{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:43:47Z","timestamp":1776278627821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1145\/3625007.3627306","type":"proceedings-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T15:12:42Z","timestamp":1710515562000},"page":"712-718","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Applying Social Network Embedding and Word Embedding for Socialbots Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6587-2438","authenticated-orcid":false,"given":"I-Hsien","family":"Ting","sequence":"first","affiliation":[{"name":"National University of Kaohsiung, Kaohsiung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4023-068X","authenticated-orcid":false,"given":"Kazunori","family":"Minetaki","sequence":"additional","affiliation":[{"name":"Kindai University, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4496-953X","authenticated-orcid":false,"given":"Mei-Yun","family":"Hsu","sequence":"additional","affiliation":[{"name":"National Museum of Taiwan History, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-9940","authenticated-orcid":false,"given":"Chia-Sung","family":"Yen","sequence":"additional","affiliation":[{"name":"National Chinyi University of Technology, Taichung, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mining Newsgroups Using Networks Arising From Social Behavior. World Wide Web 2003 Conference, 529--535","author":"Agrawal R.","year":"2003","unstructured":"Agrawal, R., Rajagopalan, S., Srikant, R., & Xu, Y. (2003). Mining Newsgroups Using Networks Arising From Social Behavior. World Wide Web 2003 Conference, 529--535."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2019.03.012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113383"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699018763307"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674029095"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2022.875574"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2022.875574"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-017-9621-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5220\/0011147300003269"},{"issue":"2","key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1137\/S0036144501389218","article-title":"Link Analysis: Hubs and Authorities on the World Wide Web","volume":"46","author":"Dingt C. H.","year":"2004","unstructured":"Dingt, C. H., Zha, H., Husbands, P., & Simont, H. D. (2004). Link Analysis: Hubs and Authorities on the World Wide Web. SIAM Review, 46(2), 256--268.","journal-title":"SIAM Review"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462191"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102498"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of ICWSM","author":"Godbole N.","year":"2007","unstructured":"Godbole, N., Srinivasaiah, M., & Skiena, S. (2007). Large-Scale Sentiment Analysis for News and Blogs. Proceedings of ICWSM 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym14010030"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.12554"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00869-w"},{"issue":"3","key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.socnet.2005.07.001","article-title":"Consumer Referral in A Small World Network","volume":"28","author":"June T.","year":"2006","unstructured":"June, T., Kim, J., Kim, B. J., & Choi, M. Y. (2006). Consumer Referral in A Small World Network. Social Networks, 28(3), 232--246.","journal-title":"Social Networks"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.22667\/JOWUA.2021.06.30.141"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 15th International World Wide Web Conference, 23","author":"Lento T.","year":"2006","unstructured":"Lento, T., Welser, H. T., Gu, L., & Marc, S. (2006). The Ties that Blog: Examining the Relationship Between Social Ties and Continued Participation in the Wallop Weblogging System. Proceedings of the 15th International World Wide Web Conference, 23."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01114-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Attributed Social Network Embedding. Social and Information Networks","author":"Lizi Liao","year":"2018","unstructured":"Lizi Liao, Xiangnan He, Hanwang Zhang, & Tat-Seng Chua. (2018). Attributed Social Network Embedding. Social and Information Networks."},{"key":"e_1_3_2_1_24_1","volume-title":"The 6th International Conference OnElectronic Commerce, 382--391","author":"Jansen-Vullers M.","year":"2004","unstructured":"M. H. Jansen-Vullers, M. Netjes, & H. A. Reijers. (2004). Business process redesign for effective e-commerce. The 6th International Conference OnElectronic Commerce, 382--391."},{"key":"e_1_3_2_1_25_1","volume-title":"Business Process Management: Blockchainand Robotic Process Automation Forum. BPM","author":"Mart\u00ecnez-Rojas A.","year":"2021","unstructured":"Mart\u00ecnez-Rojas A., S\u00e1nchez-Oliva J., L\u00f3pez-Carnicer J.M., & Jim\u00e9nez-Ram\u00ecrez A. (2021). AIRPA: An Architecture to Support the Execution and Maintenance ofAI-Powered RPA Robots. In Gonz\u00e1lez Enr\u00ecquez J., Debois S., Fettke P., PlebaniP., van de Weerd I., & Weber I. (Eds.), Business Process Management: Blockchainand Robotic Process Automation Forum. BPM 2021. Lecture Notes in BusinessInformation Processing (Vol. 428)."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of 2006 International World Wide Web Conference.","author":"Matsuo Y.","year":"2006","unstructured":"Matsuo, Y., Mori, J., & Hamasaki, M. (2006). POLYPHONET: An Advanced Social Network Extraction System from the Web. Proceedings of 2006 International World Wide Web Conference."},{"key":"e_1_3_2_1_27_1","volume-title":"Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics, 3(2--3), 211--223","author":"Mika P.","year":"2005","unstructured":"Mika, P. (2005). Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics, 3(2--3), 211--223."},{"key":"e_1_3_2_1_28_1","volume-title":"Efficient Estimation of Word Representations in Vector Space. ICLR","author":"Mikolov T.","year":"2013","unstructured":"Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013, January 16). Efficient Estimation of Word Representations in Vector Space. ICLR 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439726"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58666-9-26"},{"key":"e_1_3_2_1_31_1","volume-title":"Social Media-based User Embedding: A Literature Review. Social and Information Networks","author":"Pan S.","year":"2019","unstructured":"Pan, S., & Ding, T. (2019). Social Media-based User Embedding: A Literature Review. Social and Information Networks. http:\/\/arxiv.org\/abs\/1907.00725"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097301"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892366"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning.","author":"Quoc Le","year":"2014","unstructured":"Quoc Le, & Tomas Mikolov. (2014). Distributed representations of sentences and documents. Proceedings of the 31st International Conference on International Conference on Machine Learning."},{"key":"e_1_3_2_1_37_1","volume-title":"Social Network Analysis: A Handbook. SAGE Publication","author":"Scott J.","year":"2000","unstructured":"Scott, J. (2000). Social Network Analysis: A Handbook. SAGE Publication."},{"key":"e_1_3_2_1_38_1","volume-title":"DIGITAL 2022: GLOBAL OVERVIEW REPORT. DataReportal. https:\/\/datareportal.com\/reports\/digital-2022-global-overview-report","author":"Simon Kemp","year":"2022","unstructured":"Simon Kemp. (2022, January 26). DIGITAL 2022: GLOBAL OVERVIEW REPORT. DataReportal. https:\/\/datareportal.com\/reports\/digital-2022-global-overview-report"},{"key":"e_1_3_2_1_39_1","volume-title":"Make Social Networks Clean Again: Graph Embedding and Stacking Classifiers for Bot Detection","author":"Skorniakov K.","year":"2018","unstructured":"Skorniakov, K., Turdakov, D., & Zhabotinsky, A. (2018). Make Social Networks Clean Again: Graph Embedding and Stacking Classifiers for Bot Detection."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0034-4257(97)00083-7"},{"issue":"3","key":"e_1_3_2_1_41_1","first-page":"438","article-title":"Detection of the Spiral of Silence Effect in Social Media","volume":"22","author":"Ting I.","year":"2016","unstructured":"Ting, I. (2016). Detection of the Spiral of Silence Effect in Social Media. Journal of Universal Computer Science, 22(3), 438--452.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM55673.2022.10068630"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3504006.3504015"},{"key":"e_1_3_2_1_44_1","volume-title":"The Google Story","author":"Vise D.","year":"2005","unstructured":"Vise, D., & Malseed, M. (2005). The Google Story. Delacorte Press."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10488"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_47_1","first-page":"61","volume-title":"M. P. & L","author":"Wellman B.","year":"1982","unstructured":"Wellman, B. (1982). Studying Personal Communities. In M. P. & L. N. (Eds.), Social Structure and Network Analysis (pp. 61--80). SAGE Publication."},{"key":"e_1_3_2_1_48_1","volume-title":"Social Structures: A Network Approach","author":"Wellman B.","year":"1988","unstructured":"Wellman, B., & Berkowitz, S. D. (1988). Social Structures: A Network Approach. Cambridge University Press."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(89)90005-1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572403"}],"event":{"name":"ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining","location":"Kusadasi Turkiye","acronym":"ASONAM '23","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"]},"container-title":["Proceedings of the International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625007.3627306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:48Z","timestamp":1750178808000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":50,"alternative-id":["10.1145\/3625007.3627306","10.1145\/3625007"],"URL":"https:\/\/doi.org\/10.1145\/3625007.3627306","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"2024-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}