{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T22:35:36Z","timestamp":1774391736750,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["ECR\/2017\/00l691"],"award-info":[{"award-number":["ECR\/2017\/00l691"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019550","name":"Scheme for Promotion of Academic and Research Collaboration","doi-asserted-by":"publisher","award":["SPARC\/2018-2019\/P620"],"award-info":[{"award-number":["SPARC\/2018-2019\/P620"]}],"id":[{"id":"10.13039\/501100019550","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Infosys Centre of AI, IIIT Delhi, India"},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tifs.2020.2970601","type":"journal-article","created":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T21:18:07Z","timestamp":1580419087000},"page":"2667-2678","source":"Crossref","is-referenced-by-count":35,"title":["HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4254-8299","authenticated-orcid":false,"given":"Hridoy Sankar","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Vishal Raj","family":"Dutta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9345-0323","authenticated-orcid":false,"given":"Aditya","family":"Adhikary","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0210-0369","authenticated-orcid":false,"given":"Tanmoy","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"ref32","first-page":"77","article-title":"Twitter topic modeling by tweet aggregation","author":"steinskog","year":"2017","journal-title":"Proc Nordic Conf of Computational Linguistics"},{"key":"ref31","first-page":"191","article-title":"A tutorial on hawkes processes for events in social media","author":"rizoiu","year":"2017","journal-title":"arXiv 1708 06401"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2064"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13739-6_25"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BF02480272"},{"key":"ref35","article-title":"Hawkes processes","author":"laub","year":"2015","journal-title":"arXiv 1507 02822"},{"key":"ref34","first-page":"6754","article-title":"The neural hawkes process: A neurally self-modulating multivariate point process","volume":"30","author":"mei","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577306"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2953331"},{"key":"ref15","article-title":"Spotting collusive behaviour of online fraud groups in customer reviews","author":"dhawan","year":"2019","journal-title":"arXiv 1905 13649"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110068"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3297001.3297009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"ref28","first-page":"1","article-title":"COEVOLVE: A joint point process model for information diffusion and network evolution","volume":"18","author":"farajtabar","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/58.1.83"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1214\/18-AOAS1148"},{"key":"ref3","article-title":"Entropy-based classification of &#x2018;retweeting&#x2019; activity on twitter","author":"ghosh","year":"2011","journal-title":"arXiv 1106 0346"},{"key":"ref6","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18038-0_10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291010"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1145\/1571941.1572047","article-title":"Detecting spammers and content promoters in online video social networks","author":"benevenuto","year":"2009","journal-title":"Proc 32nd Int ACM SIGIR Conf Res Develop Inf Retrieval"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508801"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02948-w"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8466499"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/S0956792515000492"},{"key":"ref23","author":"zadeh","year":"2014","journal-title":"Hawkes Point Processes for Social Media Analytics"},{"key":"ref26","article-title":"Tideh: Time-dependent hawkes process for predicting retweet dynamics","author":"kobayashi","year":"2016","journal-title":"arXiv 1603 09449"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685303"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8833568\/08976235.pdf?arnumber=8976235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T22:43:10Z","timestamp":1695681790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8976235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.2970601","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}