{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T07:43:03Z","timestamp":1774510983366,"version":"3.50.1"},"reference-count":235,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2020.3047337","type":"journal-article","created":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T21:14:36Z","timestamp":1608844476000},"page":"1770-1806","source":"Crossref","is-referenced-by-count":29,"title":["Online Social Deception and Its Countermeasures: A Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6563-5934","authenticated-orcid":false,"given":"Zhen","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1657-6728","authenticated-orcid":false,"given":"Ing-Ray","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Srijan","family":"Sengupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2781-7374","authenticated-orcid":false,"given":"Michin","family":"Hong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1545-434X","authenticated-orcid":false,"given":"Tanushree","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813661"},{"key":"ref173","author":"smith","year":"1953","journal-title":"The Compleat Practical Joker"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1097\/00001756-200109170-00019"},{"key":"ref175","first-page":"378","article-title":"Discriminative topic mining for social spam detection","author":"song","year":"2014","journal-title":"Proc Pacific Asia Conf Inf Syst (PACIS)"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8466499"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2016.12.006"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/2448556.2448615"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSC.2015.7050815"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.09.037"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSII.2012.6454454"},{"key":"ref37","year":"1989","journal-title":"Definition of &#x2018;Deception&#x2019;"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2499962.2499967"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref34","year":"2018","journal-title":"Countering False Information on Social Media in Disasters and Emergencies"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600178"},{"key":"ref180","author":"tadelis","year":"2013","journal-title":"Game Theory"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1080\/102538902900012378"},{"key":"ref183","first-page":"373","author":"trivers","year":"2010","journal-title":"Deceit and Self-Deception"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1037\/h0093929"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1992.tb00973.x"},{"key":"ref188","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/978-0-387-09823-4_34","article-title":"Mining multi-label data","author":"tsoumakas","year":"2009","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/2629612"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607697"},{"key":"ref28","first-page":"561","article-title":"Social fingerprinting: Detection of spambot groups through DNA-inspired behavioral modeling","volume":"15","author":"cresci","year":"2018","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref27","first-page":"646","article-title":"The use of deception techniques: Honeypots and decoys","volume":"3","author":"cohen","year":"2006","journal-title":"Handbook Inf Secur"},{"key":"ref179","year":"2019","journal-title":"Internet Security Threat Report"},{"key":"ref29","author":"daniel","year":"2013","journal-title":"Strategic Military Deception Pergamon Policy Studies on Security Affairs"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2015.07.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.11.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2516039"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099671"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2944120"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3311091"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2016.7497779"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2931186"},{"key":"ref51","first-page":"26","article-title":"Human trafficking","volume":"32","author":"feingold","year":"2005","journal-title":"Foreign Policy"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"ref153","author":"rainie","year":"2018","journal-title":"Americans&#x2019; Complicated Feelings About Social Media in an Ear of Privacy Concerns"},{"key":"ref156","author":"reinhart","year":"2018","journal-title":"One in Four Americans Have Experienced Cybercrime"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1108\/08876040910973422"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.54.101601.145041"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3337772"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809396"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2719705"},{"key":"ref148","article-title":"A personality based model for determining susceptibility to phishing attacks","author":"parrish","year":"2009"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1093\/0195176898.001.0001","author":"gert","year":"2005","journal-title":"Morality Its Nature and Justification"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.50"},{"key":"ref57","article-title":"Political bots and the manipulation of public opinion in Venezuela","author":"forelle","year":"2015","journal-title":"arXiv 1507 07109"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1299015.1299018","article-title":"Evaluating a trial deployment of password re-use for phishing prevention","author":"flor\u00eancio","year":"2007","journal-title":"Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07"},{"key":"ref55","first-page":"1","article-title":"Falling for fake news: Investigating the consumption of news via social media","author":"flintham","year":"2018","journal-title":"Proc CHI Conf Hum Factors Comput Syst"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","article-title":"Online social networks: Threats and solutions","volume":"16","author":"fire","year":"2014","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1138"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/2818717","article-title":"The rise of social bots","volume":"59","author":"ferrara","year":"2016","journal-title":"Commun ACM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.018"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1177\/01461672952112010"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2773581"},{"key":"ref165","year":"2019","journal-title":"Metrics and Scoring Quantifying the Quality of Predictions"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.92.3.641"},{"key":"ref163","first-page":"21","article-title":"The CIA strikes back: Redefining confidentiality, integrity and availability in security","volume":"10","author":"samonas","year":"2014","journal-title":"J Inf Syst Secur"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.003"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802670"},{"key":"ref160","first-page":"3","article-title":"Deception: A philosophical perspective","author":"russow","year":"1986","journal-title":"Deception Perspectives on Human and Nonhuman Deceit"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.40.1.59"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0128-7"},{"key":"ref5","first-page":"2","article-title":"Opinion fraud detection in online reviews by network effects","author":"akoglu","year":"2013","journal-title":"Proc 7th Int AAAI Conf Weblogs Social Media"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_23"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170772"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851813"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.45.4.899"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41187-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-013-9473-0"},{"key":"ref45","author":"ekman","year":"2009","journal-title":"Telling Lies Clues to Deceit in the Marketplace Politics and Marriage"},{"key":"ref48","first-page":"813","article-title":"Personality factors in human deception detection: Comparing human to machine performance","author":"enos","year":"2006","journal-title":"Proc Int Conf Spoken Lang Process"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0363-8111(94)90039-6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/1747016115583380"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5455\/aim.2016.24.66-69"},{"key":"ref44","first-page":"1","article-title":"COMPA: Detecting compromised accounts on social networks","author":"egele","year":"2013","journal-title":"Proc NDSS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s42380-019-00051-5"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511525636.006"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2544742"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488034"},{"key":"ref76","first-page":"187","article-title":"Detection of possible human trafficking in Twitter","author":"hern\u00e1ndez-\u00e1lvarez","year":"2019","journal-title":"Proc Int Conf Inf Syst Softw Technol (ICI2ST)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.9707\/2307-0919.1014"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X10002669"},{"key":"ref78","first-page":"2633","article-title":"Social spammer detection in microblogging","author":"hu","year":"2013","journal-title":"Proc 23rd Int Joint Conf Artif Intell"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.141"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70134-2"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201100"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701645181"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/3468.852434"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1177\/0022002782026001005"},{"key":"ref66","first-page":"41","article-title":"The emergence of cyber activity as a gateway to human trafficking","volume":"12","author":"greiman","year":"2013","journal-title":"J Inf Warfare"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.09.003"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503929"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.221"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3070644"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508654"},{"key":"ref194","author":"vergelis","year":"2019","journal-title":"Spam and Phishing in Q1 2019"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12100"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766886"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1974.tb00250.x"},{"key":"ref190","author":"turvey","year":"2011","journal-title":"Criminal Profiling An Introduction to Behavioral Evidence Analysis"},{"key":"ref93","author":"kemp","year":"2020","journal-title":"More Than Half of the People on Earth Now Use Social Media"},{"key":"ref191","year":"2019","journal-title":"The Twitter Rules"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2017.09.001"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1177\/1477370818773610"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.64"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3176\/tr.2011.4.04"},{"key":"ref98","article-title":"False information on Web and social media: A survey","author":"kumar","year":"2018","journal-title":"arXiv 1804 08559"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921581"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0207383"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.784"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.07.044"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.40.020189.001025"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijdsa.20170304.12"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0071"},{"key":"ref89","first-page":"2972","article-title":"News verification by exploiting conflicting social viewpoints in microblogs","author":"jin","year":"2016","journal-title":"Proc 13th AAAI Conf Artif Intell"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_11"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3274351"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.91"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052677"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883085"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186569"},{"key":"ref203","first-page":"41","article-title":"When social bots attack: Modeling susceptibility of users in online social networks","author":"wagner","year":"2012","journal-title":"Proc MSM"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.61.1.147"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1348\/1355325041719356"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.02.003"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491719"},{"key":"ref208","first-page":"1","article-title":"Social honeypots: Making friends with a spammer near you","author":"webb","year":"2008","journal-title":"Proc CEAS"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187928"},{"key":"ref206","first-page":"239","article-title":"Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers","author":"wang","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Security)"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2012.11.008"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1080\/01402398208437106"},{"key":"ref212","year":"2019","journal-title":"Spearman's Rank Correlation Coefficient"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.002"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.63.2.111"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-009-9167-9"},{"key":"ref216","first-page":"135","author":"wu","year":"2016","journal-title":"Mining Misinformation in Social Media"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"ref218","first-page":"1","author":"wu","year":"2017","journal-title":"Detecting Crowdturfing in Social Media"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159677"},{"key":"ref220","first-page":"627","article-title":"Modelling user-phishing interaction","author":"dong","year":"2008","journal-title":"Proc Conf Human Syst Interactions"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664258"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.09.030"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.12.008"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.03.010"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942805"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998351"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3134715"},{"key":"ref125","first-page":"258","article-title":"Credbank: A large-scale social media corpus with associated credibility annotations","author":"mitra","year":"2015","journal-title":"Proc 9th Int AAAI Conf Web Social Media"},{"key":"ref124","first-page":"3","article-title":"A framework for discussing deception","author":"mitchell","year":"1986","journal-title":"Deception Perspectives on Human and Nonhuman Deceit"},{"key":"ref129","article-title":"Modeling news spread as an SIR process over temporal networks","author":"mussumeci","year":"2016","journal-title":"arXiv 1701 07853"},{"key":"ref128","first-page":"1","article-title":"How neurotic are scam victims, really? The big five and Internet scams","author":"modic","year":"2011","journal-title":"Proc Conf Int Confederation Advancement Behav Econ Econ Psychol"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2018.8611614"},{"key":"ref133","year":"2019","journal-title":"Research Report 2013 State of Social Media Spam"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1207\/s15327019eb0701_6"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"ref232","article-title":"Fighting against social spammers on Twitter by using active honeypots","author":"zhu","year":"2015"},{"key":"ref233","article-title":"SODEXO: A system framework for deployment and exploitation of deceptive honeybots in social networks","author":"zhu","year":"2012","journal-title":"arXiv 1207 5844"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1389972"},{"key":"ref231","article-title":"A survey of fake news: Fundamental theories, detection methods, and opportunities","author":"zhou","year":"2018","journal-title":"arXiv 1812 00315"},{"key":"ref235","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2601(08)60369-X","article-title":"Verbal and nonverbal communication of deception","volume":"14","author":"zuckerman","year":"1981","journal-title":"Advances in Experimental Social Psychology"},{"key":"ref234","first-page":"212","article-title":"Deployment and exploitation of deceptive honeybots in social networks","author":"zhu","year":"2013","journal-title":"Proc 52nd IEEE Conf Decis Control"},{"key":"ref136","first-page":"1","article-title":"Evaluating the inverted pyramid structure through automatic 5w1h extraction and summarization","author":"norambuena","year":"2020","journal-title":"Proc Comput Journalism Conf"},{"key":"ref135","first-page":"638","article-title":"A security approach for social networks based on honeypots","author":"nisrine","year":"2016","journal-title":"Proc 4th IEEE Int Colloq Inf Sci Technol (CiSt)"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-010-9112-2"},{"key":"ref137","first-page":"1","article-title":"A survey of security and privacy in online social networks","author":"novak","year":"2012"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2005.07.001"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2014.p0598"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.498"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.scaman.2010.02.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2010.01.005"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1103_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0736-0"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.81"},{"key":"ref109","first-page":"331","article-title":"Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media","author":"lee","year":"2013","journal-title":"Proc 7th Int AAAI Conf Weblogs Social Media"},{"key":"ref108","first-page":"185","article-title":"Seven months with the devils: A long-term study of content polluters on Twitter","author":"lee","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2013.2291689"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2045851"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1006\/nimg.2001.1003"},{"key":"ref103","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"arXiv 1611 01236"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.05.002"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.05.001"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577270"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3899-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/3009663"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1300\/J202v01n02_04"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191577"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00996226"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00129.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16354-3_77"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1184"},{"key":"ref18","first-page":"249","article-title":"Assessing agreement on classification tasks: The kappa statistic","volume":"22","author":"carletta","year":"1996","journal-title":"Comput Linguistics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199577415.001.0001"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531924"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2517458"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1066"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2007"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.67"},{"key":"ref121","author":"mcevily","year":"2018","journal-title":"An Incentivized Blockchain Enabled Multimedia Ecosystem"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1108\/01443330310790598"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09306762.pdf?arnumber=9306762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T05:06:43Z","timestamp":1670562403000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9306762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":235,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3047337","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}