{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T21:34:26Z","timestamp":1768685666845,"version":"3.49.0"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Mag."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/mcom.2018.1700575","type":"journal-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T00:07:10Z","timestamp":1542672430000},"page":"21-27","source":"Crossref","is-referenced-by-count":70,"title":["DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks"],"prefix":"10.1109","volume":"56","author":[{"given":"Qingyuan","family":"Gong","sequence":"first","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xinlei","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhou","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Tianyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"417","article-title":"&#x2018;Will Check-In for Badges&#x2019;: Understanding Bias and Misbehavior on Location-Based Social Networks","author":"wang","year":"0","journal-title":"Proc 10th Int'l Conf Web and Social Media"},{"key":"ref11","first-page":"412","article-title":"A Comparative Study on Feature Selection in Text Categorization","author":"yang","year":"0","journal-title":"Proc 14th Intl Conf Machine Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512945"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036889"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2532439"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1556215"},{"key":"ref6","first-page":"634","article-title":"Analyzing and Detecting Opinion Spam on a Large-Scale Dataset via Temporal and Spatial Patterns","author":"li","year":"0","journal-title":"Proc 9th Int Conf Web Soc Media"},{"key":"ref5","first-page":"2633","article-title":"Social Spammer Detection in Microblogging","author":"hu","year":"0","journal-title":"Proc 23rd In t'l Joint Conf Artificial Intelligence"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2677208"},{"key":"ref7","first-page":"3818","article-title":"Detecting Rumors from Microblogs with Recurrent Neural Networks","author":"ma","year":"0","journal-title":"Proc 25h tnt'l Joint Conf Artificial Intelligence"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref1","first-page":"197","article-title":"Aiding the Detection of Fake Accounts in Large Scale Social Online Services","author":"cao","year":"0","journal-title":"Proc USENIX Symp Networked Systems Design Implementation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052676"}],"container-title":["IEEE Communications Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/35\/8539002\/08539016.pdf?arnumber=8539016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:25:51Z","timestamp":1643289951000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8539016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":15,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/mcom.2018.1700575","relation":{},"ISSN":["0163-6804","1558-1896"],"issn-type":[{"value":"0163-6804","type":"print"},{"value":"1558-1896","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}