{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T01:33:32Z","timestamp":1771983212380,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1145\/2030376.2030382","type":"proceedings-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:28Z","timestamp":1315917808000},"page":"46-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["A social-spam detection framework"],"prefix":"10.1145","author":[{"given":"De","family":"Wang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia"}]},{"given":"Danesh","family":"Irani","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia"}]},{"given":"Calton","family":"Pu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/hootsuite.com\/.  http:\/\/hootsuite.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/tweetdeck.com\/.  http:\/\/tweetdeck.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/code.google.com\/apis\/opensocial\/.  http:\/\/code.google.com\/apis\/opensocial\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Seventh annual Collaboration, Electronic messaging, AntiAbuse and Spam Conference (CEAS 2010)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida . Detecting spammers on twitter . In Proceedings of the Seventh annual Collaboration, Electronic messaging, AntiAbuse and Spam Conference (CEAS 2010) , 2010 . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Proceedings of the Seventh annual Collaboration, Electronic messaging, AntiAbuse and Spam Conference (CEAS 2010), 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the the Sixth Conference on Email and Anti--Spam (CEAS 2009)","author":"Byun B.","year":"2009","unstructured":"B. Byun , C. Lee , S. Webb , D. Irani , and C. Pu . An anti-spam filter combination framework for text-and-image emails through incremental learning . In Proceedings of the the Sixth Conference on Email and Anti--Spam (CEAS 2009) , 2009 . B. Byun, C. Lee, S. Webb, D. Irani, and C. Pu. An anti-spam filter combination framework for text-and-image emails through incremental learning. In Proceedings of the the Sixth Conference on Email and Anti--Spam (CEAS 2009), 2009."},{"key":"e_1_3_2_1_6_1","volume-title":"Boosting trees for anti-spam email filtering. Arxiv preprint","author":"Carreras X.","year":"2001","unstructured":"X. Carreras and L. Marquez . Boosting trees for anti-spam email filtering. Arxiv preprint , 2001 . X. Carreras and L. Marquez. Boosting trees for anti-spam email filtering. Arxiv preprint, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378889.1378908"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the International Conference on Weblogs and Social Media, 8","author":"Caverlee J.","year":"2008","unstructured":"J. Caverlee and S. Webb . A large-scale study of MySpace: Observations and implications for online social networks . Proceedings of the International Conference on Weblogs and Social Media, 8 , 2008 . J. Caverlee and S. Webb. A large-scale study of MySpace: Observations and implications for online social networks. Proceedings of the International Conference on Weblogs and Social Media, 8, 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_10_1","volume-title":"Additive logistic regression: a statistical view of boosting. The annals of statistics, 28(2):337--407","author":"Friedman J.","year":"2000","unstructured":"J. Friedman , T. Hastie , and R. Tibshirani . Additive logistic regression: a statistical view of boosting. The annals of statistics, 28(2):337--407 , 2000 . J. Friedman, T. Hastie, and R. Tibshirani. Additive logistic regression: a statistical view of boosting. The annals of statistics, 28(2):337--407, 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2009.77"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceeding of the Thirtieth international conference on Very large data bases","volume":"30","author":"Gyongyi Z.","year":"2004","unstructured":"Z. Gyongyi , H. Garcia-Monlina , and J. Pedersen . Combating web spam with trustrank . In Proceeding of the Thirtieth international conference on Very large data bases , volume 30 , 2004 . Z. Gyongyi, H. Garcia-Monlina, and J. Pedersen. Combating web spam with trustrank. In Proceeding of the Thirtieth international conference on Very large data bases, volume 30, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00063-3"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume":"2008","author":"Irani D.","year":"2008","unstructured":"D. Irani , S. Webb , J. Giffin , and C. Pu . Evolutionary study of phishing. eCrime Researchers Summit , 2008 , pages 1 -- 10 , 2008 . D. Irani, S. Webb, J. Giffin, and C. Pu. Evolutionary study of phishing. eCrime Researchers Summit, 2008, pages 1--10, 2008.","journal-title":"Evolutionary study of phishing. eCrime Researchers Summit"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media","author":"Irani D.","year":"2010","unstructured":"D. Irani , S. Webb , and C. Pu . Study of static classification of social spam profiles in myspace . In Proceedings of the International AAAI Conference on Weblogs and Social Media , May 2010 . D. Irani, S. Webb, and C. Pu. Study of static classification of social spam profiles in myspace. In Proceedings of the International AAAI Conference on Weblogs and Social Media, May 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"Anti-Abuse and Spam Conference (CEAS 2010)","author":"Irani D.","year":"2010","unstructured":"D. Irani , S. Webb , C. Pu , and K. Li . Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS 2010) , 2010 . D. Irani, S. Webb, C. Pu, and K. Li. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387710"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Learmonth. Twitter getting serious about spam issue. http:\/\/adage.com\/article\/digital\/digital-marketing-twitter-spam-issue\/142800\/ 2010.  M. Learmonth. Twitter getting serious about spam issue. http:\/\/adage.com\/article\/digital\/digital-marketing-twitter-spam-issue\/142800\/ 2010."},{"issue":"1","key":"e_1_3_2_1_20_1","volume":"1","author":"Lex E.","year":"2010","unstructured":"E. Lex , C. Seifert , M. Granitzer , and A. Juffinger . Efficient cross-domain classification of weblogs. International Journal of Intelligent Computing Research , 1 ( 1 ), 2010 . E. Lex, C. Seifert, M. Granitzer, and A. Juffinger. Efficient cross-domain classification of weblogs. International Journal of Intelligent Computing Research, 1(1), 2010.","journal-title":"Efficient cross-domain classification of weblogs. International Journal of Intelligent Computing Research"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006)","author":"Pu C.","year":"2006","unstructured":"C. Pu and S. Webb . Observed trends in spam construction techniques: a case study of spam evolution . In Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006) , 2006 . C. Pu and S. Webb. Observed trends in spam construction techniques: a case study of spam evolution. In Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006), 2006."},{"key":"e_1_3_2_1_22_1","first-page":"17","volume-title":"Proceedings of the IEEE International Conference on Granular Computing (GrC06)","author":"Pu C.","unstructured":"C. Pu , S. Webb , O. Kolesnikov , W. Lee , and R. Lipton . Towards the integration of diverse spam filtering techniques . In Proceedings of the IEEE International Conference on Granular Computing (GrC06) , pages 17 -- 20 . C. Pu, S. Webb, O. Kolesnikov, W. Lee, and R. Lipton. Towards the integration of diverse spam filtering techniques. In Proceedings of the IEEE International Conference on Granular Computing (GrC06), pages 17--20."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_26_1","volume-title":"of Standards, and T. (US). TREC: Experiment and evaluation in information retrieval","author":"Voorhees E.","year":"2005","unstructured":"E. Voorhees , D. Harman , N. I. of Standards, and T. (US). TREC: Experiment and evaluation in information retrieval . MIT press USA , 2005 . E. Voorhees, D. Harman, N. I. of Standards, and T. (US). TREC: Experiment and evaluation in information retrieval. MIT press USA, 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"Cross-domain text classification using wikipedia","author":"Wang P.","year":"2008","unstructured":"P. Wang , C. Domeniconi , and J. Hu . Cross-domain text classification using wikipedia . IEEE Intelligent Informatics Bulletin , 9(1), 2008 . P. Wang, C. Domeniconi, and J. Hu. Cross-domain text classification using wikipedia. IEEE Intelligent Informatics Bulletin, 9(1), 2008."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006)","author":"Webb S.","year":"2006","unstructured":"S. Webb , J. Caverlee , and C. Pu . Introducing the webb spam corpus: Using email spam to identify web spam automatically . In Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006) , 2006 . S. Webb, J. Caverlee, and C. Pu. Introducing the webb spam corpus: Using email spam to identify web spam automatically. In Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006), 2006."},{"key":"e_1_3_2_1_29_1","first-page":"84","volume-title":"Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2007","author":"Webb S.","year":"2007","unstructured":"S. Webb , J. Caverlee , and C. Pu . Characterizing web spam using content and http session analysis . In Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2007 ), pages 84 -- 89 , August 2007 . S. Webb, J. Caverlee, and C. Pu. Characterizing web spam using content and http session analysis. In Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2007), pages 84--89, August 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458129"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008)","author":"Webb S.","year":"2008","unstructured":"S. Webb , J. Caverlee , and C. Pu . Social honeypots: Making friends with a spammer near you . In Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008) , 2008 . S. Webb, J. Caverlee, and C. Pu. Social honeypots: Making friends with a spammer near you. In Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), 2008."}],"event":{"name":"CEAS '11: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","location":"Perth Australia","acronym":"CEAS '11"},"container-title":["Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030376.2030382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":30,"alternative-id":["10.1145\/2030376.2030382","10.1145\/2030376"],"URL":"https:\/\/doi.org\/10.1145\/2030376.2030382","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}