{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:20:36Z","timestamp":1767907236548,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401371"],"award-info":[{"award-number":["61401371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Australian Government Research Training Program Scholarship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2710540","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:07:29Z","timestamp":1496326049000},"page":"11142-11154","source":"Crossref","is-referenced-by-count":30,"title":["Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3280-1307","authenticated-orcid":false,"given":"Guanjun","family":"Lin","sequence":"first","affiliation":[]},{"given":"Nan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Houcine","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.04.015"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","article-title":"Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers","author":"yang","year":"2011","journal-title":"2nd Int Workshop Recent Advances in Intrusion Detection"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"ref30","author":"weston","year":"2015","journal-title":"Getting Started with DoParallel and Foreach"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/76263.76358"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"key":"ref34","article-title":"Trick or tweet? Malware abundant in Twitter URLs","author":"zetter","year":"2009","journal-title":"Wired"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.204"},{"key":"ref11","year":"2016","journal-title":"H2O for Business"},{"key":"ref12","first-page":"16","author":"hechenbichler","year":"2004","journal-title":"Weighted K-nearest-neighbor Techniques and Ordinal Classification"},{"key":"ref13","first-page":"1","article-title":"Caret package","volume":"28","author":"kuhn","year":"2008","journal-title":"J Statist Softw"},{"key":"ref14","year":"2015","journal-title":"A Short Introduction to the Caret Package"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"ref17","article-title":"An in-depth analysis of abuse on Twitter","author":"oliver","year":"2014"},{"key":"ref18","author":"pash","year":"2014","journal-title":"The Lure of Naked Hollywood Star Photos Sent the Internet Into Meltdown in New Zealand"},{"key":"ref19","author":"quinlan","year":"2017","journal-title":"Data Mining Tools See5 and C5 0"},{"key":"ref28","first-page":"1","article-title":"Don&#x2019;t follow me: Spam detection in Twitter","author":"wang","year":"2010","journal-title":"Proc Int Conf Sec Cryptogr (SECRYPT)"},{"key":"ref4","author":"candel","year":"2016","journal-title":"Deep Learning with H20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.150"},{"key":"ref3","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref6","author":"conway","year":"2012","journal-title":"Machine learning for hackers"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254084"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"ref8","first-page":"2000","article-title":"Additive logistic regression: A statistical view of boosting","volume":"28","author":"friedman","year":"1998","journal-title":"Ann Statist"},{"key":"ref7","article-title":"COMPA: Detecting compromised accounts on social networks","author":"egele","year":"2013","journal-title":"Proc NDSS"},{"key":"ref2","first-page":"1063","article-title":"Analysis of a random forests model","volume":"13","author":"biau","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref1","first-page":"12","article-title":"Detecting spammers on Twitter","volume":"6","author":"benevenuto","year":"2010","journal-title":"Proc Collaboration Electronic Messaging Anti-Abuse and Spam Conf (CEAS)"},{"key":"ref20","first-page":"693","article-title":"Hogwild: A lock-free approach to parallelizing stochastic gradient descent","author":"recht","year":"2011","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref22","article-title":"Superlinear speedup in parallel computation","author":"shan","year":"2002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.15439\/2016F498"},{"key":"ref24","year":"2016","journal-title":"Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 2nd Quarter 2016 (in millions)"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","article-title":"Spam filtering in Twitter using sender-receiver relationship","author":"song","year":"2011","journal-title":"2nd Int Workshop Recent Advances in Intrusion Detection"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/07937783.pdf?arnumber=7937783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:30:02Z","timestamp":1641987002000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7937783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2710540","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}