{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:54:07Z","timestamp":1770987247172,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Louisiana Board of Regents","award":["LEQSF(2018-21)-RD-A24"],"award-info":[{"award-number":["LEQSF(2018-21)-RD-A24"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329836","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"379-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["TweetScore"],"prefix":"10.1145","author":[{"given":"Yihe","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"ACM Member, Redwood City, CA, USA"}]},{"given":"Xu","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Nian-Feng","family":"Tzeng","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"107","volume-title":"ACM International World Wide Web Conference (WWW), Poster Track","author":"Arasu A.","year":"2002","unstructured":"Arasu , A. , Novak , J. , Tomkins , A. , and Tomlin , J . Pagerank computation and the structure of the web: Experiments and algorithms . In ACM International World Wide Web Conference (WWW), Poster Track ( 2002 ), pp. 107 -- 117 . Arasu, A., Novak, J., Tomkins, A., and Tomlin, J. Pagerank computation and the structure of the web: Experiments and algorithms. In ACM International World Wide Web Conference (WWW), Poster Track (2002), pp. 107--117."},{"key":"e_1_3_2_1_2_1","volume-title":"Anti-abuse and Spam conference (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"Benevenuto , F. , Magno , G. , Rodrigues , T. , and Almeida , V . Detecting spammers on twitter. In Collaboration, Electronic messaging , Anti-abuse and Spam conference (CEAS) ( 2010 ). Benevenuto, F., Magno, G., Rodrigues, T., and Almeida, V. Detecting spammers on twitter. In Collaboration, Electronic messaging, Anti-abuse and Spam conference (CEAS) (2010)."},{"key":"e_1_3_2_1_3_1","volume-title":"Feb","author":"Bengio Y.","year":"2003","unstructured":"Bengio , Y. , Ducharme , R. , Vincent , P. , and Jauvin , C . A neural probabilistic language model. Journal of Machine Learning Research 3 , Feb ( 2003 ), 1137--1155. Bengio, Y., Ducharme, R., Vincent, P., and Jauvin, C. A neural probabilistic language model. Journal of Machine Learning Research 3, Feb (2003), 1137--1155."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277814"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2621888"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"e_1_3_2_1_8_1","first-page":"8","article-title":"A study on real-time low-quality content detection on twitter from the users' perspective","volume":"12","author":"Chen W.","year":"2017","unstructured":"Chen , W. , Yeo , C. K. , Lau , C. T. , and Lee , B. S . A study on real-time low-quality content detection on twitter from the users' perspective . PloS One 12 , 8 ( 2017 ). Chen, W., Yeo, C. K., Lau, C. T., and Lee, B. S. A study on real-time low-quality content detection on twitter from the users' perspective. PloS One 12, 8 (2017).","journal-title":"PloS One"},{"key":"e_1_3_2_1_9_1","unstructured":"Corporation L. Hashtag analytics for your brand business product service event or blog. http:\/\/www.hashtags.org 2018.  Corporation L. Hashtag analytics for your brand business product service event or blog. http:\/\/www.hashtags.org 2018."},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Danezis G.","year":"2009","unstructured":"Danezis , G. , and Mittal , P . Sybilinfer: Detecting sybil nodes using social networks . In Network and Distributed System Security Symposium (NDSS) ( 2009 ), pp. 1 -- 15 . Danezis, G., and Mittal, P. Sybilinfer: Detecting sybil nodes using social networks. In Network and Distributed System Security Symposium (NDSS) (2009), pp. 1--15."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516684296"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129091"},{"key":"e_1_3_2_1_16_1","volume-title":"Google's PageRank and beyond: The science of search engine rankings","author":"Langville A. N.","year":"2011","unstructured":"Langville , A. N. , and Meyer , C. D . Google's PageRank and beyond: The science of search engine rankings . Princeton University Press , 2011 . Langville, A. N., and Meyer, C. D. Google's PageRank and beyond: The science of search engine rankings. Princeton University Press, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811422894"},{"key":"e_1_3_2_1_18_1","unstructured":"Lee K. Caverlee J. and Webb S. Uncovering social spammers: Social honeypots  Lee K. Caverlee J. and Webb S. Uncovering social spammers: Social honeypots"},{"key":"e_1_3_2_1_19_1","first-page":"435","volume-title":"ACM SIGIR Conference on Research and Development in Information Retrieval","year":"2010","unstructured":"machine learning. In ACM SIGIR Conference on Research and Development in Information Retrieval ( 2010 ), pp. 435 -- 442 . machine learning. In ACM SIGIR Conference on Research and Development in Information Retrieval (2010), pp. 435--442."},{"key":"e_1_3_2_1_20_1","volume-title":"ICWSM","author":"Lee K.","year":"2011","unstructured":"Lee , K. , Eoff , B. D. , and Caverlee , J . Seven months with the devils: A long-term study of content polluters on twitter . In ICWSM ( 2011 ). Lee, K., Eoff, B. D., and Caverlee, J. Seven months with the devils: A long-term study of content polluters on twitter. In ICWSM (2011)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2035700.2035717"},{"key":"e_1_3_2_1_22_1","first-page":"3111","volume-title":"Advances in Neural Information Processing Systems (NIPS)","author":"Mikolov T.","year":"2013","unstructured":"Mikolov , T. , Sutskever , I. , Chen , K. , Corrado , G. S. , and Dean , J . Distributed representations of words and phrases and their compositionality . In Advances in Neural Information Processing Systems (NIPS) ( 2013 ), pp. 3111 -- 3119 . Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., and Dean, J. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems (NIPS) (2013), pp. 3111--3119."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5110-1_9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2773581"},{"key":"e_1_3_2_1_26_1","first-page":"886","volume-title":"Artificial Intelligence and Statistics","author":"Shrivastava A.","year":"2014","unstructured":"Shrivastava , A. , and Li , P . In defense of minhash over simhash . In Artificial Intelligence and Statistics ( 2014 ), pp. 886 -- 894 . Shrivastava, A., and Li, P. In defense of minhash over simhash. In Artificial Intelligence and Statistics (2014), pp. 886--894."},{"key":"e_1_3_2_1_27_1","unstructured":"Site W. W. W. A. Twitter usage statistics. http:\/\/www.internetlivestats.com\/one-second\/#tweets-band 2019.  Site W. W. W. A. Twitter usage statistics. http:\/\/www.internetlivestats.com\/one-second\/#tweets-band 2019."},{"key":"e_1_3_2_1_28_1","first-page":"525","volume-title":"KDD Workshop on Text Mining","author":"Steinbach M.","year":"2000","unstructured":"Steinbach , M. , Karypis , G. , and Kumar , V . A comparison of document clustering techniques . In KDD Workshop on Text Mining ( 2000 ), pp. 525 -- 526 . Steinbach, M., Karypis, G., and Kumar, V. A comparison of document clustering techniques. In KDD Workshop on Text Mining (2000), pp. 525--526."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_31_1","first-page":"195","volume-title":"USENIX Security Symposium","author":"Thomas K.","year":"2013","unstructured":"Thomas , K. , McCoy , D. , Grier , C. , Kolcz , A. , and Paxson , V . Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse . In USENIX Security Symposium ( 2013 ), pp. 195 -- 210 . Thomas, K., McCoy, D., Grier, C., Kolcz, A., and Paxson, V. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In USENIX Security Symposium (2013), pp. 195--210."},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"IEEE International Conference on Security and Cryptography (SECRYPT)","author":"Wang A. H.","year":"2010","unstructured":"Wang , A. H. Don't follow me : Spam detection in twitter . In IEEE International Conference on Security and Cryptography (SECRYPT) ( 2010 ), pp. 1 -- 10 . Wang, A. H. Don't follow me: Spam detection in twitter. In IEEE International Conference on Security and Cryptography (SECRYPT) (2010), pp. 1--10."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_1_34_1","first-page":"239","volume-title":"USENIX Security Symposium","author":"Wang G.","year":"2014","unstructured":"Wang , G. , Wang , T. , Zheng , H. , and Zhao , B. Y . Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers . In USENIX Security Symposium ( 2014 ), pp. 239 -- 254 . Wang, G., Wang, T., Zheng, H., and Zhao, B. Y. Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. In USENIX Security Symposium (2014), pp. 239--254."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014815"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664258"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2034047"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00052"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329836"}},"subtitle":["Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":40,"alternative-id":["10.1145\/3321705.3329836","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329836","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}