{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:05:32Z","timestamp":1775815532263,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-20-1-0254"],"award-info":[{"award-number":["W911NF-20-1-0254"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,4]]},"DOI":"10.1145\/3603163.3609064","type":"proceedings-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T10:14:03Z","timestamp":1693908843000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["The Looming Threat of Fake and LLM-generated LinkedIn Profiles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6841-3645","authenticated-orcid":false,"given":"Navid","family":"Ayoobi","sequence":"first","affiliation":[{"name":"University of Houston, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4894-8138","authenticated-orcid":false,"given":"Sadat","family":"Shahriar","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8896-604X","authenticated-orcid":false,"given":"Arjun","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5018-x"},{"key":"e_1_3_2_1_2_1","volume-title":"Identifying fake profiles in linkedin. arXiv preprint arXiv:2006.01381","author":"Adikari Shalinda","year":"2020","unstructured":"Shalinda Adikari and Kaushik Dutta . 2020. Identifying fake profiles in linkedin. arXiv preprint arXiv:2006.01381 ( 2020 ). Shalinda Adikari and Kaushik Dutta. 2020. Identifying fake profiles in linkedin. arXiv preprint arXiv:2006.01381 (2020)."},{"key":"e_1_3_2_1_3_1","volume-title":"2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 110--117","author":"Agarwal Nancy","year":"2019","unstructured":"Nancy Agarwal , Suraiya Jabin , Syed Zeeshan Hussain , 2019 . Analyzing real and fake users in Facebook network based on emotions . In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 110--117 . Nancy Agarwal, Suraiya Jabin, Syed Zeeshan Hussain, et al. 2019. Analyzing real and fake users in Facebook network based on emotions. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 110--117."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 27th international conference on computational linguistics. 1638--1649","author":"Akbik Alan","year":"2018","unstructured":"Alan Akbik , Duncan Blythe , and Roland Vollgraf . 2018 . Contextual string embed-dings for sequence labeling . In Proceedings of the 27th international conference on computational linguistics. 1638--1649 . Alan Akbik, Duncan Blythe, and Roland Vollgraf. 2018. Contextual string embed-dings for sequence labeling. In Proceedings of the 27th international conference on computational linguistics. 1638--1649."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2017.7921959"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_1_8_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361784"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621913"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5258-8_73"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766886"},{"key":"e_1_3_2_1_13_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Levy Omer","year":"2019","unstructured":"YinhanLiu, MyleOtt, NamanGoyal, JingfeiDu, MandarJoshi, DanqiChen, Omer Levy , Mike Lewis , Luke Zettlemoyer , and Veselin Stoyanov . 2019 . Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019). YinhanLiu, MyleOtt, NamanGoyal, JingfeiDu, MandarJoshi, DanqiChen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"Detectgpt: Zero-shot machine-generated text detection using probability curvature. arXiv preprint arXiv:2301.11305","author":"Mitchell Eric","year":"2023","unstructured":"Eric Mitchell , Yoonho Lee , Alexander Khazatsky , Christopher D Manning , and Chelsea Finn . 2023 . Detectgpt: Zero-shot machine-generated text detection using probability curvature. arXiv preprint arXiv:2301.11305 (2023). Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D Manning, and Chelsea Finn. 2023. Detectgpt: Zero-shot machine-generated text detection using probability curvature. arXiv preprint arXiv:2301.11305 (2023)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_16_1","article-title":"Detecting linkedin spammers and its spam nets","volume":"4","author":"Prieto Victor M","year":"2013","unstructured":"Victor M Prieto , Manuel Alvarez , and Fidel Cacheda . 2013 . Detecting linkedin spammers and its spam nets . International Journal of Advanced Computer Science and Applications (IJACSA) 4 , 9 (2013). Victor M Prieto, Manuel Alvarez, and Fidel Cacheda. 2013. Detecting linkedin spammers and its spam nets. International Journal of Advanced Computer Science and Applications (IJACSA) 4, 9 (2013).","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3064901"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2021.102771"},{"key":"e_1_3_2_1_19_1","volume-title":"LinkedIn has a problem with fake profiles. Retrieved","author":"Slater-Robins Max","year":"2023","unstructured":"Max Slater-Robins . 2022. LinkedIn has a problem with fake profiles. Retrieved April 2, 2023 from https:\/\/www.techradar.com\/news\/linkedin-has-a-problem-with-fake-profiles Max Slater-Robins. 2022. LinkedIn has a problem with fake profiles. Retrieved April 2, 2023 from https:\/\/www.techradar.com\/news\/linkedin-has-a-problem-with-fake-profiles"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102465"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"}],"event":{"name":"HT '23: 34th ACM Conference on Hypertext and Social Media","location":"Rome Italy","acronym":"HT '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 34th ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603163.3609064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603163.3609064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:06Z","timestamp":1750182546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603163.3609064"}},"subtitle":["Challenges and Opportunities for Detection and Prevention"],"short-title":[],"issued":{"date-parts":[[2023,9,4]]},"references-count":22,"alternative-id":["10.1145\/3603163.3609064","10.1145\/3603163"],"URL":"https:\/\/doi.org\/10.1145\/3603163.3609064","relation":{},"subject":[],"published":{"date-parts":[[2023,9,4]]},"assertion":[{"value":"2023-09-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}