{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:29:17Z","timestamp":1772864957468,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFC3302102"],"award-info":[{"award-number":["2022YFC3302102"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnnls.2024.3396192","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T17:33:11Z","timestamp":1715707991000},"page":"7302-7315","source":"Crossref","is-referenced-by-count":7,"title":["Dispelling the Fake: Social Bot Detection Based on Edge Confidence Evaluation"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2973-4970","authenticated-orcid":false,"given":"Boyu","family":"Qiao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3622-3970","authenticated-orcid":false,"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Kun","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0565-3420","authenticated-orcid":false,"given":"Shilong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7170-3809","authenticated-orcid":false,"given":"Songlin","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4615387"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102250"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.04.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-11854-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316735"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-03034-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v25i6.10633"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2196\/26933"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003370"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3409116"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09290-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5460"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00869-w"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00089"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/723"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.575"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICME55011.2023.00376"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3488336"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20314"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591646"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/214"},{"key":"ref29","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Kipf"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3572403"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508322"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3159007"},{"issue":"2","key":"ref34","first-page":"5","article-title":"Supervised machine learning bot detection techniques to identify social Twitter bots","volume":"1","author":"Efthimion","year":"2018","journal-title":"SMU Data Sci. Rev."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.12.148"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_11"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901864"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35995-8_42"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3205"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102498"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18253-2_6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133050"},{"key":"ref46","first-page":"1","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Hamilton"},{"key":"ref47","first-page":"1","article-title":"How attentive are graph attention networks?","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Brody"},{"issue":"20","key":"ref48","article-title":"Graph attention networks","volume-title":"Int. Conf. Learn. Represent.","volume":"1050","author":"Velickovic"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref50","article-title":"HOFA: Twitter bot detection with homophily-oriented augmentation and frequency adaptive attention","author":"Ye","year":"2023","journal-title":"arXiv:2306.12870"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612569"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357820"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3490181"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17315"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.62"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00575"},{"key":"ref59","first-page":"1","article-title":"Variational dropout and the local reparameterization trick","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Kingma"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(95)01766-6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482019"},{"key":"ref65","article-title":"MGTAB: A multi-relational graph-based Twitter account detection benchmark","author":"Shi","year":"2023","journal-title":"arXiv:2301.01123"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.115"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326015"},{"key":"ref69","first-page":"1","article-title":"TwiBot-22: Towards graph-based Twitter bot detection","volume-title":"Proc. 36th Conf. Neural Inf. Process. Syst. Datasets Benchmarks Track","author":"Feng"},{"key":"ref70","article-title":"Fast graph representation learning with PyTorch geometric","author":"Fey","year":"2019","journal-title":"arXiv:1903.02428"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380027"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467350"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10949581\/10530431.pdf?arnumber=10530431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:55:36Z","timestamp":1744062936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10530431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":72,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2024.3396192","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}