{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:55:31Z","timestamp":1771700131018,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508296","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T19:19:29Z","timestamp":1540495169000},"page":"314-321","source":"Crossref","is-referenced-by-count":22,"title":["End-to-End Compromised Account Detection"],"prefix":"10.1109","author":[{"given":"Hamid","family":"Karimi","sequence":"first","affiliation":[]},{"given":"Courtland","family":"VanDam","sequence":"additional","affiliation":[]},{"given":"Liyang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref30","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref10","article-title":"Recognition of compromised accounts on twitter","volume":"1","author":"augusto igawa","year":"2015","journal-title":"Proceedings of the Annual Conference on Brazilian Symposium on Information Systems Information Systems A Computer Socio-Technical Perspective"},{"key":"ref11","article-title":"Detecting Hacked Twitter Accounts by Examining Behavioural Change using Twtter Metadata","author":"nauta","year":"2016","journal-title":"Proceedings of the 25th Twente Student Conference on IT"},{"key":"ref12","article-title":"Towards detecting anomalous user behavior in online social networks","author":"bimal","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-60240-0_2","article-title":"Detection and analysis of 2016 us presidential election related rumors on twitter","author":"jin","year":"2017","journal-title":"Social Cultural and Behavioral Modeling"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014815"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2102"},{"key":"ref16","first-page":"1546","article-title":"Multisource multi-class fake news detection","author":"karimi","year":"2018","journal-title":"Proceedings of the 27th International Conference on Computational Linguistics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1038\/srep00560","article-title":"Communication activity in a social network: relation between long-term correlations and inter-event clustering","volume":"2","author":"diego","year":"2012","journal-title":"Scientific Reports"},{"key":"ref18","author":"bahdanau","year":"2014","journal-title":"Neural machine translation by jointly learning to align and translate"},{"key":"ref19","first-page":"140","article-title":"Deceptive opinion spam detection using neural network","author":"ren","year":"2016","journal-title":"Proceedings of COLING 2016 the 26th International Conference on Computational Linguistics Technical Papers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"ref27","year":"0","journal-title":"Local clustering coefficient"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554894"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106543"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2017.8024272"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref2","year":"2015","journal-title":"Global Trust in Advertising"},{"key":"ref9","article-title":"COMPA: Detecting Compromised Accounts on Social Networks","author":"egele","year":"2013","journal-title":"ISOC Network and Distributed System Security Symposium (NDSS)"},{"key":"ref1","author":"shearer","year":"2017","journal-title":"News use across social media platforms"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717722499"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5677015"},{"key":"ref21","author":"kumar","year":"2017","journal-title":"Hackers Are Using An Effective Way to Spread Fake News From VerifiedAccounts Friday"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v29i1.9513","article-title":"Recurrent convolutional neural networks for text classification","author":"lai","year":"2015","journal-title":"Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence AAAI' 15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DASFAA.1999.765752"},{"key":"ref26","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"tomas","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref25","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"International Conference on Machine Learning"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"Barcelona","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508296.pdf?arnumber=8508296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T07:19:09Z","timestamp":1693984749000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508296","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}