-by":"crossref","first-page":"3433","DOI":"10.1007\/s12652-020-01839-w","article-title":"Stock market prediction using machine learning classifiers and social media, news","volume":"13","author":"Khan","year":"2022","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib41","article-title":"A deep learning model for detecting mental illness from user content on social media","volume":"10","author":"Kim","year":"2020","journal-title":"Sci. Rep."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib42","article-title":"A deep learning model for detecting mental illness from user content on social media","volume":"10","author":"Kim","year":"2020","journal-title":"Sci. Rep."},{"key":"10.1016\/j.engappai.2025.113421_bib43","doi-asserted-by":"crossref","DOI":"10.1016\/j.intfin.2020.101188","article-title":"The predictive power of public Twitter sentiment for forecasting cryptocurrency prices","volume":"65","author":"Kraaijeveld","year":"2020","journal-title":"J. Int. Financ. Mark. Inst. Money"},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib44","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2019.102141","article-title":"Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data","volume":"57","author":"Kumar","year":"2020","journal-title":"Inf. Process. Manag."},{"key":"10.1016\/j.engappai.2025.113421_bib45","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.procs.2022.12.408","article-title":"A hybrid data-driven framework for spam detection in online social network","volume":"218","author":"Kumar","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.engappai.2025.113421_bib46","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.patrec.2021.10.002","article-title":"Protection motivation theory using multi-factor authentication for providing security over social networking sites","volume":"152","author":"Mehraj","year":"2021","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib47","article-title":"Fake news detection: a hybrid CNN-RNN based deep learning approach","volume":"1","author":"Nasir","year":"2021","journal-title":"Int. J. Inf. Manag. Data Insights"},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib48","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-96372-1","article-title":"A global comparison of social media bot and human characteristics","volume":"15","author":"Ng","year":"2025","journal-title":"Sci. Rep."},{"issue":"3","key":"10.1016\/j.engappai.2025.113421_bib49","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1002\/cae.22253","article-title":"Sentiment analysis on massive open online course evaluations: a text mining and deep learning approach","volume":"29","author":"Onan","year":"2021","journal-title":"Comput. Appl. Eng. Educ."},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib50","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102250","article-title":"Detection of bots in social media: a systematic review","volume":"57","author":"Orabi","year":"2020","journal-title":"Inf. Process. Manag."},{"issue":"4","key":"10.1016\/j.engappai.2025.113421_bib51","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102250","article-title":"Detection of bots in social media: a systematic review","volume":"57","author":"Orabi","year":"2020","journal-title":"Inf. Process. Manag."},{"issue":"2","key":"10.1016\/j.engappai.2025.113421_bib52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3709009","article-title":"Detecting misinformation on social media using community insights and contrastive learning","volume":"16","author":"Ozcelik","year":"2025","journal-title":"ACM Transact. Intell. Syst. Technol."},{"issue":"3","key":"10.1016\/j.engappai.2025.113421_bib53","first-page":"1","article-title":"Detecting fake social media profiles using the majority voting approach","volume":"11","author":"Patil","year":"2024","journal-title":"EAI Endor. Transact. Scal. Inform. Syst."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib54","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s40747-024-01626-6","article-title":"Unveiling user identity across social media: a novel unsupervised gradient semantic model for accurate and efficient user alignment","volume":"11","author":"Peng","year":"2025","journal-title":"Compl. Intell. Syst."},{"issue":"12","key":"10.1016\/j.engappai.2025.113421_bib55","doi-asserted-by":"crossref","first-page":"4598","DOI":"10.3390\/ijerph17124598","article-title":"Psychological risk factors that predict social networking and internet addiction in adolescents","volume":"17","author":"Peris","year":"2020","journal-title":"Int. J. Environ. Res. Publ. Health"},{"issue":"23","key":"10.1016\/j.engappai.2025.113421_bib56","doi-asserted-by":"crossref","first-page":"17309","DOI":"10.1007\/s00521-020-05102-3","article-title":"A transformer-based approach to irony and sarcasm detection","volume":"32","author":"Potamias","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.engappai.2025.113421_bib57","series-title":"Spammer Detection and Fake User Identification on Social Networks","author":"Prasad","year":"2023"},{"key":"10.1016\/j.engappai.2025.113421_bib58","author":"Praznik"},{"key":"10.1016\/j.engappai.2025.113421_bib59","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","article-title":"Fake profile detection techniques in large-scale online social networks: a comprehensive review","volume":"65","author":"Ramalingam","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.engappai.2025.113421_bib60","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-024-18650-w","article-title":"Detection of cloned attacks in connecting media using Bernoulli RBM_RF classifier (BRRC)","author":"Rani","year":"2024","journal-title":"Multimed. Tool. Appl."},{"key":"10.1016\/j.engappai.2025.113421_bib61","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115742","article-title":"A review on social spam detection: challenges, open issues, and future directions","volume":"186","author":"Rao","year":"2021","journal-title":"Expert Syst. Appl."},{"issue":"9","key":"10.1016\/j.engappai.2025.113421_bib62","doi-asserted-by":"crossref","first-page":"2601","DOI":"10.1038\/s41396-021-00949-3","article-title":"Social networks strongly predict the gut microbiota of wild mice","volume":"15","author":"Raulo","year":"2021","journal-title":"ISME J."},{"key":"10.1016\/j.engappai.2025.113421_bib63","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.procs.2022.10.209","article-title":"Detection of phishing URLs using temporal convolutional network","volume":"212","author":"Remmide","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.engappai.2025.113421_bib64","author":"Risch"},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib65","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1038\/s41746-020-0287-6","article-title":"A machine learning approach predicts future risk to suicidal ideation from social media data","volume":"3","author":"Roy","year":"2020","journal-title":"npj Digit. Med."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib66","doi-asserted-by":"crossref","first-page":"4747","DOI":"10.1038\/s41598-020-61686-9","article-title":"Comparing social media and google to detect and predict severe epidemics","volume":"10","author":"Samaras","year":"2020","journal-title":"Sci. Rep."},{"issue":"10","key":"10.1016\/j.engappai.2025.113421_bib67","doi-asserted-by":"crossref","first-page":"121","DOI":"10.3390\/computers10100121","article-title":"Fraud detection using the fraud triangle theory and data mining techniques: a literature review","volume":"10","author":"S\u00e1nchez-Aguayo","year":"2021","journal-title":"Computers"},{"issue":"2","key":"10.1016\/j.engappai.2025.113421_bib68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3402444","article-title":"A simulation-driven methodology for IoT data mining based on edge computing","volume":"21","author":"Savaglio","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib69","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1007\/s12144-020-00794-1","article-title":"Prediction of problematic social media use (PSU) using machine learning approaches","volume":"41","author":"Savci","year":"2022","journal-title":"Curr. Psychol."},{"issue":"16","key":"10.1016\/j.engappai.2025.113421_bib70","doi-asserted-by":"crossref","first-page":"17083","DOI":"10.1007\/s11042-024-19724-5","article-title":"Threats on online social network platforms: classification, detection, and prevention techniques","volume":"84","author":"Shah","year":"2024","journal-title":"Multimed. Tool. Appl."},{"issue":"2","key":"10.1016\/j.engappai.2025.113421_bib71","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s42001-020-00086-5","article-title":"Conspiracy in the time of corona: automatic detection of emerging COVID-19 conspiracy theories in social media and the news","volume":"3","author":"Shahsavari","year":"2020","journal-title":"Journal of Computational Social Science"},{"issue":"3","key":"10.1016\/j.engappai.2025.113421_bib72","doi-asserted-by":"crossref","first-page":"2813","DOI":"10.1007\/s40747-021-00487-7","article-title":"Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text","volume":"9","author":"Shekhar","year":"2023","journal-title":"Compl. Intell. Syst."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib73","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s13278-021-00737-z","article-title":"Sentiment analysis on the impact of coronavirus in social life using the BERT model","volume":"11","author":"Singh","year":"2021","journal-title":"Soc. Netw. Anal. Min."},{"key":"10.1016\/j.engappai.2025.113421_bib74","article-title":"Applying data mining techniques to explore user behaviors and watching video patterns in converged IT environments","author":"Su","year":"2021","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib75","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1002\/per.2290","article-title":"Psychometric and validity issues in machine learning approaches to personality assessment: a focus on social media text mining","volume":"34","author":"Tay","year":"2020","journal-title":"Eur. J. Pers."},{"issue":"12","key":"10.1016\/j.engappai.2025.113421_bib76","doi-asserted-by":"crossref","first-page":"2183","DOI":"10.1177\/1461444819888720","article-title":"Social media is not real: the effect of \u2018Instagram vs reality\u2019 images on women's social comparison and body image","volume":"22","author":"Tiggemann","year":"2020","journal-title":"New Media Soc."},{"key":"10.1016\/j.engappai.2025.113421_bib77","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2021.100395","article-title":"Machine learning algorithms for social media analysis: a survey","volume":"40","author":"T.K.","year":"2021","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib78","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/s13278-022-00878-9","article-title":"Novel approaches to fake news and fake account detection in OSNs: user social engagement and visual content centric model","volume":"12","author":"Uppada","year":"2022","journal-title":"Soc. Netw. Anal. Min."},{"issue":"29","key":"10.1016\/j.engappai.2025.113421_bib79","doi-asserted-by":"crossref","first-page":"41611","DOI":"10.1007\/s11042-021-11007-7","article-title":"A review on extreme learning machine","volume":"81","author":"Wang","year":"2022","journal-title":"Multimed. Tool. Appl."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib80","first-page":"410","article-title":"Big data analytics in cyber security: network traffic and attacks","volume":"61","author":"Wang","year":"2021","journal-title":"J. Comput. Inf. Syst."},{"key":"10.1016\/j.engappai.2025.113421_bib81","doi-asserted-by":"crossref","first-page":"25964","DOI":"10.1109\/ACCESS.2020.2968391","article-title":"Duplicate question detection with deep learning in Stack Overflow","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.113421_bib82","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.neucom.2019.11.054","article-title":"BiLSTM with multi-polarity orthogonal attention for implicit sentiment analysis","volume":"383","author":"Wei","year":"2020","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.engappai.2025.113421_bib83","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-70829-x","article-title":"Next-generation visitation models using social media to estimate recreation on public lands","volume":"10","author":"Wood","year":"2020","journal-title":"Sci. Rep."},{"issue":"8","key":"10.1016\/j.engappai.2025.113421_bib84","doi-asserted-by":"crossref","first-page":"3141","DOI":"10.1007\/s12652-019-01480-2","article-title":"An efficient data packet iteration and transmission algorithm in opportunistic social networks","volume":"11","author":"Wu","year":"2020","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"10.1016\/j.engappai.2025.113421_bib85","series-title":"Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining","first-page":"637","article-title":"Tracing fake-news footprints","author":"Wu","year":"2018"},{"key":"10.1016\/j.engappai.2025.113421_bib86","series-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"2258","article-title":"Timme","author":"Xiao","year":"2020"},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib87","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103765","article-title":"Predicting users' future interests on social networks: a reference framework","volume":"61","author":"Zarrinkalam","year":"2024","journal-title":"Inf. Process. Manag."},{"issue":"5","key":"10.1016\/j.engappai.2025.113421_bib88","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103765","article-title":"Predicting users' future interests on social networks: a reference framework","volume":"61","author":"Zarrinkalam","year":"2024","journal-title":"Inf. Process. Manag."},{"issue":"6","key":"10.1016\/j.engappai.2025.113421_bib89","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103827","article-title":"False message detection in internet of vehicle through machine learning and vehicle consensus","volume":"61","author":"Zhang","year":"2024","journal-title":"Inf. Process. Manag."},{"key":"10.1016\/j.engappai.2025.113421_bib90","series-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"1103","article-title":"Seal","author":"Zhang","year":"2020"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625034529?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625034529?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:18:56Z","timestamp":1768551536000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197625034529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":90,"alternative-id":["S0952197625034529"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113421","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhanced information processing for smart detection of clone accounts on social media","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113421","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"113421"}}