{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:23:42Z","timestamp":1756995822426,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF grants","award":["CNS-181894 CCF-1725755 CNS-1545050"],"award-info":[{"award-number":["CNS-181894 CCF-1725755 CNS-1545050"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384770","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"708-718","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning"],"prefix":"10.1145","author":[{"given":"Greeshma","family":"Lingam","sequence":"first","affiliation":[{"name":"National Institute of Technology, Warangal, India"}]},{"given":"Rashmi Ranjan","family":"Rout","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Warangal, India"}]},{"given":"DVLN","family":"Somayajulu","sequence":"additional","affiliation":[{"name":"National Institute of Technology &amp; Indian Institute of Information Technology Design and Manufacturing, Warangal, India"}]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO, MO, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2753202"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.025"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-017-0494-z"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"volume-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. 260--268","year":"2011","author":"Eriksson Brian","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2531-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"volume-title":"Fifth International AAAI Conference on Weblogs and Social Media.","year":"2011","author":"Lee Kyumin","key":"e_1_3_2_1_10_1"},{"volume-title":"IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction","year":"2020","author":"Lee SJ","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2018.8721318"},{"volume-title":"Rashmi Ranjan Rout, and DVLN Somayajulu","year":"2019","author":"Lingam Greeshma","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904220"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2015.000028"},{"volume-title":"Combining fuzzy logic and eigenvector centrality measure in social network analysis. Physica A: Statistical Mechanics and its Applications 459","year":"2016","author":"Parand Fereshteh-Azadi","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901864"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377781"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"volume-title":"Structure based sybil detection in social networks via local rule-based propagation","year":"2018","author":"Jia Jinyuan","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2019.03.019"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2532804"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.9"},{"volume-title":"Partition signed social networks via clustering dynamics. Physica A: Statistical Mechanics and its Applications 443","year":"2016","author":"Wu Jianshe","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.016"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2410792"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"volume-title":"The rise of social botnets: Attacks and countermeasures","year":"2016","author":"Zhang Jinxue","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1069-1"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":30,"alternative-id":["10.1145\/3320269.3384770","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384770","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}