{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:31:26Z","timestamp":1766136686316,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T00:00:00Z","timestamp":1454889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61272374, 61300190"],"award-info":[{"award-number":["61272374, 61300190"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National High Technology Research and Development Program (863 Program) of China","award":["2015AA015403"],"award-info":[{"award-number":["2015AA015403"]}]},{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education","doi-asserted-by":"crossref","award":["20120041110046"],"award-info":[{"award-number":["20120041110046"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Project of Chinese Ministry of Education","award":["313011"],"award-info":[{"award-number":["313011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2016,2,17]]},"abstract":"<jats:p>Twitter has become a target platform for both promoters and spammers to disseminate their messages, which are more harmful than traditional spamming methods, such as email spamming. Recently, large amounts of campaigns that contain lots of spam or promotion accounts have emerged in Twitter. The campaigns cooperatively post unwanted information, and thus they can infect more normal users than individual spam or promotion accounts. Organizing or participating in campaigns has become the main technique to spread spam or promotion information in Twitter. Since traditional solutions focus on checking individual accounts or messages, efficient techniques for detecting spam and promotion campaigns in Twitter are urgently needed. In this article, we propose a framework to detect both spam and promotion campaigns. Our framework consists of three steps: the first step links accounts who post URLs for similar purposes; the second step extracts candidate campaigns that may be for spam or promotion purposes; and the third step classifies the candidate campaigns into normal, spam, and promotion groups. The key point of the framework is how to measure the similarity between accounts' purposes of posting URLs. We present two measure methods based on Shannon information theory: the first one uses the URLs posted by the users, and the second one considers both URLs and timestamps. Experimental results demonstrate that the proposed methods can extract the majority of the candidate campaigns correctly, and detect promotion and spam campaigns with high precision and recall.<\/jats:p>","DOI":"10.1145\/2846102","type":"journal-article","created":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T22:37:07Z","timestamp":1454971027000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Detecting Spam and Promoting Campaigns in Twitter"],"prefix":"10.1145","volume":"10","author":[{"given":"Xianchao","family":"Zhang","sequence":"first","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Zhaoxing","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Shaoping","family":"Zhu","sequence":"additional","affiliation":[{"name":"Mobile Internet Inc., Beijing, China"}]},{"given":"Wenxin","family":"Liang","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2016,2,8]]},"reference":[{"volume-title":"Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10)","author":"Benevenuto F.","key":"e_1_2_1_1_1","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida . 2010. Detecting spammers on twitter . In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10) . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. 2010. Detecting spammers on twitter. In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572047"},{"volume-title":"Proceedings of the 9th Belgian-Dutch Information Retrieval Workshop (DIR'09)","author":"Bogers T.","key":"e_1_2_1_3_1","unstructured":"T. Bogers and A. Van den Bosch. 2009. Using language modeling for spam detection in social reference manager Websites . In Proceedings of the 9th Belgian-Dutch Information Retrieval Workshop (DIR'09) . 87--94. T. Bogers and A. Van den Bosch. 2009. Using language modeling for spam detection in social reference manager Websites. In Proceedings of the 9th Belgian-Dutch Information Retrieval Workshop (DIR'09). 87--94."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646235"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_27"},{"volume-title":"Proceedings of the 23rd International Conference on Computational Linguistics (COLING'10)","author":"Duan Y.","key":"e_1_2_1_6_1","unstructured":"Y. Duan , L. Jiang , T. Qin , M. Zhou , and H. Y. Shum . 2010. An empirical study on learning to rank of tweets . In Proceedings of the 23rd International Conference on Computational Linguistics (COLING'10) . 295--303. Y. Duan, L. Jiang, T. Qin, M. Zhou, and H. Y. Shum. 2010. An empirical study on learning to rank of tweets. In Proceedings of the 23rd International Conference on Computational Linguistics (COLING'10). 295--303."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809292"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"volume-title":"Proceedings of the 2nd Conference on Networked Digital Technologies (NDT). Springer Berlin Heidelberg, 523--528","author":"Hatanaka T.","key":"e_1_2_1_11_1","unstructured":"T. Hatanaka and H. Hisamatsu . 2010. Method for countering social bookmarking pollution using user similarities . In Proceedings of the 2nd Conference on Networked Digital Technologies (NDT). Springer Berlin Heidelberg, 523--528 . T. Hatanaka and H. Hisamatsu. 2010. Method for countering social bookmarking pollution using user similarities. In Proceedings of the 2nd Conference on Networked Digital Technologies (NDT). Springer Berlin Heidelberg, 523--528."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.125"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.109"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14)","author":"Hu Xia","year":"2014","unstructured":"Xia Hu , Jiliang Tang , and Huan Liu . 2014 . Online social spammer detection . In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14) . 59--65. Xia Hu, Jiliang Tang, and Huan Liu. 2014. Online social spammer detection. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI'14). 59--65."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13)","author":"Hu Xia","year":"2013","unstructured":"Xia Hu , Jiliang Tang , Yanchao Zhang , and Huan Liu . 2013 . Social spammer detection in microblogging . In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13) . 2633--2639. Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu. 2013. Social spammer detection in microblogging. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13). 2633--2639."},{"volume-title":"Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10)","author":"Irani D.","key":"e_1_2_1_16_1","unstructured":"D. Irani , S. Webb , C. Pu , and K. Li . 2010. Study of trend-stuffing on Twitter through text classification . In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10) . D. Irani, S. Webb, C. Pu, and K. Li. 2010. Study of trend-stuffing on Twitter through text classification. In Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse, and Spam Conference (CEAS'10)."},{"volume-title":"Proceedings of the 37th International Conference on Very Large Data Bases (VLDB'11)","author":"Jin X.","key":"e_1_2_1_17_1","unstructured":"X. Jin , C. X. Lin , J. Luo , and J. Han . 2011. SocialSpamGuard: A data mining-based spam detection system for social media networks . In Proceedings of the 37th International Conference on Very Large Data Bases (VLDB'11) . 1458--1461. X. Jin, C. X. Lin, J. Luo, and J. Han. 2011. SocialSpamGuard: A data mining-based spam detection system for social media networks. In Proceedings of the 37th International Conference on Very Large Data Bases (VLDB'11). 1458--1461."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772837"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451998"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063658"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542182.2542191"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531924"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572046"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767701"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718491"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505581"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063941"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT'10)","author":"Wang A. H.","year":"2010","unstructured":"A. H. Wang . 2010 . Don't follow me: Spam detection in Twitter . In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT'10) . IEEE, Los Alamitos, CA, 1--10. A. H. Wang. 2010. Don't follow me: Spam detection in Twitter. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT'10). IEEE, Los Alamitos, CA, 1--10."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030382"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376663"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402979"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505700"},{"volume-title":"Proceedings of the International Conference on Web Information Systems Engineering (WISE'10)","author":"Yamaguchi Y.","key":"e_1_2_1_34_1","unstructured":"Y. Yamaguchi , T. Takahashi , T. Amagasa , and H. Kitagawa . 2010. TURank: Twitter user ranking based on user-tweet graph analysis . In Proceedings of the International Conference on Web Information Systems Engineering (WISE'10) . 240--253. Y. Yamaguchi, T. Takahashi, T. Amagasa, and H. Kitagawa. 2010. TURank: Twitter user ranking based on user-tweet graph analysis. In Proceedings of the International Conference on Web Information Systems Engineering (WISE'10). 240--253."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI'12)","author":"Zhu Yin","year":"2012","unstructured":"Yin Zhu , Xiao Wang , Erheng Zhong , Nathan Nan Liu , He Li , and Qiang Yang . 2012 . Discovering spammers in social networks . In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI'12) . 171--177. Yin Zhu, Xiao Wang, Erheng Zhong, Nathan Nan Liu, He Li, and Qiang Yang. 2012. Discovering spammers in social networks. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI'12). 171--177."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2846102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,8]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,17]]}},"alternative-id":["10.1145\/2846102"],"URL":"https:\/\/doi.org\/10.1145\/2846102","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2016,2,8]]},"assertion":[{"value":"2015-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}