{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:07Z","timestamp":1750219807913,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T00:00:00Z","timestamp":1481932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,17]]},"DOI":"10.1145\/3033288.3033349","type":"proceedings-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T12:30:32Z","timestamp":1491568232000},"page":"126-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Jing","family":"Deng","sequence":"first","affiliation":[{"name":"Dept. of Computer Science, UNC Greensboro, Greensboro, NC, U.S.A."}]},{"given":"Xiaoli","family":"Gao","sequence":"additional","affiliation":[{"name":"Dept. of Math. and Statistics, UNC Greensboro, Greensboro, NC, U.S.A."}]},{"given":"Chunyue","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Comm. Engr., Jilin University, Changchun, Jilin, P. R. China"}]}],"member":"320","published-online":{"date-parts":[[2016,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.12733\/jics20103986"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.12733\/jics20105065"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2781562.2781576"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_27"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1007\/978-3-319-06605-9_49","volume-title":"V. Tseng, T. Ho, Z.-H. Zhou, A. Chen, and H.-Y","author":"Shen Y.","year":"2014","unstructured":"Y. Shen , J. Yu , K. Dong , and K. Nan . Automatic fake followers detection in chinese micro-blogging system . In V. Tseng, T. Ho, Z.-H. Zhou, A. Chen, and H.-Y . Kao, editors, Advances in Knowledge Discovery and Data Mining, volume 8444 of Lecture Notes in Computer Science , pages 596 -- 607 . Springer International Publishing , 2014 . Y. Shen, J. Yu, K. Dong, and K. Nan. Automatic fake followers detection in chinese micro-blogging system. In V. Tseng, T. Ho, Z.-H. Zhou, A. Chen, and H.-Y. Kao, editors, Advances in Knowledge Discovery and Data Mining, volume 8444 of Lecture Notes in Computer Science, pages 596--607. Springer International Publishing, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUSIC.2012.18"},{"key":"e_1_3_2_1_10_1","volume-title":"23rd International Joint Conference on Artificial Intelligence (IJCAI '13)","author":"Hu X.","year":"2013","unstructured":"X. Hu , J. Tang , Y. Zhang , and H. Liu . Social spammer detection in microblogging . In 23rd International Joint Conference on Artificial Intelligence (IJCAI '13) , August 3-9 2013 . X. Hu, J. Tang, Y. Zhang, and H. Liu. Social spammer detection in microblogging. In 23rd International Joint Conference on Artificial Intelligence (IJCAI '13), August 3-9 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248479"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577306"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Collaboration, electronic messaging, anti-abuse and spam conference (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida . Detecting spammers on twitter . In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) , volume 6 , pages 1 -- 9 , 2010 . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), volume 6, pages 1--9, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.166"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2812702"},{"key":"e_1_3_2_1_16_1","first-page":"24","volume-title":"Proc. of the third IARIA International Conference on Building and Exploring Web Based Environments (WEB 2015","author":"Deng J.","year":"2015","unstructured":"J. Deng , L. Fu , and Y. Yang . ZLOC: Detection of zombie users in online social networks using location information . In Proc. of the third IARIA International Conference on Building and Exploring Web Based Environments (WEB 2015 ), pages 24 -- 28 , Rome, Italy , May 24-29 2015 . J. Deng, L. Fu, and Y. Yang. ZLOC: Detection of zombie users in online social networks using location information. In Proc. of the third IARIA International Conference on Building and Exploring Web Based Environments (WEB 2015), pages 24--28, Rome, Italy, May 24-29 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"Elements of Statistical Learning: Data Mining, Inference and Prediction","author":"Hastie T.","year":"2009","unstructured":"T. Hastie , R. Tibshirani , and J. H. Friedman . Elements of Statistical Learning: Data Mining, Inference and Prediction ( Second Edition). Springer-Verlag , New York , 2009 . T. Hastie, R. Tibshirani, and J. H. Friedman. Elements of Statistical Learning: Data Mining, Inference and Prediction (Second Edition). Springer-Verlag, New York, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00607.x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00627.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-AOS729"}],"event":{"name":"ICNCC '16: Fifth International Conference on Network, Communication and Computing","acronym":"ICNCC '16","location":"Kyoto Japan"},"container-title":["Proceedings of the Fifth International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3033288.3033349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3033288.3033349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:04Z","timestamp":1750218604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3033288.3033349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,17]]},"references-count":20,"alternative-id":["10.1145\/3033288.3033349","10.1145\/3033288"],"URL":"https:\/\/doi.org\/10.1145\/3033288.3033349","relation":{},"subject":[],"published":{"date-parts":[[2016,12,17]]},"assertion":[{"value":"2016-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}