{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:56:39Z","timestamp":1770749799957,"version":"3.50.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/rivf48685.2020.9140749","type":"proceedings-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T21:32:06Z","timestamp":1594848726000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["An Application of Random Walk on Fake Account Detection Problem: A Hybrid Approach"],"prefix":"10.1109","author":[{"given":"Ngoc C.","family":"Le","sequence":"first","affiliation":[]},{"given":"Manh-Tuan","family":"Dao","sequence":"additional","affiliation":[]},{"given":"Hoang-Linh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Tuyet-Nhi","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Hue","family":"Vu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/072294b0"},{"key":"ref11","article-title":"Stolen Facebook Accounts for Sale","author":"richmond","year":"0"},{"key":"ref12","article-title":"A Bayesian Approach to Filtering Junk E-Mail","author":"sahami","year":"1998","journal-title":"AAAI Workshop on Learning for Text Categorization"},{"key":"ref13","article-title":"Sybil","author":"schreiber","year":"1973","journal-title":"Kirkus Reviews"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"ref17","year":"0","journal-title":"User Profile API"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.185"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISEASP.2017.7976996"},{"key":"ref5","article-title":"SybilInfer: Detecting Sybil Nodes Using Social Networks","author":"danezis","year":"2009","journal-title":"NDSS"},{"key":"ref8","first-page":"273","article-title":"Random Walk Based Fake Account Detection in Online Social Networks","author":"jinyuan","year":"2017","journal-title":"2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"ref7","article-title":"Facebook quietly updated two key numbers about its user base","author":"heath","year":"0"},{"key":"ref2","article-title":"Aiding the Detection of Fake Accounts in Large Scale Social Online Services","author":"cao","year":"2012","journal-title":"USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref1","first-page":"551","article-title":"All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks","author":"bilge","year":"2014","journal-title":"Proceedings of the 18th WWW"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1090\/mbk\/107"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"}],"event":{"name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","location":"Ho Chi Minh, Vietnam","start":{"date-parts":[[2020,10,14]]},"end":{"date-parts":[[2020,10,15]]}},"container-title":["2020 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9138608\/9140725\/09140749.pdf?arnumber=9140749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:49Z","timestamp":1656453349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/rivf48685.2020.9140749","relation":{},"subject":[],"published":{"date-parts":[[2020,10]]}}}