{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:06:22Z","timestamp":1771524382643,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T00:00:00Z","timestamp":1495152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,19]]},"DOI":"10.1145\/3093241.3093281","type":"proceedings-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:49:04Z","timestamp":1504291744000},"page":"6-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A Statistical Learning Approach to Detect Abusive Twitter Accounts"],"prefix":"10.1145","author":[{"given":"Ehab A.","family":"Abozinadah","sequence":"first","affiliation":[{"name":"Department of Information System, King Abdul-Aziz University Jeddah, Saudi Arabia"}]},{"suffix":"Jr.","given":"James H.","family":"Jones","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia U.S.A."}]}],"member":"320","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abozinadah E.A. and Jones  Jr J.H. IMPROVED MICROBLOG CLASSIFICATION FOR DETECTING ABUSIVE ARABIC TWITTER ACCOUNTS. International Journal of Data Mining & Knowledge Management Process (IJDKP). 6 6 17--28.  Abozinadah E.A. and Jones Jr J.H. IMPROVED MICROBLOG CLASSIFICATION FOR DETECTING ABUSIVE ARABIC TWITTER ACCOUNTS. International Journal of Data Mining & Knowledge Management Process (IJDKP). 6 6 17--28.","DOI":"10.5121\/ijdkp.2016.6602"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJKE.2015.V1.19"},{"key":"e_1_3_2_1_3_1","unstructured":"Adult or sexual products and services: https:\/\/help.twitter.com\/articles\/20170427?lang=en. Accessed: 2017--04-03.  Adult or sexual products and services: https:\/\/help.twitter.com\/articles\/20170427?lang=en. Accessed: 2017--04-03."},{"key":"e_1_3_2_1_4_1","first-page":"124","article-title":"Automated Arabic Text Categorization Using SVM and NB","volume":"2","author":"Alsaleem S.","year":"2011","unstructured":"Alsaleem , S. 2011 . Automated Arabic Text Categorization Using SVM and NB . Int. Arab J. e-Technol. 2 , 2 (2011), 124 -- 128 . Alsaleem, S. 2011. Automated Arabic Text Categorization Using SVM and NB. Int. Arab J. e-Technol. 2, 2 (2011), 124--128.","journal-title":"Int. Arab J. e-Technol."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10368"},{"key":"e_1_3_2_1_6_1","first-page":"18","article-title":"Feature selection based on information gain","volume":"2","author":"Azhagusundari B.","year":"2013","unstructured":"Azhagusundari , B. and Thanamani , A.S. 2013 . Feature selection based on information gain . International Journal of Innovative Technology and Exploring Engineering (IJITEE). 2 , 2 (2013), 18 -- 21 . Azhagusundari, B. and Thanamani, A.S. 2013. Feature selection based on information gain. International Journal of Innovative Technology and Exploring Engineering (IJITEE). 2, 2 (2013), 18--21.","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)."},{"key":"e_1_3_2_1_7_1","volume-title":"Anti-Abuse and Spam Conference (CEAS","author":"Benevenuto F.","year":"2010","unstructured":"Benevenuto , F. , Magno , G. , Rodrigues , T. and Almeida , V . 2010. Detecting spammers on twitter. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS ( 2010 ). Benevenuto, F., Magno, G., Rodrigues, T. and Almeida, V. 2010. Detecting spammers on twitter. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS (2010)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Third International WordNet Conference","author":"Black W.","year":"2006","unstructured":"Black , W. , Elkateb , S. , Rodriguez , H. , Alkhalifa , M. , Vossen , P. , Pease , A. and Fellbaum , C . 2006. Introducing the Arabic wordnet project . Proceedings of the Third International WordNet Conference ( 2006 ), 295--300. Black, W., Elkateb, S., Rodriguez, H., Alkhalifa, M., Vossen, P., Pease, A. and Fellbaum, C. 2006. Introducing the Arabic wordnet project. Proceedings of the Third International WordNet Conference (2006), 295--300."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213479374"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663720"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2357012"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Human Language Technology Conference of the NAACL","author":"Diab M.","year":"2007","unstructured":"Diab , M. and Habash , N . 2007. Arabic dialect processing tutorial . Proceedings of the Human Language Technology Conference of the NAACL , Companion Volume: Tutorial Abstracts ( 2007 ), 5--6. Diab, M. and Habash, N. 2007. Arabic dialect processing tutorial. Proceedings of the Human Language Technology Conference of the NAACL, Companion Volume: Tutorial Abstracts (2007), 5--6."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/1621804.1621819"},{"key":"e_1_3_2_1_15_1","first-page":"4","article-title":"Arabic Natural Language Processing","volume":"8","author":"Farghaly A.","year":"2009","unstructured":"Farghaly , A. and Shaalan , K. 2009 . Arabic Natural Language Processing : Challenges and Solutions. 8 , 4 (Dec. 2009), 14:1--14:22. Farghaly, A. and Shaalan, K. 2009. Arabic Natural Language Processing: Challenges and Solutions. 8, 4 (Dec. 2009), 14:1--14:22.","journal-title":"Challenges and Solutions."},{"key":"e_1_3_2_1_16_1","volume-title":"Second Joint Conference on Lexical and Computational Semantics. 2","author":"Hamdan H.","year":"2013","unstructured":"Hamdan , H. , Bechet , F. and Bellot , P . 2013. Experiments with DBpedia, WordNet and SentiWordNet as re- sources for sentiment analysis in micro-blogging . Second Joint Conference on Lexical and Computational Semantics. 2 , ( 2013 ). Hamdan, H., Bechet, F. and Bellot, P. 2013. Experiments with DBpedia, WordNet and SentiWordNet as re- sources for sentiment analysis in micro-blogging. Second Joint Conference on Lexical and Computational Semantics. 2, (2013)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3115\/976909.979640"},{"key":"e_1_3_2_1_18_1","volume-title":"Anti-Abuse and Spam Conference (CEAS","author":"Irani D.","year":"2010","unstructured":"Irani , D. , Webb , S. and Pu , C . 2010. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS ( 2010 ). Irani, D., Webb, S. and Pu, C. 2010. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS (2010)."},{"key":"e_1_3_2_1_19_1","volume-title":"Text categorization with Support Vector Machines: Learning with many relevant features. Machine Learning: ECML-98","author":"Joachims T.","unstructured":"Joachims , T. 1998. Text categorization with Support Vector Machines: Learning with many relevant features. Machine Learning: ECML-98 . C. N\u00e9dellec and C. Rouveirol, eds. Springer Berlin Heidelberg . 137--142. Joachims, T. 1998. Text categorization with Support Vector Machines: Learning with many relevant features. Machine Learning: ECML-98. C. N\u00e9dellec and C. Rouveirol, eds. Springer Berlin Heidelberg. 137--142."},{"key":"e_1_3_2_1_20_1","volume-title":"Users Blame Twitter","author":"Kirtsy Has Porn","year":"2008","unstructured":"Kirtsy Has Porn , Users Blame Twitter : 2008 . https:\/\/thenextweb.com\/2008\/12\/23\/kirtsy-has-porn-users-blame-twitter\/. Accessed : 2017--04-06. Kirtsy Has Porn, Users Blame Twitter: 2008. https:\/\/thenextweb.com\/2008\/12\/23\/kirtsy-has-porn-users-blame-twitter\/. Accessed: 2017--04-06."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Litvak M. Last M. Aizenman H. Gobits I. and Kandel A. 2011. DegExt --- A Language-Independent Graph-Based Keyphrase Extractor. Advances in Intelligent Web Mastering -- 3. E. Mugellini P.S. Szczepaniak M.C. Pettenati and M. Sokhn eds. Springer Berlin Heidelberg. 121--130.  Litvak M. Last M. Aizenman H. Gobits I. and Kandel A. 2011. DegExt --- A Language-Independent Graph-Based Keyphrase Extractor. Advances in Intelligent Web Mastering -- 3. E. Mugellini P.S. Szczepaniak M.C. Pettenati and M. Sokhn eds. Springer Berlin Heidelberg. 121--130.","DOI":"10.1007\/978-3-642-18029-3_13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Mamoun R. and Ahmed M. 2016. Arabic text stemming: Comparative analysis. 2016 Conference of Basic Sciences and Engineering Studies (SGCAC) (Feb. 2016) 88--93.  Mamoun R. and Ahmed M. 2016. Arabic text stemming: Comparative analysis. 2016 Conference of Basic Sciences and Engineering Studies (SGCAC) (Feb. 2016) 88--93.","DOI":"10.1109\/SGCAC.2016.7458011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"McCord M. and Chuah M. 2011. Spam Detection on Twitter Using Traditional Classifiers. Autonomic and Trusted Computing. J.M.A. Calero L.T. Yang F.G. M\u00e1rmol L.J.G. Villalba A.X. Li and Y. Wang eds. Springer Berlin Heidelberg. 175--186.  McCord M. and Chuah M. 2011. Spam Detection on Twitter Using Traditional Classifiers. Autonomic and Trusted Computing. J.M.A. Calero L.T. Yang F.G. M\u00e1rmol L.J.G. Villalba A.X. Li and Y. Wang eds. Springer Berlin Heidelberg. 175--186.","DOI":"10.1007\/978-3-642-23496-5_13"},{"key":"e_1_3_2_1_24_1","unstructured":"Mihalcea R. and Tarau P. 2004. TextRank: Bringing Order into Texts. (2004) 404--411.  Mihalcea R. and Tarau P. 2004. TextRank: Bringing Order into Texts. (2004) 404--411."},{"key":"e_1_3_2_1_25_1","volume-title":"-H","author":"Na S.-H.","year":"2009","unstructured":"Na , S.-H. , Lee , Y. , Nam , S.-H. and Lee , J . -H . 2009 . Improving Opinion Retrieval Based on Query-Specific Sentiment Lexicon. Advances in Information Retrieval (Apr . 2009), 734--738. Na, S.-H., Lee, Y., Nam, S.-H. and Lee, J.-H. 2009. Improving Opinion Retrieval Based on Query-Specific Sentiment Lexicon. Advances in Information Retrieval (Apr. 2009), 734--738."},{"key":"e_1_3_2_1_26_1","unstructured":"nltk.stem.isri --- NLTK 3.0 documentation: http:\/\/www.nltk.org\/_modules\/nltk\/stem\/isri.html. Accessed: 2016--10-07.  nltk.stem.isri --- NLTK 3.0 documentation: http:\/\/www.nltk.org\/_modules\/nltk\/stem\/isri.html. Accessed: 2016--10-07."},{"key":"e_1_3_2_1_27_1","volume-title":"United States Patent: 6285999 - Method for node ranking in a linked database. 6285999","author":"Page L.","year":"2001","unstructured":"Page , L. 2001. United States Patent: 6285999 - Method for node ranking in a linked database. 6285999 . Sep. 4, 2001 . Page, L. 2001. United States Patent: 6285999 - Method for node ranking in a linked database. 6285999. Sep. 4, 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.05.007"},{"key":"e_1_3_2_1_29_1","unstructured":"PyArabic 0.5: Python Package Index: https:\/\/pypi.python.org\/pypi\/PyArabic\/0.5. Accessed: 2016--10-07.  PyArabic 0.5: Python Package Index: https:\/\/pypi.python.org\/pypi\/PyArabic\/0.5. Accessed: 2016--10-07."},{"key":"e_1_3_2_1_30_1","unstructured":"Rafter M.V. 2009. An open letter to Twitter: stop the porn spam. WordCount.  Rafter M.V. 2009. An open letter to Twitter: stop the porn spam. WordCount."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668260.2668285"},{"key":"e_1_3_2_1_32_1","unstructured":"Saudi govt. agencies struggling to fight porn on social media: http:\/\/english.alarabiya.net\/en\/media\/digital\/2014\/03\/19\/Saudi-govt-agencies-struggling-to-fight-porn-on-social-media.html. Accessed: 2014--11-21.  Saudi govt. agencies struggling to fight porn on social media: http:\/\/english.alarabiya.net\/en\/media\/digital\/2014\/03\/19\/Saudi-govt-agencies-struggling-to-fight-porn-on-social-media.html. Accessed: 2014--11-21."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-016-0350-0"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835643"},{"key":"e_1_3_2_1_35_1","unstructured":"stop-words - Stop words - Google Project Hosting: https:\/\/code.google.com\/p\/stop-words\/. Accessed: 2014--11-22.  stop-words - Stop words - Google Project Hosting: https:\/\/code.google.com\/p\/stop-words\/. Accessed: 2014--11-22."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2539150.2539190"},{"key":"e_1_3_2_1_37_1","volume-title":"el","author":"Thabtah F.","year":"2009","unstructured":"Thabtah , F. , Eljinini , M. , Zamzeer , M. and Hadi , W . ' el 2009 . Na\u00efve Bayesian Based on Chi Square to Categorize Arabic. IBIMA. 10, (2009), 158--163. Thabtah, F., Eljinini, M., Zamzeer, M. and Hadi, W. 'el 2009. Na\u00efve Bayesian Based on Chi Square to Categorize Arabic. IBIMA. 10, (2009), 158--163."},{"key":"e_1_3_2_1_38_1","unstructured":"The Arab Spring: A Year Of Revolution: http:\/\/www.npr.org\/2011\/12\/17\/143897126\/the-arab-spring-a-year-of-revolution. Accessed: 2017--03-01.  The Arab Spring: A Year Of Revolution: http:\/\/www.npr.org\/2011\/12\/17\/143897126\/the-arab-spring-a-year-of-revolution. Accessed: 2017--03-01."},{"key":"e_1_3_2_1_39_1","first-page":"45","article-title":"Support Vector Machine Active Learning with Applications to Text Classification","author":"Tong S.","year":"2001","unstructured":"Tong , S. and Koller , D. 2001 . Support Vector Machine Active Learning with Applications to Text Classification . Journal of Machine Learning Research. 2 , Nov (2001), 45 -- 66 . Tong, S. and Koller, D. 2001. Support Vector Machine Active Learning with Applications to Text Classification. Journal of Machine Learning Research. 2, Nov (2001), 45--66.","journal-title":"Journal of Machine Learning Research. 2"},{"key":"e_1_3_2_1_40_1","unstructured":"Tong S. and Koller D. 2002. Support Vector Machine Active Learning with Applications to Text Classification. J. Mach. Learn. Res. 2 (Mar. 2002) 45--66.  Tong S. and Koller D. 2002. Support Vector Machine Active Learning with Applications to Text Classification. J. Mach. Learn. Res. 2 (Mar. 2002) 45--66."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44795-4_42"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics","author":"Turney P.D.","year":"2002","unstructured":"Turney , P.D. 2002 . Thumbs Up or Thumbs Down?: Semantic Orientation Applied to Unsupervised Classification of Reviews . Proceedings of the 40th Annual Meeting on Association for Computational Linguistics ( Stroudsburg, PA, USA , 2002), 417--424. Turney, P.D. 2002. Thumbs Up or Thumbs Down?: Semantic Orientation Applied to Unsupervised Classification of Reviews. Proceedings of the 40th Annual Meeting on Association for Computational Linguistics (Stroudsburg, PA, USA, 2002), 417--424."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2222444.2222456"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/AEECT.2013.6716442"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (Jul.","author":"Wang A.H.","year":"2010","unstructured":"Wang , A.H. 2010 . Don't follow me: Spam detection in Twitter . Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (Jul. 2010), 1--10. Wang, A.H. 2010. Don't follow me: Spam detection in Twitter. Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (Jul. 2010), 1--10."},{"key":"e_1_3_2_1_46_1","volume-title":"An Introduction to Categorical Data Analysis","author":"Wiley","year":"2017","unstructured":"Wiley : An Introduction to Categorical Data Analysis , 2 nd Edition - Alan Agresti: http:\/\/www.wiley.com\/WileyCDA\/WileyTitle\/productCd-EHEP000369.html. Accessed : 2017 --03-16. Wiley: An Introduction to Categorical Data Analysis, 2nd Edition - Alan Agresti: http:\/\/www.wiley.com\/WileyCDA\/WileyTitle\/productCd-EHEP000369.html. Accessed: 2017--03-16.","edition":"2"},{"key":"e_1_3_2_1_47_1","unstructured":"Winter S. 2015. Do social media likes & followers = popularity?  Winter S. 2015. Do social media likes & followers = popularity?"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963504"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.129"}],"event":{"name":"ICCDA '17: 2017 International Conference on Compute and Data Analysis","location":"Lakeland FL USA","acronym":"ICCDA '17","sponsor":["University of Florida University of Florida"]},"container-title":["Proceedings of the International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093241.3093281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093241.3093281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,19]]},"references-count":49,"alternative-id":["10.1145\/3093241.3093281","10.1145\/3093241"],"URL":"https:\/\/doi.org\/10.1145\/3093241.3093281","relation":{},"subject":[],"published":{"date-parts":[[2017,5,19]]},"assertion":[{"value":"2017-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}