{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:53:36Z","timestamp":1776394416263,"version":"3.51.2"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921650","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:12:38Z","timestamp":1413994358000},"page":"620-627","source":"Crossref","is-referenced-by-count":152,"title":["Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?"],"prefix":"10.1109","author":[{"given":"John P.","family":"Dickerson","sequence":"first","affiliation":[]},{"given":"Vadim","family":"Kagan","sequence":"additional","affiliation":[]},{"given":"V.S.","family":"Subrahmanian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"5","article-title":"Online learning for latent dirichlet allocation","volume":"2","author":"hoffman","year":"2010","journal-title":"Neural Information Processing Systems (NIPS)"},{"key":"17","article-title":"Sentiment analysis: Adjectives and adverbs are better than adjectives alone","author":"benamara","year":"2007","journal-title":"Proc of the Int Conf on Weblogs and Social Media (ICWSM)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2008.57"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.32"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500282"},{"key":"13","first-page":"36","article-title":"Robust sentiment detection on twitter from biased and noisy data","author":"barbosa","year":"2010","journal-title":"International Conference on Computational Linguistics (COLING)"},{"key":"14","first-page":"30","article-title":"Sentiment analysis of twitter data","author":"agarwal","year":"2011","journal-title":"Proceedings of the Workshop on Languages in Social Media"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"20","article-title":"Hackers target indian election tweets with malicious spam","author":"kharpal","year":"2014","journal-title":"CNBC"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"25","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"26","article-title":"Kernel principal component analysis","author":"scholkopf","year":"1999","journal-title":"Advances in Kernel Methods"},{"key":"3","article-title":"SybilInfer: Detecting sybil nodes using social networks","author":"danezis","year":"2009","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"2","article-title":"The invasion of the twitter bots","author":"hill","year":"2012","journal-title":"Forbes"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"1","article-title":"The rise of twitter bots","author":"dubbin","year":"2013","journal-title":"The New Yorker"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"5","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","article-title":"Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers","author":"yang","year":"2011","journal-title":"Recent Advances in Intrusion Detection"},{"key":"4","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-642-13739-6_25","article-title":"Detecting spam bots in online social networking sites: A machine learning approach","author":"wang","year":"2010","journal-title":"Conference on Data and Applications Security and Privacy"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"China","start":{"date-parts":[[2014,8,17]]},"end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921650.pdf?arnumber=6921650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:52:14Z","timestamp":1498157534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921650","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}