{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:17:50Z","timestamp":1771658270704,"version":"3.50.1"},"reference-count":44,"publisher":"Zhejiang University Press","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1631\/fitee.2300068","type":"journal-article","created":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T06:01:47Z","timestamp":1711173707000},"page":"415-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards understanding bogus traffic service in online social networks","\u5728\u7ebf\u793e\u4ea4\u7f51\u7edc\u4e2d\u7684\u865a\u5047\u6d41\u91cf\u670d\u52a1\u6316\u6398"],"prefix":"10.1631","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9911-7897","authenticated-orcid":false,"given":"Ping","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8571-9780","authenticated-orcid":false,"given":"Xuhong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8918-6299","authenticated-orcid":false,"given":"Changting","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4927-5833","authenticated-orcid":false,"given":"Ting","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-372X","authenticated-orcid":false,"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2024,3,23]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316504"},{"key":"ref2","volume-title":"Alibaba Annual Report.","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2013.33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09290-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41251-7_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw54576.2021.00028"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/2939672.2939785","volume-title":"XGBoost: a scalable tree boosting system.","author":"Chen","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.10.005"},{"key":"ref12","first-page":"2153","article-title":"Measurement by proxy: on the accuracy of online marketplace measurements","author":"Cuevas","year":"2022","journal-title":"31st USENIX Security Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"ref14","volume-title":"BERT: pretraining of deep bidirectional Transformers for language understanding.","author":"Devlin","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2953331"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp51992.2021.00035"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20314"},{"key":"ref19","volume-title":"TwiBot-22: towards graph-based Twitter bot detection.","author":"Feng","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809292"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201104"},{"key":"ref22","volume-title":"BERT Base Chinese Model.","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3479523"},{"key":"ref24","volume-title":"JD Annual Report.","year":"2020"},{"key":"ref25","article-title":"It\u2019s trending on Twitter\u201d-an analysis of the Twitter manipulations in the Massachusetts 2010 Special Senate Election","volume-title":"Annual Meeting of the American Political Science Association","author":"Just","year":"2012"},{"key":"ref26","volume-title":"Distributed representations of sentences and documents.","author":"Le","year":"2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"ref28","first-page":"404","article-title":"TextRank: bringing order into text","volume-title":"Proc Conf on Empirical Methods in Natural Language Processing","author":"Mihalcea","year":"2004"},{"key":"ref29","volume-title":"Efficient estimation of word representations in vector space.","author":"Mikolov","year":"2013"},{"key":"ref30","volume-title":"PDD Annual Report.","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813661"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"ref33","first-page":"195","article-title":"Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse","volume-title":"Proc 22nd USENIX Conf on Security","author":"Thomas","year":"2013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19354"},{"key":"ref36","first-page":"1009","article-title":"Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets","volume-title":"Proc 27th USENIX Conf on Security Symp","author":"Van Wegberg","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380256"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i4.6161"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2013.2267732"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2009.2034047"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2604226"},{"key":"ref44","volume-title":"Smoke screener or straight shooter: detecting elite sybil attacks in user-review social networks.","author":"Zheng","year":"2017"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300068.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2300068\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300068.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:58:51Z","timestamp":1771657131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2300068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["68"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2300068","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"5 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Shouling JI is a corresponding expert of <i>Frontiers of Information Technology & Electronic Engineering<\/i>, and he was not involved with the peer review process of this paper. All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}