{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:32:34Z","timestamp":1770067954684,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209609","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T16:59:41Z","timestamp":1601485181000},"page":"1-11","source":"Crossref","is-referenced-by-count":8,"title":["Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks"],"prefix":"10.1109","author":[{"given":"Huajie","family":"Shao","sequence":"first","affiliation":[]},{"given":"Shuochao","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Andong","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Shengzhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tianshi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chaoqi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ruijie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tarek","family":"Abdelzaher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380145"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191574"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1801378116"},{"key":"ref32","article-title":"Graph-hist: Graph classification from latent feature histograms with application to bot detection","author":"magelinski","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3360315"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054181"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329836"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2479616"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"ref10","first-page":"15","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"2012","journal-title":"9th USENIX NSDI"},{"key":"ref40","article-title":"An unsupervised approach to detect spam campaigns that use botnets on twitter","author":"chen","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2019.8903989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508495"},{"key":"ref16","first-page":"950","article-title":"A spam detection mechamism in social media using soft computing","author":"tehlan","year":"2019","journal-title":"2019 6th INDIACom"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882972"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01541-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref28","year":"0"},{"key":"ref4","first-page":"1","article-title":"Unsupervised fact-finding with multi-modal data in social sensing","author":"shao","year":"2019","journal-title":"2019 FUSION"},{"key":"ref27","first-page":"1","article-title":"Smsad: a framework for spam message and spam account detection","author":"adewole","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.275"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0222-4_21"},{"key":"ref29","article-title":"A review of recent advance in online spam detection","author":"dou","year":"2019"},{"key":"ref5","author":"wang","year":"2015","journal-title":"Social Sensing Building Reliable Systems on Unreliable Data"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113383"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISEASP.2017.7976996"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486306"},{"key":"ref20","article-title":"Unsupervised machine learning of open source russian twitter data reveals global scope and operational characteristics","author":"griffin","year":"2018"},{"key":"ref22","first-page":"49","article-title":"Similarity measures for text document clustering","author":"huang","year":"2008","journal-title":"Proc of NZCSRSC"},{"key":"ref21","first-page":"1","article-title":"Don&#x2019;t follow me: Spam detection in twitter","author":"wang","year":"2010","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the"},{"key":"ref42","first-page":"914","article-title":"I know you&#x2019;ll be back: Interpretable new user clustering and churn prediction on a mobile social application","author":"yang","year":"2018","journal-title":"Proceedings of the 24th ACM SIGKDD"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"ref41","article-title":"Troll detection: A comparative study in detecting troll farms on twitter using cluster analysis","author":"engelin","year":"2016"},{"key":"ref23","article-title":"Boa: the bayesian optimization algorithm","author":"pelikan","year":"1999","journal-title":"Conference on Genetic & Evolutionary Computation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i1.pp562-569"},{"key":"ref25","first-page":"5","article-title":"Supervised machine learning bot detection techniques to identify social twitter bots","volume":"1","author":"efthimion","year":"2018","journal-title":"SMU Data Science Review"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","location":"Honolulu, HI, USA","start":{"date-parts":[[2020,8,3]]},"end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209609.pdf?arnumber=9209609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:16:11Z","timestamp":1656360971000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209609","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}