{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T03:02:13Z","timestamp":1765422133565,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316500","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"154-161","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media"],"prefix":"10.1145","author":[{"given":"Hamidreza","family":"Alvari","sequence":"first","affiliation":[{"name":"Arizona State Univ."}]},{"given":"Elham","family":"Shaabani","sequence":"additional","affiliation":[{"name":"Arizona State Univ."}]},{"given":"Soumajyoti","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Arizona State Univ."}]},{"given":"Ghazaleh","family":"Beigi","sequence":"additional","affiliation":[{"name":"Arizona State Univ."}]},{"given":"Paulo","family":"Shakarian","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Detection of Violent Extremists in Social Media. IEEE Conference on Data Intelligence and Security","author":"Alvari Hamidreza","year":"2019","unstructured":"Hamidreza Alvari , Soumajyoti Sarkar , and Paulo Shakarian . 2019 . Detection of Violent Extremists in Social Media. IEEE Conference on Data Intelligence and Security (2019). Hamidreza Alvari, Soumajyoti Sarkar, and Paulo Shakarian. 2019. Detection of Violent Extremists in Social Media. IEEE Conference on Data Intelligence and Security (2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587339"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745456"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-017-0029-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291026"},{"key":"e_1_3_2_1_6_1","unstructured":"Ghazaleh Beigi Mahdi Jalili Hamidreza Alvari and Gita Sukthankar. 2014. Leveraging community detection for accurate trust prediction. (2014).  Ghazaleh Beigi Mahdi Jalili Hamidreza Alvari and Gita Sukthankar. 2014. Leveraging community detection for accurate trust prediction. (2014)."},{"key":"e_1_3_2_1_7_1","unstructured":"Ghazaleh Beigi and Huan Liu. 2018. Privacy in social media: Identification mitigation and applications. arXiv preprint arXiv:1808.02191(2018).  Ghazaleh Beigi and Huan Liu. 2018. Privacy in social media: Identification mitigation and applications. arXiv preprint arXiv:1808.02191(2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209542.3209552"},{"key":"e_1_3_2_1_10_1","unstructured":"Misha Belkin Partha Niyogi and Vikas Sindhwani. 2005. On manifold regularization.. In AISTATS. Citeseer.  Misha Belkin Partha Niyogi and Vikas Sindhwani. 2005. On manifold regularization.. In AISTATS. Citeseer."},{"key":"e_1_3_2_1_11_1","first-page":"2399","article-title":"Manifold regularization: A geometric framework for learning from labeled and unlabeled examples","author":"Belkin Mikhail","year":"2006","unstructured":"Mikhail Belkin , Partha Niyogi , and Vikas Sindhwani . 2006 . Manifold regularization: A geometric framework for learning from labeled and unlabeled examples . Journal of machine learning research 7 , Nov (2006), 2399 \u2013 2434 . Mikhail Belkin, Partha Niyogi, and Vikas Sindhwani. 2006. Manifold regularization: A geometric framework for learning from labeled and unlabeled examples. Journal of machine learning research 7, Nov (2006), 2399\u20132434.","journal-title":"Journal of machine learning research 7"},{"key":"e_1_3_2_1_12_1","volume-title":"Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one","author":"Benigni C","year":"2017","unstructured":"Matthew\u00a0 C Benigni , Kenneth Joseph , and Kathleen\u00a0 M Carley . 2017. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one ( 2017 ). Matthew\u00a0C Benigni, Kenneth Joseph, and Kathleen\u00a0M Carley. 2017. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one (2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. American journal of public health 108, 10","author":"Broniatowski A","year":"2018","unstructured":"David\u00a0 A Broniatowski , Amelia\u00a0 M Jamison , SiHua Qi , Lulwah AlKulaib , Tao Chen , Adrian Benton , Sandra\u00a0 C Quinn , and Mark Dredze . 2018. Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. American journal of public health 108, 10 ( 2018 ), 1378\u20131384. David\u00a0A Broniatowski, Amelia\u00a0M Jamison, SiHua Qi, Lulwah AlKulaib, Tao Chen, Adrian Benton, Sandra\u00a0C Quinn, and Mark Dredze. 2018. Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. American journal of public health 108, 10 (2018), 1378\u20131384."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_15_1","volume-title":"Battling the Internet Water Army: Detection of Hidden Paid Posters. CoRR","author":"Chen Cheng","year":"2011","unstructured":"Cheng Chen , Kui Wu , Srinivasan Venkatesh , and Xudong Zhang . 2011. Battling the Internet Water Army: Detection of Hidden Paid Posters. CoRR ( 2011 ). Cheng Chen, Kui Wu, Srinivasan Venkatesh, and Xudong Zhang. 2011. Battling the Internet Water Army: Detection of Hidden Paid Posters. CoRR (2011)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487639"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. (2017).  Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. (2017).","DOI":"10.5210\/fm.v22i8.8005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_1_22_1","volume-title":"Yu-Hsiang and Chuen-Tsai Sun","author":"Chung-Yuan Fu Huang","year":"2015","unstructured":"Huang Chung-Yuan Fu , Yu-Hsiang and Chuen-Tsai Sun . 2015 . Identifying Super-Spreader Nodes in Complex Networks. Mathematical Problems in Engineering( 2015). Huang Chung-Yuan Fu, Yu-Hsiang and Chuen-Tsai Sun. 2015. Identifying Super-Spreader Nodes in Complex Networks. Mathematical Problems in Engineering(2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"e_1_3_2_1_24_1","volume-title":"Spam Users Identification in Wikipedia Via Editing Behavior. ICWSM","author":"Green Thomas","year":"2017","unstructured":"Thomas Green and Francesca Spezzano . 2017. Spam Users Identification in Wikipedia Via Editing Behavior. ICWSM ( 2017 ). Thomas Green and Francesca Spezzano. 2017. Spam Users Identification in Wikipedia Via Editing Behavior. ICWSM (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_26_1","unstructured":"Jytte Klausen Christopher Marks and Tauhid Zaman. 2016. Finding Online Extremists in Social Networks. CoRR abs\/1610.06242(2016).  Jytte Klausen Christopher Marks and Tauhid Zaman. 2016. Finding Online Extremists in Social Networks. CoRR abs\/1610.06242(2016)."},{"key":"e_1_3_2_1_27_1","unstructured":"Samantha Kleinberg. 2011. A Logic for Causal Inference in Time Series with Discrete and Continuous Variables. In IJCAI.   Samantha Kleinberg. 2011. A Logic for Causal Inference in Time Series with Discrete and Continuous Variables. In IJCAI."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. AUAI Press, 303\u2013312","author":"Kleinberg Samantha","year":"2009","unstructured":"Samantha Kleinberg and Bud Mishra . 2009 . The temporal logic of causal structures . In Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. AUAI Press, 303\u2013312 . Samantha Kleinberg and Bud Mishra. 2009. The temporal logic of causal structures. In Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. AUAI Press, 303\u2013312."},{"key":"e_1_3_2_1_29_1","unstructured":"Takuya Konishi Tomoharu Iwata Kohei Hayashi and Ken-Ichi Kawarabayashi. 2016. Identifying Key Observers to Find Popular Information in Advance. In IJCAI.   Takuya Konishi Tomoharu Iwata Kohei Hayashi and Ken-Ichi Kawarabayashi. 2016. Identifying Key Observers to Find Popular Information in Advance. In IJCAI."},{"key":"e_1_3_2_1_30_1","unstructured":"Sneha Kudugunta and Emilio Ferrara. 2018. Deep Neural Networks for Bot Detection. arXiv preprint arXiv:1802.04289(2018).  Sneha Kudugunta and Emilio Ferrara. 2018. Deep Neural Networks for Bot Detection. arXiv preprint arXiv:1802.04289(2018)."},{"key":"e_1_3_2_1_31_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161"},{"key":"e_1_3_2_1_33_1","volume-title":"Searching for superspreaders of information in real-world social media.CoRR","author":"Pei Sen","year":"2014","unstructured":"Sen Pei , Lev Muchnik , Jos\u00e9 S.\u00a0 Andrade Jr ., Zhiming Zheng , and Hern\u00e1n\u00a0 A. Makse . 2014. Searching for superspreaders of information in real-world social media.CoRR ( 2014 ). Sen Pei, Lev Muchnik, Jos\u00e9 S.\u00a0Andrade Jr., Zhiming Zheng, and Hern\u00e1n\u00a0A. Makse. 2014. Searching for superspreaders of information in real-world social media.CoRR (2014)."},{"volume-title":"IEEE Conference on Data Intelligence and Security.","author":"Shaabani E.","key":"e_1_3_2_1_34_1","unstructured":"E. Shaabani , R. Guo , and P. Shakarian . 2018. Detecting Pathogenic Social Media Accounts without Content or Network Structure . In IEEE Conference on Data Intelligence and Security. E. Shaabani, R. Guo, and P. Shakarian. 2018. Detecting Pathogenic Social Media Accounts without Content or Network Structure. In IEEE Conference on Data Intelligence and Security."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00027"},{"key":"e_1_3_2_1_36_1","unstructured":"Chengcheng Shao Giovanni\u00a0Luca Ciampaglia Onur Varol Alessandro Flammini and Filippo Menczer. 2017. The spread of fake news by social bots. (2017).  Chengcheng Shao Giovanni\u00a0Luca Ciampaglia Onur Varol Alessandro Flammini and Filippo Menczer. 2017. The spread of fake news by social bots. (2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.117"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788591"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_1_40_1","unstructured":"Patrick Suppes. 1970. A Probabilistic Theory of Causality. (1970).  Patrick Suppes. 1970. A Probabilistic Theory of Causality. (1970)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_42_1","volume-title":"Online human-bot interactions: Detection, estimation, and characterization. ICWSM","author":"Varol Onur","year":"2017","unstructured":"Onur Varol , Emilio Ferrara , Clayton\u00a0 A Davis , Filippo Menczer , and Alessandro Flammini . 2017. Online human-bot interactions: Detection, estimation, and characterization. ICWSM ( 2017 ). Onur Varol, Emilio Ferrara, Clayton\u00a0A Davis, Filippo Menczer, and Alessandro Flammini. 2017. Online human-bot interactions: Detection, estimation, and characterization. ICWSM (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Kun Wang Yang Xiao and Zhen Xiao. 2014. Detection of internet water army in social network.  Kun Wang Yang Xiao and Zhen Xiao. 2014. Detection of internet water army in social network.","DOI":"10.2991\/ccit-14.2014.50"},{"key":"e_1_3_2_1_44_1","unstructured":"Dengyong Zhou Olivier Bousquet Thomas\u00a0N Lal Jason Weston and Bernhard Sch\u00f6lkopf. 2004. Learning with local and global consistency. In Advances in neural information processing systems. 321\u2013328.   Dengyong Zhou Olivier Bousquet Thomas\u00a0N Lal Jason Weston and Bernhard Sch\u00f6lkopf. 2004. Learning with local and global consistency. In Advances in neural information processing systems. 321\u2013328."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2364972"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":45,"alternative-id":["10.1145\/3308560.3316500","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316500","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}