{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:19:48Z","timestamp":1777724388012,"version":"3.51.4"},"reference-count":159,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University","doi-asserted-by":"publisher","award":["PNURSP2025R512"],"award-info":[{"award-number":["PNURSP2025R512"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01254-y","type":"journal-article","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T07:35:15Z","timestamp":1756539315000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Unmasking deception: detection of fake profiles in online social ecosystems"],"prefix":"10.1186","volume":"12","author":[{"given":"Amber","family":"Sarfraz","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Frukh","family":"Zeshan","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Tagrid Abdullah N.","family":"Alshalali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"issue":"3","key":"1254_CR1","doi-asserted-by":"publisher","first-page":"156","DOI":"10.22452\/mjcs.vol29no3.1","volume":"29","author":"F Ahmad","year":"2016","unstructured":"Ahmad F, Sarkar A. Analysis of dynamic web services: towards efficient discovery in cloud. Malays J Comput Sci. 2016;29(3):156\u201378.","journal-title":"Malays J Comput Sci"},{"issue":"4.19","key":"1254_CR2","doi-asserted-by":"publisher","first-page":"919","DOI":"10.14419\/ijet.v7i4.19.28071","volume":"7","author":"R Kareem","year":"2018","unstructured":"Kareem R, Bhaya W. Fake profiles types of online social networks: a survey. Int J Eng Technol. 2018;7(4.19):919\u201325.","journal-title":"Int J Eng Technol"},{"issue":"4","key":"1254_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao H, Hu J, Huang T, Wang J, Chen Y. \"Security issues in online social networks. J IEEE Internet Comput. 2011;15(4):56\u201363.","journal-title":"J IEEE Internet Comput"},{"key":"1254_CR4","unstructured":"Solorio T, Hasan R, Mizan M. A case study of sockpuppet detection in wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media, 2013; pp. 59\u201368."},{"issue":"6","key":"1254_CR5","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S. Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput. 2012;9(6):811\u201324.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1254_CR6","doi-asserted-by":"crossref","unstructured":"Singh N, Sharma T, Thakral A, Choudhury T. Detection of fake profile in online social networks using machine learning, in 2018 International conference on advances in computing and communication engineering (ICACCE), IEEE. 2018, pp. 231\u2013234","DOI":"10.1109\/ICACCE.2018.8441713"},{"key":"1254_CR7","doi-asserted-by":"crossref","unstructured":"Zheng L, Albano CM, Vora NM, Mai F, Nickerson JV. The roles bots play in Wikipedia. Proceedings of the ACM on Human-Computer Interaction, 2019; vol. 3, no. CSCW, pp. 1\u201320","DOI":"10.1145\/3359317"},{"issue":"12","key":"1254_CR8","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1038\/s41562-020-00994-6","volume":"4","author":"R Gallotti","year":"2020","unstructured":"Gallotti R, Valle F, Castaldo N, Sacco P, De Domenico M. Assessing the risks of \u2018infodemics\u2019 in response to COVID-19 epidemics. Nat Hum Behav. 2020;4(12):1285\u201393.","journal-title":"Nat Hum Behav"},{"key":"1254_CR9","doi-asserted-by":"crossref","unstructured":"Cresci S, Lillo F, Regoli D, Tardelli S, Tesconi M, $ FAKE: Evidence of spam and bot activity in stock microblogs on Twitter. In Proceedings of the International AAAI Conference on Web and Social Media, 2018, vol. 12, no. 1.","DOI":"10.1609\/icwsm.v12i1.15073"},{"issue":"3","key":"1254_CR10","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TAI.2021.3064901","volume":"1","author":"PK Roy","year":"2020","unstructured":"Roy PK, Chahar S. Fake profile detection on social networking websites: a comprehensive review. IEEE Trans Artif Intell. 2020;1(3):271\u201385.","journal-title":"IEEE Trans Artif Intell"},{"issue":"4","key":"1254_CR11","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"41","author":"B Viswanath","year":"2011","unstructured":"Viswanath B, Post A, Gummadi KP, Mislove A. An analysis of social network-based sybil defenses. ACM SIGCOMM Comput Commun Rev. 2011;41(4):363\u201374.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"1254_CR12","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/ACCESS.2017.2656635","volume":"5","author":"M Al-Qurishi","year":"2017","unstructured":"Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS. Sybil defense techniques in online social networks: a survey. IEEE Access. 2017;5:1200\u201319.","journal-title":"IEEE Access"},{"key":"1254_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","volume":"65","author":"D Ramalingam","year":"2018","unstructured":"Ramalingam D, Chinnaiah V. Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng. 2018;65:165\u201377.","journal-title":"Comput Electr Eng"},{"key":"1254_CR14","doi-asserted-by":"publisher","first-page":"113383","DOI":"10.1016\/j.eswa.2020.113383","volume":"151","author":"M Latah","year":"2020","unstructured":"Latah M. Detection of malicious social bots: a survey and a refined taxonomy. Expert Syst Appl. 2020;151:113383.","journal-title":"Expert Syst Appl"},{"key":"1254_CR15","doi-asserted-by":"publisher","first-page":"101551","DOI":"10.1016\/j.jksuci.2023.04.004","volume":"35","author":"Z Ellaky","year":"2023","unstructured":"Ellaky Z, Benabbou F, Ouahabi S. Systematic literature review of social media bots detection systems. J King Saud Univ-Comput Inf Sci. 2023;35:101551.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"12","key":"1254_CR16","first-page":"8903","volume":"35","author":"K Hayawi","year":"2023","unstructured":"Hayawi K, Saha S, Masud MM, Mathew SS, Kaosar M. Social media bot detection with deep learning methods: a systematic review. Neural Comput Appl. 2023;35(12):8903\u201318.","journal-title":"Neural Comput Appl"},{"key":"1254_CR17","doi-asserted-by":"publisher","first-page":"105906","DOI":"10.1016\/j.ijsu.2021.105906","volume":"88","author":"MJ Page","year":"2021","unstructured":"Page MJ, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Int J Surg. 2021;88:105906.","journal-title":"Int J Surg"},{"key":"1254_CR18","doi-asserted-by":"publisher","first-page":"101517","DOI":"10.1016\/j.tele.2020.101517","volume":"57","author":"SB Abkenar","year":"2021","unstructured":"Abkenar SB, Kashani MH, Mahdipour E, Jameii SM. Big data analytics meets social media: a systematic review of techniques, open issues, and future directions. Telemat Inf. 2021;57:101517.","journal-title":"Telemat Inf"},{"issue":"1","key":"1254_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-025-01471-6","volume":"15","author":"A Sarfraz","year":"2025","unstructured":"Sarfraz A, Ahmad A, Zeshan F, Hamid M, Aman M, Saleem M. Leveraging dynamic fuzzification to mitigate fraudulent profiles on social networking platforms. Soc Netw Anal Min. 2025;15(1):1\u201323.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR20","doi-asserted-by":"publisher","first-page":"120366","DOI":"10.1016\/j.eswa.2023.120366","volume":"228","author":"SB Abkenar","year":"2023","unstructured":"Abkenar SB, Kashani MH, Akbari M, Mahdipour E. Learning textual features for Twitter spam detection: a systematic literature review. Expert Syst Appl. 2023;228:120366.","journal-title":"Expert Syst Appl"},{"key":"1254_CR21","unstructured":"Cao Q and Yang X. SybilFence: improving social-graph-based sybil defenses with user negative feedback. arXiv preprint. 2013. arXiv:1304.3819"},{"key":"1254_CR22","unstructured":"Wang G et al. Social turing tests: Crowdsourcing sybil detection, arXiv preprint. 2012. arXiv:1205.3856"},{"key":"1254_CR23","doi-asserted-by":"crossref","unstructured":"Yang X, Wang X, Tian Y, Du Y. Locality preserving based K-means clustering. In International Conference on Intelligent Science and Big Data Engineering, Springer. 2015; pp. 86\u201395","DOI":"10.1007\/978-3-319-23862-3_9"},{"key":"1254_CR24","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.cose.2016.05.005","volume":"61","author":"Y Boshmaf","year":"2016","unstructured":"Boshmaf Y, et al. \u00cdntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. Comput Secur. 2016;61:142\u201368.","journal-title":"Comput Secur"},{"issue":"1","key":"1254_CR25","first-page":"2","volume":"8","author":"Z Yang","year":"2014","unstructured":"Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network sybils in the wild. ACM Trans Knowl Discov Data (TKDD). 2014;8(1):2.","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"1254_CR26","doi-asserted-by":"crossref","unstructured":"Mulamba D, Ray I, Ray I. Sybilradar: a graph-structure based framework for sybil detection in on-line social networks. In IFIP international conference on ICT systems security and privacy protection, Springer. 2016; pp. 179\u2013193","DOI":"10.1007\/978-3-319-33630-5_13"},{"key":"1254_CR27","doi-asserted-by":"crossref","unstructured":"Effendy S and Yap RH. The strong link graph for enhancing sybil defenses. in 2017 IEEE 37th international conference on distributed computing systems (ICDCS), IEEE. 2017, pp. 944\u2013954","DOI":"10.1109\/ICDCS.2017.117"},{"issue":"4","key":"1254_CR28","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TDSC.2015.2410792","volume":"13","author":"Z Yang","year":"2015","unstructured":"Yang Z, Xue J, Yang X, Wang X, Dai Y. VoteTrust: leveraging friend invitation graph to defend against social network sybils. IEEE Trans Dependable Secure Comput. 2015;13(4):488\u2013501.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1254_CR29","doi-asserted-by":"crossref","unstructured":"Schoenebeck G, Snook A, Yu F-Y. Sybil detection using latent network structure, In Proceedings of the 2016 ACM conference on economics and computation, ACM. 2016; pp. 739\u2013756:","DOI":"10.1145\/2940716.2940747"},{"issue":"3","key":"1254_CR30","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H Yu","year":"2008","unstructured":"Yu H, Kaminsky M, Gibbons PB, Flaxman AD. Sybilguard: defending against sybil attacks via social networks. IEEE\/ACM Trans Netw. 2008;16(3):576\u201389.","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1254_CR31","doi-asserted-by":"crossref","unstructured":"Yu H, Gibbons PB, Kaminsky M, Xiao F. Sybillimit: a near-optimal social network defense against sybil attacks. in 2008 IEEE symposium on security and privacy (sp 2008), IEEE. 2008, pp. 3\u201317:","DOI":"10.1109\/SP.2008.13"},{"key":"1254_CR32","unstructured":"Cao Q, Sirivianos M, Yang X, Pregueiro T. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX conference on networked systems design and implementation, USENIX Association. 2012; pp. 15\u201315"},{"key":"1254_CR33","doi-asserted-by":"crossref","unstructured":"Tran N, Li J, Subramanian L, Chow SS. Optimal sybil-resilient node admission control. In 2011 proceedings IEEE INFOCOM, IEEE. 2011, pp. 3218\u20133226","DOI":"10.1109\/INFCOM.2011.5935171"},{"issue":"12","key":"1254_CR34","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1109\/TPDS.2013.9","volume":"24","author":"W Wei","year":"2013","unstructured":"Wei W, Xu F, Tan CC, Li Q. SybilDefender: a defense mechanism for sybil attacks in large social networks. IEEE Trans Parallel Distrib Syst. 2013;24(12):2492\u2013502.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1254_CR35","doi-asserted-by":"crossref","unstructured":"Zhang X, Xie H, Lui JC. Sybil detection in social-activity networks: Modeling, algorithms and evaluations. in 2018 IEEE 26th International Conference on Network Protocols (ICNP), IEEE. 2018; pp. 44\u201354","DOI":"10.1109\/ICNP.2018.00015"},{"key":"1254_CR36","doi-asserted-by":"crossref","unstructured":"Jia J, Wang B, Gong NZ. Random walk based fake account detection in online social networks. in 2017 47th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN), IEEE. 2017, pp. 273\u2013284","DOI":"10.1109\/DSN.2017.55"},{"key":"1254_CR37","doi-asserted-by":"crossref","unstructured":"Wang B, Gong NZ, Fu H. GANG: detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In 2017 IEEE international conference on data mining (ICDM), IEEE. 2017; pp. 465\u2013474","DOI":"10.1109\/ICDM.2017.56"},{"key":"1254_CR38","unstructured":"Gao P, Gong NZ, Kulkarni S, Thomas K, Mittal P. Sybilframe: a defense-in-depth framework for structure-based sybil detection. arXiv preprint. 2015. arXiv:1503.02985."},{"issue":"6","key":"1254_CR39","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1109\/TIFS.2014.2316975","volume":"9","author":"NZ Gong","year":"2014","unstructured":"Gong NZ, Frank M, Mittal P. Sybilbelief: a semi-supervised learning approach for structure-based sybil detection. IEEE Trans Inf Forensics Secur. 2014;9(6):976\u201387.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1254_CR40","doi-asserted-by":"crossref","unstructured":"Wang B, Zhang L, and Gong NZ. Sybilblind: detecting fake users in online social networks without manual labels. In International Symposium on Research in Attacks, Intrusions, and Defenses, Springer. 2018; pp. 228\u2013249","DOI":"10.1007\/978-3-030-00470-5_11"},{"key":"1254_CR41","doi-asserted-by":"crossref","unstructured":"Wang B, Zhang L, and Gong NZ. SybilSCAR: Sybil detection in online social networks via local rule based propagation. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. 2017; pp. 1\u20139","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"1254_CR42","doi-asserted-by":"crossref","unstructured":"Gao P, Wang B, Gong NZ, Kulkarni SR, Thomas K, Mittal P. Sybilfuse: combining local attributes with global structure to perform robust sybil detection. in 2018 IEEE conference on communications and network security (CNS), IEEE. 2018, pp. 1\u20139","DOI":"10.1109\/CNS.2018.8433147"},{"key":"1254_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-16851-3","volume":"83","author":"B Antony","year":"2023","unstructured":"Antony B, Revathy S. Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection. Multimed Tools Appl. 2023;83:1\u201327.","journal-title":"Multimed Tools Appl"},{"key":"1254_CR44","unstructured":"Heeb S, Plesner A, Wattenhofer R. Sybil detection using graph neural networks, 2024. arXiv preprint arXiv:.08631."},{"issue":"3","key":"1254_CR45","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1049\/cmu2.12734","volume":"18","author":"A Dayyani","year":"2024","unstructured":"Dayyani A, Abbaspour M. SybilPSIoT: preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. IET Commun. 2024;18(3):258\u201369.","journal-title":"IET Commun"},{"issue":"9","key":"1254_CR46","doi-asserted-by":"publisher","first-page":"5341","DOI":"10.3390\/app13095341","volume":"13","author":"H Lu","year":"2023","unstructured":"Lu H, Gong D, Li Z, Liu F, Liu F. Sybilhp: Sybil detection in directed social networks with adaptive homophily prediction. Appl Sci. 2023;13(9):5341.","journal-title":"Appl Sci"},{"key":"1254_CR47","doi-asserted-by":"crossref","unstructured":"Xin-fang S. Survey of model and techniques for online social networks. In 2013 8th international conference on computer science & education, IEEE. 2013, pp. 1495\u20131498","DOI":"10.1109\/ICCSE.2013.6554163"},{"issue":"3","key":"1254_CR48","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s13278-013-0105-0","volume":"3","author":"A Sallaberry","year":"2013","unstructured":"Sallaberry A, Zaidi F, Melan\u00e7on G. Model for generating artificial social networks having community structures with small-world and scale-free properties. Soc Netw Anal Min. 2013;3(3):597\u2013609.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR49","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.procs.2016.02.102","volume":"78","author":"R Kaur","year":"2016","unstructured":"Kaur R, Kaur M, Singh S. A novel graph centrality based approach to analyze anomalous nodes with negative behavior. Proced Comput Sci. 2016;78:556\u201362.","journal-title":"Proced Comput Sci"},{"key":"1254_CR50","doi-asserted-by":"crossref","unstructured":"Yang Y et al. Sebot: structural entropy guided multi-view contrastive learning for social bot detection. In Proceedings of the 30th ACM SIGKDD conference on knowledge discovery and data mining, 2024; pp. 3841\u20133852","DOI":"10.1145\/3637528.3671871"},{"issue":"6","key":"1254_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3660522","volume":"42","author":"H Peng","year":"2024","unstructured":"Peng H, et al. Unsupervised social bot detection via structural information theory. ACM Trans Inf Syst. 2024;42(6):1\u201342.","journal-title":"ACM Trans Inf Syst"},{"key":"1254_CR52","doi-asserted-by":"crossref","unstructured":"Ahmed F and Abulaish M. An mcl-based approach for spam profile detection in online social networks. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, IEEE. 2012; pp. 602\u2013608","DOI":"10.1109\/TrustCom.2012.83"},{"key":"1254_CR53","doi-asserted-by":"crossref","unstructured":"Bhat SY and Abulaish M. Community-based features for identifying spammers in online social networks. in 2013 IEEE\/ACM International conference on advances in social networks analysis and mining (ASONAM 2013), IEEE. 2013; pp. 100\u2013107","DOI":"10.1145\/2492517.2492567"},{"key":"1254_CR54","doi-asserted-by":"crossref","unstructured":"Mislove A, Viswanath B, Gummadi KP, Druschel P. You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining, ACM. 2010; pp. 251\u2013260","DOI":"10.1145\/1718487.1718519"},{"key":"1254_CR55","doi-asserted-by":"crossref","unstructured":"Misra S, Tayeen ASM, Xu W. SybilExposer: an effective scheme to detect Sybil communities in online social networks. In 2016 IEEE international conference on communications (ICC), IEEE. 2016; pp. 1\u20136","DOI":"10.1109\/ICC.2016.7511603"},{"key":"1254_CR56","doi-asserted-by":"crossref","unstructured":"Lingam G, Rout RR, Somayajulu DV, Das SK. Social botnet community detection: a novel approach based on behavioral similarity in twitter network using deep learning. In Proceedings of the 15th ACM Asia conference on computer and communications security, 2020; pp. 708\u2013718.","DOI":"10.1145\/3320269.3384770"},{"key":"1254_CR57","doi-asserted-by":"publisher","first-page":"111690","DOI":"10.1016\/j.knosys.2024.111690","volume":"293","author":"X Wang","year":"2024","unstructured":"Wang X, Wang K, Chen K, Wang Z, Zheng K. Unsupervised twitter social bot detection using deep contrastive graph clustering. Knowl-Based Syst. 2024;293:111690.","journal-title":"Knowl-Based Syst"},{"key":"1254_CR58","doi-asserted-by":"crossref","unstructured":"Wang Z, Zhao K. Detecting camouflaged social bots through multi-level aggregation and information encoding. In Asia-Pacific Web (APWeb) and web-age information management (WAIM) joint international conference on web and big data, Springer. 2024; pp. 394\u2013410","DOI":"10.1007\/978-981-97-7241-4_25"},{"issue":"4","key":"1254_CR59","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.jsis.2013.07.004","volume":"22","author":"A Majchrzak","year":"2013","unstructured":"Majchrzak A, Malhotra A. Towards an information systems perspective and research agenda on crowdsourcing for innovation. J Strateg Inf Syst. 2013;22(4):257\u201368.","journal-title":"J Strateg Inf Syst"},{"key":"1254_CR60","doi-asserted-by":"crossref","unstructured":"Devineni P, Koutra D, Faloutsos M, Faloutsos C. If walls could talk: Patterns and anomalies in facebook wallposts. In Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining. ACM. 2015; pp. 367\u2013374","DOI":"10.1145\/2808797.2808880"},{"issue":"1","key":"1254_CR61","first-page":"15","volume":"9","author":"DN Tran","year":"2009","unstructured":"Tran DN, Min B, Li J, Subramanian L. Sybil-resilient online content voting. NSDI. 2009;9(1):15\u201328.","journal-title":"NSDI"},{"issue":"7","key":"1254_CR62","doi-asserted-by":"publisher","first-page":"1553","DOI":"10.1109\/LCOMM.2017.2687867","volume":"21","author":"T Silawan","year":"2017","unstructured":"Silawan T, Aswakul C. Sybilvote: Formulas to quantify the success probability of sybil attack in online social network voting. IEEE Commun Lett. 2017;21(7):1553\u20136.","journal-title":"IEEE Commun Lett"},{"key":"1254_CR63","doi-asserted-by":"crossref","unstructured":"Zheng H et al. Smoke screener or straight shooter: detecting elite sybil attacks in user-review social networks. arXiv preprint. 2017. arXiv:1709.06916","DOI":"10.14722\/ndss.2018.23009"},{"key":"1254_CR64","doi-asserted-by":"crossref","unstructured":"Singh M, Bansal D, and Sofat S. Detecting malicious users in Twitter using classifiers. In Proceedings of the 7th international conference on security of information and networks, ACM. 2014, p. 247","DOI":"10.1145\/2659651.2659736"},{"key":"1254_CR65","doi-asserted-by":"crossref","unstructured":"Alsaleh M, Alarifi A, Al-Salman AM, Alfayez M, and Almuhaysin A. Tsd: detecting sybil accounts in twitter. In 2014 13th international conference on machine learning and applications, IEEE. 2014; pp. 463\u2013469","DOI":"10.1109\/ICMLA.2014.81"},{"key":"1254_CR66","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.future.2017.08.030","volume":"87","author":"M Al-Qurishi","year":"2018","unstructured":"Al-Qurishi M, Alrubaian M, Rahman SMM, Alamri A, Hassan MM. A prediction system of Sybil attack in social network using deep-regression model. Futur Gener Comput Syst. 2018;87:743\u201353.","journal-title":"Futur Gener Comput Syst"},{"key":"1254_CR67","doi-asserted-by":"crossref","unstructured":"Fong S, Zhuang Y, He J. Not every friend on a social network can be trusted: Classifying imposters using decision trees. In The first international conference on future generation communication technologies, IEEE. 2012; pp. 58\u201363","DOI":"10.1109\/FGCT.2012.6476584"},{"key":"1254_CR68","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ins.2017.02.030","volume":"394","author":"J Cao","year":"2017","unstructured":"Cao J, Fu Q, Li Q, Guo D. Discovering hidden suspicious accounts in online social networks. Inf Sci. 2017;394:123\u201340.","journal-title":"Inf Sci"},{"key":"1254_CR69","doi-asserted-by":"publisher","first-page":"101715","DOI":"10.1016\/j.cose.2020.101715","volume":"91","author":"J Rodr\u00edguez-Ruiz","year":"2020","unstructured":"Rodr\u00edguez-Ruiz J, Mata-S\u00e1nchez JI, Monroy R, Loyola-Gonzalez O, L\u00f3pez-Cuevas A. A one-class classification approach for bot detection on Twitter. Comput Secur. 2020;91:101715.","journal-title":"Comput Secur"},{"key":"1254_CR70","doi-asserted-by":"crossref","unstructured":"Sahoo M, Samal S, Mohanty S, and Acharya AA. Identification of Social Bots in Online Social Networks Using Filter-Based Feature Selection Approach. In International conference on advanced computing and intelligent engineering, Springer. 2022, pp. 171\u2013181:","DOI":"10.1007\/978-981-99-5015-7_15"},{"issue":"1","key":"1254_CR71","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10766-014-0330-9","volume":"44","author":"J Cao","year":"2016","unstructured":"Cao J, Li Q, Ji Y, He Y, Guo D. Detection of forwarding-based malicious URLs in online social networks. Int J Parallel Prog. 2016;44(1):163\u201380.","journal-title":"Int J Parallel Prog"},{"key":"1254_CR72","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dsp.2015.03.010","volume":"47","author":"M Kharratzadeh","year":"2015","unstructured":"Kharratzadeh M, Renard B, Coates MJ. Bayesian topic model approaches to online and time-dependent clustering. Digit Signal Process. 2015;47:25\u201335.","journal-title":"Digit Signal Process"},{"issue":"1","key":"1254_CR73","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10710-013-9186-9","volume":"15","author":"GL Pappa","year":"2014","unstructured":"Pappa GL, Ochoa G, Hyde MR, Freitas AA, Woodward J, Swan J. Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms. Genet Program Evolvable Mach. 2014;15(1):3\u201335.","journal-title":"Genet Program Evolvable Mach"},{"issue":"1","key":"1254_CR74","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s13278-014-0194-4","volume":"4","author":"M Fire","year":"2014","unstructured":"Fire M, Kagan D, Elyashar A, Elovici Y. Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min. 2014;4(1):194.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR75","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M. Fame for sale: efficient detection of fake Twitter followers. Decis Support Syst. 2015;80:56\u201371.","journal-title":"Decis Support Syst"},{"issue":"1","key":"1254_CR76","first-page":"42","volume":"24","author":"P Gal\u00e1n-Garc\u00eda","year":"2016","unstructured":"Gal\u00e1n-Garc\u00eda P, Puerta JGDL, G\u00f3mez CL, Santos I, Bringas PG. Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. Logic J IGPL. 2016;24(1):42\u201353.","journal-title":"Logic J IGPL"},{"key":"1254_CR77","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2014.08.006","volume":"54","author":"S Lee","year":"2014","unstructured":"Lee S, Kim J. Early filtering of ephemeral malicious accounts on Twitter. Comput Commun. 2014;54:48\u201357.","journal-title":"Comput Commun"},{"key":"1254_CR78","doi-asserted-by":"crossref","unstructured":"Xiao C, Freeman DM, Hwa T. Detecting clusters of fake accounts in online social networks. In Proceedings of the 8th ACM workshop on artificial intelligence and security, ACM. 2015, pp. 91\u2013101","DOI":"10.1145\/2808769.2808779"},{"key":"1254_CR79","doi-asserted-by":"crossref","unstructured":"Jiang J, Shan Z, Sha W, Wang X, and Dai Y. Detecting and validating sybil groups in the wild. In 2012 32nd international conference on distributed computing systems workshops, IEEE. 2012; pp. 127\u2013132","DOI":"10.1109\/ICDCSW.2012.9"},{"issue":"4","key":"1254_CR80","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1016\/j.camwa.2011.12.030","volume":"64","author":"D-X Li","year":"2012","unstructured":"Li D-X, Fan J-L, Wang D-W, Liu Y. Latent topic based multi-instance learning method for localized content-based image retrieval. Comput Math Appl. 2012;64(4):500\u201310.","journal-title":"Comput Math Appl"},{"key":"1254_CR81","doi-asserted-by":"crossref","unstructured":"Gani K, Hacid H, and Skraba R. Towards multiple identity detection in social networks. In Proceedings of the 21st international conference on world wide web, ACM. 2012; pp. 503\u2013504","DOI":"10.1145\/2187980.2188098"},{"key":"1254_CR82","doi-asserted-by":"crossref","unstructured":"Kiruthiga S and Kannan A. Detecting cloning attack in Social Networks using classification and clustering techniques. In 2014 International conference on recent trends in information technology, IEEE. 2014; pp. 1\u20136","DOI":"10.1109\/ICRTIT.2014.6996166"},{"key":"1254_CR83","doi-asserted-by":"crossref","unstructured":"Kontaxis G, Polakis I, Ioannidis S, and Markatos EP. Detecting social network profile cloning. In 2011 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops), IEEE. 2011; pp. 295\u2013300","DOI":"10.1109\/PERCOMW.2011.5766886"},{"issue":"1","key":"1254_CR84","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2015","unstructured":"Ruan X, Wu Z, Wang H, Jajodia S. Profiling online social behaviors for compromised account detection. IEEE Trans Inf Forensics Secur. 2015;11(1):176\u201387.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"1254_CR85","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TDSC.2015.2479616","volume":"14","author":"M Egele","year":"2015","unstructured":"Egele M, Stringhini G, Kruegel C, Vigna G. Towards detecting compromised accounts on social networks. IEEE Trans Dependable Secure Comput. 2015;14(4):447\u201360.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1254_CR86","doi-asserted-by":"crossref","unstructured":"Jin L, Takabi H, Joshi JB. Towards active detection of identity clone attacks on online social networks. In Proceedings of the first ACM conference on Data and application security and privacy, ACM. 2011; pp. 27\u201338","DOI":"10.1145\/1943513.1943520"},{"key":"1254_CR87","unstructured":"Viswanath B et al. Towards detecting anomalous user behavior in online social networks. In 23rd {USENIX} Security Symposium ({USENIX} Security 14), 2014; pp. 223\u2013238."},{"issue":"3","key":"1254_CR88","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1002\/minf.201200135","volume":"32","author":"E Kondratovich","year":"2013","unstructured":"Kondratovich E, Baskin II, Varnek A. Transductive support vector machines: promising approach to model small and unbalanced datasets. Mol Inf. 2013;32(3):261\u20136.","journal-title":"Mol Inf"},{"issue":"2","key":"1254_CR89","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11063-009-9099-z","volume":"29","author":"R Zhang","year":"2009","unstructured":"Zhang R, Wang W, Ma Y, Men C. Least square transduction support vector machine. Neural Process Lett. 2009;29(2):133\u201342.","journal-title":"Neural Process Lett"},{"key":"1254_CR90","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compeleceng.2019.03.003","volume":"76","author":"SR Sahoo","year":"2019","unstructured":"Sahoo SR, Gupta B. Hybrid approach for detection of malicious profiles in twitter. Comput Electr Eng. 2019;76:65\u201381.","journal-title":"Comput Electr Eng"},{"key":"1254_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00786-4","volume":"11","author":"E Alothali","year":"2021","unstructured":"Alothali E, Hayawi K, Alashwal H. Hybrid feature selection approach to identify optimal features of profile metadata to detect social bots in Twitter. Soc Netw Anal Min. 2021;11:1\u201315.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR92","doi-asserted-by":"crossref","unstructured":"Roy P and Sood M. Implementation of ensemble-based prediction model for detecting sybil accounts in an OSN. In international conference on innovative computing and communications, Springer. 2021; pp. 709\u2013723","DOI":"10.1007\/978-981-15-5148-2_62"},{"key":"1254_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-14347-8","volume":"82","author":"A Mughaid","year":"2023","unstructured":"Mughaid A, et al. A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks. Multimed Tools Appl. 2023;82:1\u201326.","journal-title":"Multimed Tools Appl"},{"key":"1254_CR94","first-page":"105","volume":"11","author":"NP Shetty","year":"2022","unstructured":"Shetty NP, Muniyal B, Anand A, Kumar S. An enhanced sybil guard to detect bots in online social networks. J Cyber Secur Mobil. 2022;11:105\u201326.","journal-title":"J Cyber Secur Mobil"},{"key":"1254_CR95","doi-asserted-by":"crossref","unstructured":"Coyotl-Morales RM, Villase\u00f1or-Pineda L, Montes-y-G\u00f3mez M, Rosso P. Authorship attribution using word sequences. In Iberoamerican congress on pattern recognition, Springer. 2006; pp. 844\u2013853","DOI":"10.1007\/11892755_87"},{"key":"1254_CR96","doi-asserted-by":"crossref","unstructured":"Zheng X, Lai YM, Chow K-P, Hui LC, and Yiu S-M. Sockpuppet detection in online discussion forums. In 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE. 2011; pp. 374\u2013377","DOI":"10.1109\/IIHMSP.2011.69"},{"key":"1254_CR97","doi-asserted-by":"crossref","unstructured":"Crabb ES, Mishler A, Paletz S, Hefright B, Golonka E. Reading between the lines: a prototype model for detecting Twitter sockpuppet accounts using language-agnostic processes,\" in International conference on human-computer interaction, Springer. 2015; pp. 656\u2013661","DOI":"10.1007\/978-3-319-21380-4_111"},{"key":"1254_CR98","doi-asserted-by":"crossref","unstructured":"Johansson F, Kaati L, Shrestha A. Detecting multiple aliases in social media. In 2013 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), IEEE. 2013; pp. 1004\u20131011","DOI":"10.1145\/2492517.2500261"},{"key":"1254_CR99","doi-asserted-by":"crossref","unstructured":"Sakib MN and Spezzano F. Automated detection of sockpuppet accounts in wikipedia, In 2022 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE. 2022; pp. 155\u2013158","DOI":"10.1109\/ASONAM55673.2022.10068604"},{"key":"1254_CR100","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.knosys.2012.08.016","volume":"37","author":"Z Bu","year":"2013","unstructured":"Bu Z, Xia Z, Wang J. A sock puppet detection algorithm on virtual spaces. Knowl-Based Syst. 2013;37:366\u201377.","journal-title":"Knowl-Based Syst"},{"key":"1254_CR101","doi-asserted-by":"crossref","unstructured":"Seah CW, Hung C-Y, Hu Y, Chieu HL, and Lee RK-W. Interpretable sock puppet attribution. In 2023 IEEE International Conference on Big Data (BigData), IEEE. 2023; pp. 847\u2013856","DOI":"10.1109\/BigData59044.2023.10386453"},{"issue":"8","key":"1254_CR102","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1109\/TIFS.2014.2332820","volume":"9","author":"M Tsikerdekis","year":"2014","unstructured":"Tsikerdekis M, Zeadally S. Multiple account identity deception detection in social media using nonverbal behavior. IEEE Trans Inf Forensics Secur. 2014;9(8):1311\u201321.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1254_CR103","doi-asserted-by":"crossref","unstructured":"Kumar S, Cheng J, Leskovec J, and Subrahmanian V. An army of me: Sockpuppets in online discussion communities, in Proceedings of the 26th International Conference on World Wide Web, 2017; pp. 857\u2013866.","DOI":"10.1145\/3038912.3052677"},{"key":"1254_CR104","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.knosys.2018.03.002","volume":"149","author":"Z Yamak","year":"2018","unstructured":"Yamak Z, Saunier J, Vercouter L. SocksCatch: automatic detection and grouping of sockpuppets in social media. Knowl-Based Syst. 2018;149:124\u201342.","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"1254_CR105","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1109\/JSYST.2021.3117815","volume":"16","author":"N-L Nguyen","year":"2021","unstructured":"Nguyen N-L, Wang M-H, Dow C-R. Learning to recognize sockpuppets in online political discussions. IEEE Syst J. 2021;16(2):1873\u201384.","journal-title":"IEEE Syst J"},{"key":"1254_CR106","doi-asserted-by":"crossref","unstructured":"Li J, Zhou W, Han J, and Hu S. Sockpuppet detection in social network via propagation tree, In International Conference on Computational Science, Springer. 2019, pp. 507\u2013513","DOI":"10.1007\/978-3-030-22750-0_44"},{"issue":"1","key":"1254_CR107","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/s11704-015-4287-7","volume":"10","author":"D Liu","year":"2016","unstructured":"Liu D, Wu Q, Han W, Zhou B. Sockpuppet gang detection on social media sites. Front Comput Sci. 2016;10(1):124\u201335.","journal-title":"Front Comput Sci"},{"issue":"16","key":"1254_CR108","doi-asserted-by":"publisher","first-page":"18667","DOI":"10.1007\/s11227-023-05376-z","volume":"79","author":"Y-H Liu","year":"2023","unstructured":"Liu Y-H, Kuo C-Y. SiMAIM: identifying sockpuppets and puppetmasters on a single forum-oriented social media site. J Supercomput. 2023;79(16):18667\u201398.","journal-title":"J Supercomput"},{"key":"1254_CR109","doi-asserted-by":"crossref","unstructured":"Wang J, Zhou W, Li J, Yan Z, Han J, and Hu S. An online sockpuppet detection method based on subgraph similarity matching, in 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom), IEEE. 2018, pp. 391\u2013398","DOI":"10.1109\/BDCloud.2018.00067"},{"key":"1254_CR110","doi-asserted-by":"crossref","unstructured":"Yu H, Hu F, Liu L, Li Z, Li X, and Lin Z. Sockpuppet detection in social network based on adaptive multi-source features, in Modern Industrial IoT, big data and supply chain: proceedings of the IIoTBDSC 2020, Springer. 2021, pp. 187\u2013194","DOI":"10.1007\/978-981-33-6141-6_19"},{"key":"1254_CR111","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-16685-z","volume":"83","author":"A Mewada","year":"2023","unstructured":"Mewada A, Dewang RK. CIPF: identifying fake profiles on social media using a CNN-based communal influence propagation framework. Multimed Tools Appl. 2023;83:1\u201336.","journal-title":"Multimed Tools Appl"},{"key":"1254_CR112","doi-asserted-by":"crossref","unstructured":"El Mendili F et al. Fake Profile Identification Using Machine Learning, In The International Conference on Artificial Intelligence and Smart Environment, Springer. 2022, pp. 427\u2013432","DOI":"10.1007\/978-3-031-26254-8_61"},{"key":"1254_CR113","doi-asserted-by":"crossref","unstructured":"Devmane M and Rana N. Detection and prevention of profile cloning in online social networks, In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), IEEE. 2014, pp. 1\u20135","DOI":"10.1109\/ICRAIE.2014.6909237"},{"key":"1254_CR114","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2015.10.039","volume":"332","author":"RA Igawa","year":"2016","unstructured":"Igawa RA, et al. Account classification in online social networks with LBCA and wavelets. Inf Sci. 2016;332:72\u201383.","journal-title":"Inf Sci"},{"key":"1254_CR115","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-981-10-3920-1_9","volume-title":"Information and communication technology for sustainable development","author":"P Kumari","year":"2018","unstructured":"Kumari P, Rathore NC. Fake profile identification on facebook through SocialMedia app. In: Information and communication technology for sustainable development. Berlin: Springer; 2018. p. 83\u201390."},{"issue":"4","key":"1254_CR116","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1109\/TCSS.2020.2992223","volume":"7","author":"RR Rout","year":"2020","unstructured":"Rout RR, Lingam G, Somayajulu DV. Detection of malicious social bots using learning automata with url features in twitter network. IEEE Trans Comput Soc Syst. 2020;7(4):1004\u201318.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1254_CR117","unstructured":"Ratkiewicz J, Conover MD, Meiss M, Gon\u00e7alves B, Flammini A, and Menczer FM. Detecting and tracking political abuse in social media, in Fifth international AAAI conference on weblogs and social media, 2011."},{"issue":"1","key":"1254_CR118","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00552-5","volume":"9","author":"D Koggalahewa","year":"2022","unstructured":"Koggalahewa D, Xu Y, Foo E. An unsupervised method for social network spammer detection based on user information interests. J Big Data. 2022;9(1):1\u201335.","journal-title":"J Big Data"},{"issue":"1","key":"1254_CR119","first-page":"17","volume":"11","author":"M Bruno","year":"2022","unstructured":"Bruno M, Lambiotte R, Saracco F. Brexit and bots: characterizing the behaviour of automated accounts on Twitter during the UK election. Data Sci. 2022;11(1):17.","journal-title":"Data Sci"},{"key":"1254_CR120","unstructured":"Wang G, Konolige T, Wilson C, Wang X, Zheng H, and Zhao BY. You are how you click: clickstream analysis for sybil detection, in Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), 2013, pp. 241\u2013256."},{"key":"1254_CR121","doi-asserted-by":"crossref","unstructured":"Yadav NM and Chatur P. Compromised account detection and prevention by profiling social behavior and FASS Key Concept, in 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT), IEEE. 2017, pp. 164\u2013168","DOI":"10.1109\/ICRTEECT.2017.17"},{"key":"1254_CR122","doi-asserted-by":"crossref","unstructured":"Phad PV and Chavan M. Detecting compromised high-profile accounts on social networks, in 2018 9th international conference on computing, communication and networking technologies (ICCCNT), IEEE. 2018, pp. 1\u20134","DOI":"10.1109\/ICCCNT.2018.8493851"},{"issue":"7","key":"1254_CR123","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A. The rise of social bots. Commun ACM. 2016;59(7):96\u2013104.","journal-title":"Commun ACM"},{"key":"1254_CR124","doi-asserted-by":"crossref","unstructured":"Agarwal N, Jabin S, and Hussain SZ. Analyzing real and fake users in facebook network based on emotions. in 2019 11th International Conference on Communication Systems & Networks (COMSNETS), IEEE. 2019, pp. 110\u2013117","DOI":"10.1109\/COMSNETS.2019.8711124"},{"issue":"2","key":"1254_CR125","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1177\/0894439320908190","volume":"40","author":"L Hagen","year":"2022","unstructured":"Hagen L, Neely S, Keller TE, Scharf R, Vasquez FE. Rise of the machines? Examining the influence of social bots on a political discussion network. Soc Sci Comput Rev. 2022;40(2):264\u201387.","journal-title":"Soc Sci Comput Rev"},{"key":"1254_CR126","first-page":"102465","volume":"52","author":"P Wanda","year":"2020","unstructured":"Wanda P, Jie HJ. DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl. 2020;52:102465.","journal-title":"J Inf Secur Appl"},{"key":"1254_CR127","doi-asserted-by":"publisher","first-page":"106525","DOI":"10.1016\/j.knosys.2020.106525","volume":"211","author":"Y Wu","year":"2021","unstructured":"Wu Y, Fang Y, Shang S, Jin J, Wei L, Wang H. A novel framework for detecting social bots with deep neural networks and active learning. Knowl-Based Syst. 2021;211:106525.","journal-title":"Knowl-Based Syst"},{"key":"1254_CR128","doi-asserted-by":"publisher","first-page":"38753","DOI":"10.1109\/ACCESS.2020.2975877","volume":"8","author":"T Gao","year":"2020","unstructured":"Gao T, Yang J, Peng W, Jiang L, Sun Y, Li F. A content-based method for sybil detection in online social networks via deep learning. IEEE Access. 2020;8:38753\u201366.","journal-title":"IEEE Access"},{"key":"1254_CR129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-021-00742-2","volume":"11","author":"P Wanda","year":"2021","unstructured":"Wanda P, Jie HJ. DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning. Soc Netw Anal Min. 2021;11:1\u201312.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR130","doi-asserted-by":"publisher","first-page":"4211","DOI":"10.1109\/TIFS.2021.3102498","volume":"16","author":"M Fazil","year":"2021","unstructured":"Fazil M, Sah AK, Abulaish M. Deepsbd: a deep neural network model with attention mechanism for socialbot detection. IEEE Trans Inf Forens Secur Privacy. 2021;16:4211\u201323.","journal-title":"IEEE Trans Inf Forens Secur Privacy"},{"key":"1254_CR131","doi-asserted-by":"crossref","unstructured":"Kumar S, Garg S, Vats Y, and Parihar AS. Content based bot detection using bot language model and bert embeddings, in 2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP), IEEE, 2021, pp. 285\u2013289:","DOI":"10.1109\/ICCCSP52374.2021.9465506"},{"key":"1254_CR132","doi-asserted-by":"crossref","unstructured":"Mohammad S, Khan MU, Ali M, Liu L, Shardlow M, and Nawaz R. Bot detection using a single post on social media, in 2019 third world conference on smart trends in systems security and sustainablity (WorldS4), IEEE. 2019, pp. 215\u2013220.","DOI":"10.1109\/WorldS4.2019.8903989"},{"key":"1254_CR133","doi-asserted-by":"crossref","unstructured":"Feng Y, Li J, Jiao L, and Wu X. BotFlowMon: learning-based, content-agnostic identification of social bot traffic flows, in 2019 IEEE Conference on Communications and Network Security (CNS), IEEE. 2019; pp. 169\u2013177","DOI":"10.1109\/CNS.2019.8802706"},{"key":"1254_CR134","doi-asserted-by":"crossref","unstructured":"Kiran K, Manjunatha C, Harini T, Shenoy PD, and Venugopal K. Identification of anomalous users in Twitter based on user behaviour using artificial neural networks, in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), IEEE. 2019; pp. 1\u20135","DOI":"10.1109\/I2CT45611.2019.9033728"},{"key":"1254_CR135","unstructured":"Shah A, Varshney S, Mehrotra M. DeepMUI: a novel method to identify malicious users on online social network platforms, Concurrency Computation: Practice Experience, p. e7917."},{"issue":"1","key":"1254_CR136","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s13278-023-01104-w","volume":"13","author":"C Comito","year":"2023","unstructured":"Comito C, Caroprese L, Zumpano E. Multimodal fake news detection on social media: a survey of deep learning techniques. Soc Netw Anal Min. 2023;13(1):101.","journal-title":"Soc Netw Anal Min"},{"issue":"3","key":"1254_CR137","first-page":"3129","volume":"12","author":"F Benabbou","year":"2022","unstructured":"Benabbou F, Boukhouima H, Sael N. Fake accounts detection system based on bidirectional gated recurrent unit neural network. Int J Electr Comput Eng. 2022;12(3):3129.","journal-title":"Int J Electr Comput Eng"},{"issue":"2","key":"1254_CR138","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1109\/JSYST.2020.3034416","volume":"15","author":"G Lingam","year":"2020","unstructured":"Lingam G, Rout RR, Somayajulu DV, Ghosh SK. Particle swarm optimization on deep reinforcement learning for detecting social spam bots and spam-influential users in twitter network. IEEE Syst J. 2020;15(2):2281\u201392.","journal-title":"IEEE Syst J"},{"key":"1254_CR139","doi-asserted-by":"crossref","unstructured":"Modak S, Mulla ZAS, Verma A, Sunalini K, Khan PA, and Gupta P. Towards detecting the fake profile in Social Media using Hybrid Model of LSTM and Extreme Learning Machine, in 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE. 2023, pp. 941\u2013946","DOI":"10.1109\/ICESC57686.2023.10193622"},{"key":"1254_CR140","first-page":"1","volume":"80","author":"B Antony","year":"2023","unstructured":"Antony B, Revathy S. A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. J Supercomput. 2023;80:1\u201350.","journal-title":"J Supercomput"},{"issue":"1","key":"1254_CR141","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13278-025-01410-5","volume":"15","author":"S Lopez-Joya","year":"2025","unstructured":"Lopez-Joya S, Diaz-Garcia JA, Ruiz MD, Martin-Bautista M. Dissecting a social bot powered by generative AI: anatomy, new trends and challenges. Soc Netw Anal Min. 2025;15(1):7.","journal-title":"Soc Netw Anal Min"},{"key":"1254_CR142","unstructured":"Wu Q, Yang Y, Peng H, He B, Xia Y, Liao Y. Certainly Bot Or Not? Trustworthy Social Bot Detection via Robust Multi-Modal Neural Processes, arXiv preprint. 2025. arXiv:.09626"},{"key":"1254_CR143","doi-asserted-by":"crossref","unstructured":"Yang K, Singh D, Menczer F. Characteristics and prevalence of fake social media profiles with AI-generated faces. 2024. arXiv,\" ed.","DOI":"10.54501\/jots.v2i4.197"},{"issue":"8","key":"1254_CR144","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang C, Harkreader R, Gu G. Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans Inf Forensics Secur. 2013;8(8):1280\u201393.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1254_CR145","doi-asserted-by":"crossref","unstructured":"Beutel A, Xu W, Guruswami V, Palow C, Faloutsos C. Copycatch: stopping group attacks by spotting lockstep behavior in social networks, in Proceedings of the 22nd international conference on World Wide Web, 2013, pp. 119\u2013130.","DOI":"10.1145\/2488388.2488400"},{"key":"1254_CR146","doi-asserted-by":"crossref","unstructured":"Cao Q, Yang X, Yu J, and Palow C. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp. 477\u2013488.","DOI":"10.1145\/2660267.2660269"},{"issue":"5","key":"1254_CR147","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4276","volume":"30","author":"M Al-Qurishi","year":"2018","unstructured":"Al-Qurishi M, et al. SybilTrap: a graph-based semi-supervised Sybil defense scheme for online social networks. Concurrency Comput Pract Exp. 2018;30(5): e4276.","journal-title":"Concurrency Comput Pract Exp"},{"key":"1254_CR148","doi-asserted-by":"crossref","unstructured":"Cukierski W, Hamner B, Yang B. Graph-based features for supervised link prediction, in The 2011 International Joint Conference on Neural Networks, IEEE. 2011, pp. 1237\u20131244","DOI":"10.1109\/IJCNN.2011.6033365"},{"key":"1254_CR149","doi-asserted-by":"crossref","unstructured":"Boshmaf Y, Ripeanu M, Beznosov K, Santos-Neto E. Thwarting fake OSN accounts by predicting their victims, in Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, ACM, 2015, pp. 81\u201389","DOI":"10.1145\/2808769.2808772"},{"key":"1254_CR150","doi-asserted-by":"crossref","unstructured":"Liu Y, Ji S, Mittal P. Smartwalk: enhancing social network security via adaptive random walks, In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 492\u2013503","DOI":"10.1145\/2976749.2978319"},{"key":"1254_CR151","doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Luo M. BotRGCN: twitter bot detection with relational graph convolutional networks. in Proceedings of the 2021 IEEE\/ACM international conference on advances in social networks analysis and mining, 2021; pp. 236\u2013239.","DOI":"10.1145\/3487351.3488336"},{"issue":"5","key":"1254_CR152","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1177\/01655515221116517","volume":"50","author":"T Li","year":"2024","unstructured":"Li T, Zeng Z, Sun S, Sun J. A novel integrated framework based on multi-view features for multidimensional social bot detection. J Inf Sci. 2024;50(5):1148\u201369.","journal-title":"J Inf Sci"},{"issue":"10","key":"1254_CR153","doi-asserted-by":"publisher","first-page":"442","DOI":"10.3390\/a17100442","volume":"17","author":"JA C\u00e1rdenas-Haro","year":"2024","unstructured":"C\u00e1rdenas-Haro JA, Salem M, Aldaco-Gast\u00e9lum AN, L\u00f3pez-Avitia R, Dawson M. Enhancing security in social networks through machine learning: detecting and mitigating sybil attacks with SybilSocNet. Algorithms. 2024;17(10):442.","journal-title":"Algorithms"},{"key":"1254_CR154","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2015.11.002","volume":"16","author":"EM Clark","year":"2016","unstructured":"Clark EM, Williams JR, Jones CA, Galbraith RA, Danforth CM, Dodds PS. Sifting robotic from organic text: a natural language approach for detecting automation on Twitter. J Computat Sci. 2016;16:1\u20137.","journal-title":"J Computat Sci"},{"key":"1254_CR155","doi-asserted-by":"publisher","first-page":"101771","DOI":"10.1016\/j.is.2021.101771","volume":"103","author":"P Pham","year":"2022","unstructured":"Pham P, Nguyen LT, Vo B, Yun U. Bot2Vec: a general approach of intra-community oriented representation learning for bot detection in different types of social networks. Inf Syst. 2022;103:101771.","journal-title":"Inf Syst"},{"key":"1254_CR156","doi-asserted-by":"crossref","unstructured":"Morstatter F, Wu L, Nazer TH, Carley KM, and Liu H. A new approach to bot detection: striking the balance between precision and recall, in 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE. 2016, pp. 533\u2013540:","DOI":"10.1109\/ASONAM.2016.7752287"},{"issue":"4","key":"1254_CR157","first-page":"561","volume":"15","author":"S Cresci","year":"2017","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Trans Dependable Secure Comput. 2017;15(4):561\u201376.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1254_CR158","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-18032-8_16","volume-title":"Pacific-asia conference on knowledge discovery and data mining","author":"M Giatsoglou","year":"2015","unstructured":"Giatsoglou M, Chatzakou D, Shah N, Beutel A, Faloutsos C, Vakali A. Nd-sync: detecting synchronized fraud activities. In: Pacific-asia conference on knowledge discovery and data mining. Berlin: Springer; 2015. p. 201\u201314."},{"issue":"4","key":"1254_CR159","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/s10676-022-09651-0","volume":"24","author":"A Ahmad","year":"2022","unstructured":"Ahmad A, Whitworth B, Bertino E. A framework for the application of socio-technical design methodology. Ethics Inf Technol. 2022;24(4):46.","journal-title":"Ethics Inf Technol"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01254-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01254-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01254-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:17:41Z","timestamp":1756898261000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01254-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"references-count":159,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1254"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01254-y","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"10 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"214"}}