{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:03:52Z","timestamp":1764842632830,"version":"3.37.3"},"reference-count":77,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100007787","name":"National Research Centre","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833706","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2161-2175","source":"Crossref","is-referenced-by-count":22,"title":["TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit"],"prefix":"10.1109","author":[{"given":"Mohammad Hammas","family":"Saeed","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Shiza","family":"Ali","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Binghamton University"}]},{"given":"Emiliano De","family":"Cristofaro","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Savvas","family":"Zannettou","sequence":"additional","affiliation":[{"name":"TU Delft"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Towards detecting compromised accounts on social networks","author":"egele","year":"2015","journal-title":"IEEE Trans Dependable and Secure Computing (TDSC)"},{"article-title":"One Professional Russian Troll Tells All","year":"2015","author":"volcheck","key":"ref57"},{"key":"ref12","article-title":"&#x2019;Senator, We Sell Ads&#x2019;: Analysis of the 2016 Russian Facebook Ads Campaign","author":"dutt","year":"2018","journal-title":"arXiv 1809 10158"},{"key":"ref56","article-title":"Towards detecting anomalous user behavior in online social networks","author":"viswanath","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref14","article-title":"Disinformation and social bot operations in the run up to the 2017 French presidential election","author":"ferrara","year":"2017","journal-title":"arXiv 1707 00086"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0801"},{"journal-title":"Information Operations","year":"2019","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.112"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-017-0111-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzv048"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"journal-title":"Word2Vec embeddings","year":"0","key":"ref18"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"ref50","article-title":"{EVILCOHOR}: Detecting communities of malicious accounts on online services","author":"stringhini","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14878"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15039"},{"key":"ref48","article-title":"Examining Trolls and Polarization with a Retweet Network","author":"steward","year":"2018","journal-title":"MIS2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"ref42","article-title":"Detecting and Tracking Political Abuse in Social Media","author":"ratkiewicz","year":"2011","journal-title":"AAAI International Conference on Web and Social Media (ICWSM)"},{"journal-title":"PRAW The Python Reddit API Wrapper","year":"0","key":"ref41"},{"key":"ref44","article-title":"TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit","author":"saeed","year":"2021","journal-title":"arXiv preprint 2112 00443"},{"journal-title":"Reddit 2017 transparency report and suspect account findings","year":"2017","key":"ref43"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref7","article-title":"The latent community model for detecting sybil attacks in social networks","author":"cai","year":"2012","journal-title":"Proc ISOC Symp Network and Distributed Systems Security (NDSS)"},{"key":"ref9","article-title":"Sybilinfer: Detecting sybil nodes using social networks","author":"danezis","year":"2009","journal-title":"Proc ISOC Symp Network and Distributed Systems Security (NDSS)"},{"key":"ref4","article-title":"Social bots distort the 2016 US Presidential election online discussion","volume":"21","author":"bessi","year":"2016","journal-title":"First Monday"},{"key":"ref3","article-title":"Detecting spammers on twitter","author":"benevenuto","year":"2010","journal-title":"Collaboration Electronic Messaging Anti-Abuse and Spam Conference (CEAS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134055"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K15-1032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.065709"},{"journal-title":"The mueller report Report on the investigation into russian interference in the 2016 presidential election","year":"2019","author":"mueller","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2065"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14021"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326016"},{"key":"ref30","article-title":"Warningbird: Detecting suspicious urls in twitter stream","author":"lee","year":"2012","journal-title":"Proc ISOC Symp Network and Distributed Systems Security (NDSS)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316495"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1093\/joc\/jqaa042"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2007"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7343"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7347"},{"key":"ref1","article-title":"Who Falls for Online Political Manipulation?","author":"badawy","year":"2018","journal-title":"arXiv 1808 03281"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.088701"},{"journal-title":"Foreign threats to the 2020 us federal elections","year":"2021","key":"ref38"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"journal-title":"Measuring Message Propagation and Social Influence on Twitter com","year":"2010","author":"ye","key":"ref70"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131390"},{"key":"ref72","article-title":"Characterizing the use of images by state-sponsored troll accounts on twitter","author":"zannettou","year":"2019","journal-title":"AAAI International Conference on Web and Social Media (ICWSM)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2798311"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"},{"journal-title":"Identifying russian trolls on reddit with deep learning and bert word embeddings","year":"2019","author":"henry weller","key":"ref23"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920264"},{"journal-title":"Statistically Significant Detection of Linguistic Change[J]","year":"2014","author":"kulkarni","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098679"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2793"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492646"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0173-9"},{"key":"ref22","article-title":"Are Social Bots on Twitter Political Actors? Empirical Evidence from a Ukrainian Social Botnet","author":"hegelich","year":"2016","journal-title":"AAAI International Conference on Web and Social Media (ICWSM)"},{"key":"ref66","article-title":"Deep entity classification: Abusive account detection for online social networks","author":"xu","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1621921"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052677"},{"article-title":"Analyzing Documents with TFIDF","year":"2019","author":"lavin","key":"ref29"},{"key":"ref60","article-title":"You are how you click: Clickstream analysis for sybil detection","author":"wang","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1038\/srep02522"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18102"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833706.pdf?arnumber=9833706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:06:57Z","timestamp":1699484817000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833706","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}