{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:53:35Z","timestamp":1776394415434,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106489","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"195-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Fake Twitter followers detection by denoising autoencoder"],"prefix":"10.1145","author":[{"given":"Jacopo","family":"Castellini","sequence":"first","affiliation":[{"name":"University of Perugia, Perugia, Italy"}]},{"given":"Valentina","family":"Poggioni","sequence":"additional","affiliation":[{"name":"University of Perugia, Perugia, Italy"}]},{"given":"Giulia","family":"Sorbi","sequence":"additional","affiliation":[{"name":"University of Perugia, Perugia, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Twitter Inc Twitter's IPO filing. http:\/\/www.sec.gov\/Archives\/edgar\/data\/1418091\/000119312513390321\/d564001ds1.htm. (????). October 2013.  Twitter Inc Twitter's IPO filing. http:\/\/www.sec.gov\/Archives\/edgar\/data\/1418091\/000119312513390321\/d564001ds1.htm. (????). October 2013."},{"key":"e_1_3_2_1_2_1","unstructured":"A. Aggarwal and P. Kumaraguru. 2014. Followers or phantoms? An anatomy of purchased Twitter followers. CoRR abs\/1408.1534 (2014).  A. Aggarwal and P. Kumaraguru. 2014. Followers or phantoms? An anatomy of purchased Twitter followers. CoRR abs\/1408.1534 (2014)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_5_1","unstructured":"R.R. Bouckaert E. Frank M. Hall R. Kirkby P. Reutemann A. Seewald and D. Scuse. 2013. WEKA Manual for Version 3-7-8. University of Waikato New Zeland.  R.R. Bouckaert E. Frank M. Hall R. Kirkby P. Reutemann A. Seewald and D. Scuse. 2013. WEKA Manual for Version 3-7-8. University of Waikato New Zeland."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings - International Conference on Natural Computation","author":"Chiancone A.","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.31"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13563-2_27"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M. Fire D. Kagan A. Elyashar and Y. Elovici. 2013. Friend or foe? Fake profile identification in online social networks. CoRR (2013).  M. Fire D. Kagan A. Elyashar and Y. Elovici. 2013. Friend or foe? Fake profile identification in online social networks. CoRR (2013).","DOI":"10.1007\/s13278-014-0194-4"},{"key":"e_1_3_2_1_13_1","first-page":"408","article-title":"Set similarity measures for images based on collective knowledge. Lecture Notes in Computer Science","volume":"9155","author":"Franzoni V.","year":"2015","journal-title":"LNCS"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413260"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591985"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D. M. Hawkins. 1980. Identification of outliers. Chapman and Hall.  D. M. Hawkins. 1980. Identification of outliers. Chapman and Hall.","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery (DaWaK) (Lecture Notes in Computer Science). Springer, 170--180","author":"Hawkins S."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.269.5232.1860"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_24_1","unstructured":"K. Thomas D. McCoy C. Grier A. Kolcz and V. Paxson. 2013. Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX 195--210.   K. Thomas D. McCoy C. Grier A. Kolcz and V. Paxson. 2013. Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX 195--210."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"L. T\u00f3th and G. Gosztolya. 2004. Replicator Neural Networks for outlier modeling in segmental speech recognition. In ISNN (1) (Lecture Notes in Computer Science) Vol. 3173. Springer 996--1001.  L. T\u00f3th and G. Gosztolya. 2004. Replicator Neural Networks for outlier modeling in segmental speech recognition. In ISNN (1) (Lecture Notes in Computer Science) Vol. 3173. Springer 996--1001.","DOI":"10.1007\/978-3-540-28647-9_164"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953039"},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Data Mining (ICDM","author":"Williams G.","year":"2002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"I. H. Witten E. Frank and M. A. Hall. 2011. Data mining: practical machine learning tools and techniques (3 ed.). Elsevier (Morgan Kaufmann).   I. H. Witten E. Frank and M. A. Hall. 2011. Data mining: practical machine learning tools and techniques (3 ed.). Elsevier (Morgan Kaufmann).","DOI":"10.1016\/B978-0-12-374856-0.00001-8"},{"key":"e_1_3_2_1_29_1","unstructured":"C. Wu Y. Ma and Y. Guo. Adaptive anomalies detection with deep network.  C. Wu Y. Ma and Y. Guo. Adaptive anomalies detection with deep network."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","location":"Leipzig Germany","acronym":"WI '17","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"]},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:13Z","timestamp":1750217413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":30,"alternative-id":["10.1145\/3106426.3106489","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106489","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}