{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:33:23Z","timestamp":1774438403610,"version":"3.50.1"},"reference-count":23,"publisher":"Informa UK Limited","issue":"11","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["61672269"],"award-info":[{"award-number":["61672269"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011254","name":"National Key Research","doi-asserted-by":"publisher","award":["2017YFB1400703"],"award-info":[{"award-number":["2017YFB1400703"]}],"id":[{"id":"10.13039\/501100011254","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2020,9,18]]},"DOI":"10.1080\/08839514.2020.1782002","type":"journal-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T16:43:45Z","timestamp":1593449025000},"page":"777-791","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":18,"title":["Detection of Compromised Online Social Network Account with an Enhanced Knn"],"prefix":"10.1080","volume":"34","author":[{"given":"Edward Kwadwo","family":"Boahen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Jiangsu University, Zhenjiang, China"}]},{"given":"Wang","family":"Changda","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Jiangsu University, Zhenjiang, China"}]},{"given":"Bouya-Moko","family":"Brunel Elvire","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Jiangsu University, Zhenjiang, China"}]}],"member":"301","published-online":{"date-parts":[[2020,6,29]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.025"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3116201"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5402-6"},{"key":"cit0004","unstructured":"Bamler, R., and S. Mandt. Dynamic word embeddings. In ICML, 380\u201389,2017. https:\/\/arxiv.org\/abs\/1702.08359"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852187"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1177\/0165551519857590"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3316642"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554405"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508296"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.011"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1145\/3070645"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.814"},{"key":"cit0014","unstructured":"Mikolov, T., I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In NIPS, 3111\u201319, 2013. arXiv:1310.4546 [cs.CL]"},{"key":"cit0015","unstructured":"Mikolov, T., E. Grave, P. Bojanowski, C. Puhrsch, and A. Joulin. 2017. Advances in pre-training distributed word representations."},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.014"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.003"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.064"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2017.1412866"},{"key":"cit0021","unstructured":"Wang, C., and B. Yang. 2018 Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks. Social and Information Networks, Cryptography and Security (cs.CR). arXiv:1801.06825v1 [cs.SI]"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.10.003"},{"key":"cit0023","volume-title":"Submitted to IEEE Trans. Neural Netw. Learn. Syst.","author":"Zhao R.","year":"2016"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2020.1782002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T23:11:54Z","timestamp":1621897914000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2020.1782002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,29]]},"references-count":23,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,9,18]]}},"alternative-id":["10.1080\/08839514.2020.1782002"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2020.1782002","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,29]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-06-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}