{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:34:50Z","timestamp":1770032090087,"version":"3.49.0"},"reference-count":31,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,8,11]]},"abstract":"<jats:p>Online social networks (OSNs) are utilized by millions of people from the entire world to communicate with others through Facebook and Twitter. The removal of fake accounts will increase the efficiency of the protection in OSNs. The construction of the OSN model has the nodes and the links to identify the fake profiles on Twitter. This paper proposes a novel technique to detect spam profiles and the proposed classifier is to classify the profile images from the dataset. The malicious profile detection technique is used to identify the fake profiles with the concept of a Twitter crawler that implements the extraction of data from the profile. The feature set analysis has been implemented with the feature related analysis. The user behavior detection utilizes the adjacent matrix to measure the similarity values within the friend\u2019s profiles. The multi-variant Support Vector Machine classifier is developed for efficient classification with the kernel function. The proposed technique is compared with the well-known techniques of ECRModel, ISMA and DeepLink that the detection rate is 2.5% higher than the related techniques, the computation time is 220\u200as lesser than the related techniques and the proposed technique has 3.1% higher accuracy.<\/jats:p>","DOI":"10.3233\/jifs-202937","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T05:25:11Z","timestamp":1625635511000},"page":"993-1007","source":"Crossref","is-referenced-by-count":4,"title":["A novel spam detection technique for detecting and classifying malicious profiles in online social networks"],"prefix":"10.1177","volume":"41","author":[{"given":"V.M.","family":"Priyadharshini","sequence":"first","affiliation":[{"name":"Department of Information Technology, University College of Engineering, BIT Campus, Anna University, Trichirappalli, India"}]},{"given":"A.","family":"Valarmathi","sequence":"additional","affiliation":[{"name":"Department of Computer Applications, University College of Engineering, BIT Campus, Anna University, Tirchirappalli, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-202937_ref1","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.chb.2017.10.007","article-title":"Security and privacy in online social networking: risk perceptions and precautionary behaviour","volume":"78","author":"Van Schaik","year":"2018","journal-title":"Comput Hum Behav"},{"key":"10.3233\/JIFS-202937_ref2","unstructured":"Molitor D. , Reichhart P. , Spann M. , Ghose A. , Measuring the effectiveness of location-based advertising: a randomized field experiment, Available at SSRN 2645281 (2019)."},{"issue":"5","key":"10.3233\/JIFS-202937_ref3","first-page":"93","article-title":"A survey of methods for explaining black box models","volume":"51","author":"Guidotti","year":"2018","journal-title":"ACM Comput Surv"},{"key":"10.3233\/JIFS-202937_ref4","doi-asserted-by":"crossref","unstructured":"Mohammadrezaei M. , Shiri M.E. , Rahmani A.M. , Identifying fake accounts on social networks based on graph analysis and classification algorithms, Hindawi Secur Commun Netw (2018).","DOI":"10.1155\/2018\/5923156"},{"key":"10.3233\/JIFS-202937_ref5","doi-asserted-by":"crossref","first-page":"160227","DOI":"10.1109\/ACCESS.2019.2950593","article-title":"A privacy-preserving protocol for network-neutral caching in ISP networks","volume":"7","author":"Andreoletti","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref6","doi-asserted-by":"crossref","first-page":"3387","DOI":"10.1002\/dac.3387","article-title":"A novel organizing scheme of single topic user group based on trust chain model in social network","volume":"31","author":"Li","year":"2018","journal-title":"Int J Commun Syst"},{"issue":"2","key":"10.3233\/JIFS-202937_ref7","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1038\/s41562-018-0510-5","article-title":"Information flow reveals prediction limits in online social activity","volume":"3","author":"Bagrow","year":"2019","journal-title":"Nat Hum Behav"},{"key":"10.3233\/JIFS-202937_ref8","doi-asserted-by":"crossref","first-page":"18513","DOI":"10.1007\/s11042-016-4162-z","article-title":"C.yVOD: a novel trinity multimedia social network scheme","volume":"76","author":"Zhang","year":"2017","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-202937_ref9","doi-asserted-by":"crossref","first-page":"6540","DOI":"10.1109\/ACCESS.2018.2796018","article-title":"Using machine learning to detect fake identities: bots vs humans","volume":"6","author":"Van Der Walt","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref10","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1504\/IJHPCN.2019.097506","article-title":"Distributed and personalised social network privacy protection","volume":"13","author":"Xiao-Lin","year":"2019","journal-title":"IJHPCN"},{"key":"10.3233\/JIFS-202937_ref11","first-page":"629","article-title":"Cross-site input inference attacks on mobile web users","author":"Zhao","year":"2017","journal-title":"International Conference on Security and Privacy in Communication Systems, Springer"},{"key":"10.3233\/JIFS-202937_ref12","doi-asserted-by":"crossref","unstructured":"Perez B. , Musolesi M. , Stringhini G. , You are your metadata: identification and obfuscation of social media users using metadata information, in: Twelfth International AAAI Conference on Web and Social Media (2018).","DOI":"10.1609\/icwsm.v12i1.15010"},{"key":"10.3233\/JIFS-202937_ref13","first-page":"856","article-title":"On the social influence in human behavior: physical, homophily, and social communities","author":"Luceri","year":"2017","journal-title":"International Conference on Complex Networks and Their Applications, Springer"},{"issue":"1","key":"10.3233\/JIFS-202937_ref14","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s41109-019-0134-3","article-title":"Analyzing and inferring human real-life behavior through online social networks with social influence deep learning","volume":"4","author":"Luceri","year":"2019","journal-title":"Appl Netw Sci"},{"issue":"3","key":"10.3233\/JIFS-202937_ref15","first-page":"32","article-title":"A novel authorization scheme for multimedia social networks under cloud storage method by using MA-CP-ABE","volume":"8","author":"Cheng","year":"2018","journal-title":"IJCAC"},{"key":"10.3233\/JIFS-202937_ref16","doi-asserted-by":"crossref","first-page":"17653","DOI":"10.1109\/ACCESS.2018.2818116","article-title":"Modeling privacy leakage risks in largescale social networks","volume":"6","author":"Du","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref17","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1145\/2810103.2813605","article-title":"Where\u2019s wally?: Precise user discovery attacks in location proximity services","author":"Polakis","year":"2015","journal-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM"},{"key":"10.3233\/JIFS-202937_ref18","doi-asserted-by":"crossref","unstructured":"Wanda P. , Jie H.J. , Efficient data security for mobile instant messenger, Telkomnika J 16(3) (2018).","DOI":"10.12928\/telkomnika.v16i4.4045"},{"key":"10.3233\/JIFS-202937_ref19","first-page":"436","article-title":"Dynamic trust evaluation model based on bidding and multiattributes for social networks","volume":"13","author":"Wang","year":"2019","journal-title":"Int J High-Perform Comput Netw"},{"issue":"1","key":"10.3233\/JIFS-202937_ref20","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","article-title":"Profiling online social behaviors for compromised account detection","volume":"11","author":"Ruan","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur Jan"},{"key":"10.3233\/JIFS-202937_ref21","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1016\/j.future.2016.10.007","article-title":"Social media security and trustworthiness: overview and new direction","volume":"86","author":"Zhiyong","year":"2018","journal-title":"Future Gen Comp Syst"},{"key":"10.3233\/JIFS-202937_ref22","doi-asserted-by":"crossref","first-page":"3361","DOI":"10.1002\/dac.3361","article-title":"A secure authentication and key agreement scheme for roaming service with user anonymity","volume":"30","author":"Arshad","year":"2017","journal-title":"Int J Commun Sys"},{"key":"10.3233\/JIFS-202937_ref23","doi-asserted-by":"crossref","first-page":"6105","DOI":"10.1109\/ACCESS.2016.2612298","article-title":"ECRModel: an elastic collision-based rumor-propagation model in online social networks","volume":"4","author":"Tan","year":"2016","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref24","doi-asserted-by":"crossref","first-page":"1890","DOI":"10.1002\/sec.926","article-title":"A mobile phone-based physical-social location proof system for mobile social network service","volume":"9","author":"Ni","year":"2016","journal-title":"Secur Comm Netw"},{"issue":"8","key":"10.3233\/JIFS-202937_ref25","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TSP.2015.2510971","article-title":"Joint community and anomaly tracking in dynamic networks","volume":"64","author":"Baingana","year":"2016","journal-title":"IEEE Trans Signal Process Apr"},{"key":"10.3233\/JIFS-202937_ref26","unstructured":"Clark D.B. , The bot bubble: how click farms have in ated social media currency, The New Republic (2015)."},{"key":"10.3233\/JIFS-202937_ref27","doi-asserted-by":"crossref","unstructured":"Mohaisen A. , Hollenbeck S. , Improving social network-based sybil defenses by rewiring and augmenting social graphs, Rev Select Paper 14th Int Workshop Inform Secur Appl (2013), 8267 WISA.","DOI":"10.1007\/978-3-319-05149-9_5"},{"key":"10.3233\/JIFS-202937_ref28","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1145\/2714576.2714606","article-title":"Social networks meet distributed systems: towards a robust sybil defense under churn","author":"Chiluka","year":"2015","journal-title":"Proceedings of the 10th ACM symposium on information, computer and communications security, Asia CCS \u201915. New York, NY, USA: ACM"},{"key":"10.3233\/JIFS-202937_ref30","doi-asserted-by":"crossref","first-page":"6105","DOI":"10.1109\/ACCESS.2016.2612298","article-title":"ECRModel: an elastic collision-based rumor-propagation model in online social networks","volume":"4","author":"Tan","year":"2016","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref31","doi-asserted-by":"crossref","first-page":"3284","DOI":"10.1109\/ACCESS.2017.2666823","article-title":"ISMA: intelligent sensing model for anomalies detection in cross platform OSNs with a case study on IoT","volume":"5","author":"Sharma","year":"2017","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-202937_ref32","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.1109\/INFOCOM.2018.8486231","author":"Zhou","year":"2018","journal-title":"IEEE INFOCOM 2018 - IEEE Conference on computer communications"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-202937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:56:03Z","timestamp":1769993763000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-202937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":31,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-202937","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,11]]}}}