{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:43Z","timestamp":1759091443298,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/kse.2016.7758064","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T21:43:24Z","timestamp":1480628604000},"page":"264-267","source":"Crossref","is-referenced-by-count":2,"title":["Social-spam profile detection based on content classification and user behavior"],"prefix":"10.1109","author":[{"given":"Thi-Hong","family":"Vuong","sequence":"first","affiliation":[]},{"given":"Van-Hien","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Minh-Duc","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Cam-Van","family":"Thi Nguyen","sequence":"additional","affiliation":[]},{"given":"Thanh-Huyen","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Mai-Vu","family":"Tran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"175","article-title":"Spam Detection on Twitter Using Traditional Classifiers","author":"mccord","year":"0","journal-title":"ATCE 2011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref13","article-title":"The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns","author":"stone-gross","year":"0","journal-title":"LEET 2011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0557-2_109"},{"key":"ref16","first-page":"335","article-title":"Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach","author":"wang","year":"2010","journal-title":"DBSec"},{"key":"ref17","first-page":"142","article-title":"Don't Follow Me - Spam Detection in Twitter","author":"wang","year":"0","journal-title":"SECRYPT 2010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2382616.2382620"},{"key":"ref19","article-title":"Detecting Spam in a Twitter Network","volume":"15","author":"yardi","year":"2010","journal-title":"First Monday"},{"key":"ref4","first-page":"681","article-title":"Detecting and characterizing social spam campaigns","author":"gao","year":"2010","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-011-0017-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref5","first-page":"2321","article-title":"Review: Efficient Spam Detection on Social Network","volume":"3","author":"girish khurana","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772843"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"ref1","first-page":"620","article-title":"Detecting spammers and content promoters in online video social networks","author":"benevenuto","year":"0","journal-title":"SIGIR 2009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSDM.2015.7298036"}],"event":{"name":"2016 Eighth International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2016,10,6]]},"location":"Hanoi, Vietnam","end":{"date-parts":[[2016,10,8]]}},"container-title":["2016 Eighth International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7749393\/7758010\/07758064.pdf?arnumber=7758064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:29:58Z","timestamp":1506997798000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7758064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/kse.2016.7758064","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}