{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:47:34Z","timestamp":1763747254823,"version":"3.45.0"},"reference-count":63,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Social media platforms are currently confronted with a substantial problem concerning the presence of fake accounts, which pose a threat by spreading harmful content, spam, and misinformation. This study aims to address the problem by differentiating between fake and real X accounts (formerly Twitter). The need to mitigate the negative impact of fake accounts on online communities serves as the driving force for this work, with the goal of developing an effective method for identifying fake accounts and their fraudulent activities, such as posting harmful links, engaging in spamming behaviors, and disrupting online communities. The scope of this work focuses specifically on fake Twitter account detection. A comprehensive approach is taken, leveraging user information and tweets to discern between genuine and fake accounts. Various deep learning architectures are proposed and implemented, utilizing different optimizers and evaluating performance metrics. The models are trained and tested using a collected dataset, augmented to cover diverse real-life scenarios. The results show promising progress in distinguishing between fake and real accounts, revealing that the inclusion of tweet content along with user metadata does not significantly improve the classification of fake accounts. It also highlights the importance of selecting appropriate optimizers. The implications of this study are relevant to social media platforms, users, and researchers. The findings provide insights into combating fake accounts and their fraudulent activities, contributing to the enhancement of online community safety. While the research is specific to Twitter, the methodology and insights gained may be potentially generalizable to other social media platforms.<\/jats:p>","DOI":"10.3390\/bdcc9120298","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:28:07Z","timestamp":1763746087000},"page":"298","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Metadata Suffices: Optimizer-Aware Fake Account Detection with Minimal Multimodal Input"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1983-8909","authenticated-orcid":false,"given":"Ziad","family":"Elgammal","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Istanbul Medipol University, 34810 Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3023-4636","authenticated-orcid":false,"given":"Khaled","family":"Elgammal","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Istanbul Medipol University, 34810 Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6657-9738","authenticated-orcid":false,"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Istanbul Medipol University, 34810 Istanbul, Turkey"},{"name":"Department of Computer Science, University of Calgary, 2500 University Drive NW, Calgary, AB T2N 1N4, Canada"},{"name":"Department of Health Informatics, University of Southern Denmark, 5230 Odense, Denmark"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1080\/02673843.2019.1590851","article-title":"A systematic review: The influence of social media on depression, anxiety and psychological distress in adolescents","volume":"25","author":"Keles","year":"2020","journal-title":"Int. J. Adolesc. Youth"},{"key":"ref_2","first-page":"351","article-title":"A study on positive and negative effects of social media on society","volume":"5","author":"Akram","year":"2017","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Song, J., Lee, S., and Kim, J. (2015, January 12\u201316). Crowdtarget: Target-based detection of crowdturfing in online social networks. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813661"},{"key":"ref_4","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., and Almeida, V. (2010, January 13\u201314). Detecting spammers on twitter. Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Romanov, A., Semenov, A., Mazhelis, O., and Veijalainen, J. (2017, January 25\u201327). Detection of fake profiles in social media. Proceedings of the 13th International Conference on Web Information Systems and Technologies (WEBIST 2017), Porto, Portugal.","DOI":"10.5220\/0006362103630369"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Gurajala, S., White, J.S., Hudson, B., and Matthews, J.N. (2015, January 27\u201329). Fake Twitter accounts: Profile characteristics obtained using an activity-based pattern detection approach. Proceedings of the 2015 International Conference on Social Media & Society, Toronto, ON, Canada.","DOI":"10.1145\/2789187.2789206"},{"key":"ref_7","unstructured":"Nazir, A., Raza, S., Chuah, C.N., and Schipper, B. (2010, January 22). Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications. Proceedings of the 3rd Workshop on Online Social Networks (WOSN 2010), Boston, MA, USA."},{"key":"ref_8","first-page":"1","article-title":"Fake account detection in online social networks using graph-based features and ensemble learning","volume":"121","author":"Andriopoulou","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","first-page":"215","article-title":"Fake accounts detection in online social networks using graph-based features","volume":"7","author":"Idir","year":"2016","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_10","unstructured":"Cao, Y., Li, W., and Zhang, J. (2011, January 11\u201313). Real-time traffic information collecting and monitoring system based on the internet of things. Proceedings of the 2011 6th International Conference on Pervasive Computing and Applications, Oulu, Finland."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.cose.2016.05.005","article-title":"\u00cdntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs","volume":"61","author":"Boshmaf","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TDSC.2015.2479616","article-title":"Towards detecting compromised accounts on social networks","volume":"14","author":"Egele","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., and Zhao, B.Y. (2013, January 23\u201325). Follow the green: Growth and dynamics in twitter follower markets. Proceedings of the 2013 Conference on Internet Measurement Conference, Barcelona, Spain.","DOI":"10.1145\/2504730.2504731"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., and Zhao, B.Y. (2012, January 16\u201320). Serf and turf: Crowdturfing for fun and profit. Proceedings of the 21st International Conference on World Wide Web, Lyon, France.","DOI":"10.1145\/2187836.2187928"},{"key":"ref_15","unstructured":"Wang, G., Wang, T., Zheng, H., and Zhao, B.Y. (2014, January 20\u201322). Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Yuan, D., Miao, Y., Gong, N., Yang, Z., Li, Q., Song, D., Wang, Q., and Liang, X. (2019, January 11\u201315). Detecting fake accounts in online social networks at the time of registrations. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3319535.3363198"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., and Webb, S. (2010, January 26\u201330). Uncovering Social Spammers: Social Honeypots + Machine Learning. Proceedings of the 19th ACM International Conference on Information and Knowledge Management, ACM, Toronto, ON, Canada.","DOI":"10.1145\/1835449.1835522"},{"key":"ref_18","unstructured":"Lee, K., Eoff, B., and Caverlee, J. (2011, January 17\u201321). Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM), Barcelona, Spain."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","article-title":"Fame for Sale: Efficient Detection of Fake Twitter Followers","volume":"80","author":"Crescia","year":"2015","journal-title":"Decis. Support Syst."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Chen, X., Xiang, Y., and Zhou, W. (2015, January 8\u201312). 6 Million Spam Tweets: A Large Ground Truth for Timely Twitter Spam Detection. Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK.","DOI":"10.1109\/ICC.2015.7249453"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kumar, A., Senatore, S., and Gunjan, V.K. (2022). Sentiment Analysis of Twitter Data Using Na\u00efve Bayes Classifier. ICDSMLA 2020, Springer. Lecture Notes in Electrical Engineering.","DOI":"10.1007\/978-981-16-3690-5"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","article-title":"A Hybrid Approach for Detecting Automated Spammers in Twitter","volume":"13","author":"Fazil","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","article-title":"Empirical evaluation and new design for fighting evolving Twitter spammers","volume":"8","author":"Yang","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wu, T., Liu, S., Zhang, J., and Xiang, Y. (February, January 30). Twitter Spam Detection Based on Deep Learning. Proceedings of the ACSW 2017: Australasian Computer Science Week 2017, Geelong, Australia.","DOI":"10.1145\/3014812.3014815"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"100079","DOI":"10.1016\/j.osnem.2020.100079","article-title":"A deep learning model for Twitter spam detection","volume":"18","author":"Alom","year":"2020","journal-title":"Online Soc. Netw. Media"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tan, Z., Wang, H., Feng, S., Zheng, Q., and Luo, M. (2023, January 23\u201327). BotMoE: Twitter Bot Detection with Community-Aware Mixtures of Modal-Specific Experts. Proceedings of the SIGIR \u201923: The 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, Taipei, Taiwan.","DOI":"10.1145\/3539618.3591646"},{"key":"ref_27","first-page":"35254","article-title":"Twibot-22: Towards Graph-Based Twitter Bot Detection","volume":"35","author":"Feng","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_28","unstructured":"Shevtsov, A., Antonakaki, D., Lamprou, I., Pratikakis, P., and Ioannidis, S. (2023). BotArtist: Generic Approach for Bot Detection in Twitter via Semi-Automatic Machine Learning Pipeline. arXiv."},{"key":"ref_29","first-page":"1","article-title":"Enhancing Misinformation Countermeasures: A Multimodal Approach to Twitter Bot Detection","volume":"15","author":"Alghamdi","year":"2025","journal-title":"Soc. Netw. Anal. Min."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kami\u0144ski, K., and Sepczuk, M. (2024). Detecting Fake Accounts on Social Media Portals\u2014The X Portal Case Study. Electronics, 13.","DOI":"10.3390\/electronics13132542"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1140\/epjds\/s13688-024-00499-6","article-title":"Unsupervised detection of coordinated fake-follower campaigns on social media","volume":"13","author":"Zouzou","year":"2024","journal-title":"EPJ Data Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1177\/00187208211072642","article-title":"Duped by bots: Why some are better than others at detecting fake social media personas","volume":"66","author":"Kenny","year":"2024","journal-title":"Hum. Factors"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ng, L.H.X., and Carley, K.M. (2025). A Global Comparison of Social Media Bot and Human Characteristics. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-96372-1"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ferrara, E. (2022). Twitter spam and false accounts prevalence, detection, and characterization: A survey. First Monday, 27.","DOI":"10.5210\/fm.v27i12.12872"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Li, J., and Luo, M. (2021, January 26). Twibot-20: A comprehensive twitter bot detection benchmark. Proceedings of the 30th ACM International Conference on Information & Knowledge Management, Virtual.","DOI":"10.1145\/3459637.3482019"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Gilani, Z., Farahbakhsh, R., Tyson, G., Wang, L., and Crowcroft, J. (2017, January 31). Of bots and humans (on twitter). Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia.","DOI":"10.1145\/3110025.3110090"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Yang, K.C., Varol, O., Hui, P.M., and Menczer, F. (2020, January 3). Scalable and generalizable social bot detection through data selection. Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, PA, USA. No. 01.","DOI":"10.1609\/aaai.v34i01.5460"},{"key":"ref_38","first-page":"561","article-title":"Social fingerprinting: Detection of spambot groups through DNA-inspired behavioral modeling","volume":"15","author":"Cresci","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., and Tesconi, M. (2018, January 15). $ FAKE: Evidence of spam and bot activity in stock microblogs on Twitter. Proceedings of the International AAAI Conference on Web and Social Media, Palo Alto, CA, USA. No. 1.","DOI":"10.1609\/icwsm.v12i1.15073"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., and Tesconi, M. (2019, January 26). Rtbust: Exploiting temporal patterns for botnet detection on twitter. Proceedings of the 10th ACM Conference on Web Science, Boston, MA, USA.","DOI":"10.1145\/3292522.3326015"},{"key":"ref_41","unstructured":"Honnibal, M., and Montani, I. (2025, November 11). spaCy: Industrial-strength Natural Language Processing in Python, Version 2. Available online: https:\/\/spacy.io."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1186\/s40537-023-00792-7","article-title":"Tabular and latent space synthetic data generation: A literature review","volume":"10","author":"Iglesias","year":"2023","journal-title":"J. Big Data"},{"key":"ref_43","unstructured":"Google Colab Development Team (2025, November 11). Google Colab Notebook. Available online: https:\/\/colab.research.google.com\/drive\/1RX1UV4C6GR-0bVHD-6x2upCfKZghi3BW?usp=sharing."},{"key":"ref_44","unstructured":"Weights and Biases Project (2025, November 11). WandB. Available online: https:\/\/wandb.ai."},{"key":"ref_45","unstructured":"Keras (2025, November 11). Keras: SGD Optimizer; Year. Available online: https:\/\/keras.io\/api\/optimizers\/sgd\/."},{"key":"ref_46","unstructured":"Keras (2025, November 11). RMSprop Optimizer; Year. Keras API Documentation. Available online: https:\/\/keras.io\/api\/optimizers\/rmsprop\/."},{"key":"ref_47","unstructured":"Keras Documentation (2025, November 11). Adam Optimizer-Keras API. Available online: https:\/\/keras.io\/api\/optimizers\/adam\/."},{"key":"ref_48","unstructured":"Keras Documentation (2025, November 11). AdaDelta Optimizer-Keras Documentation. Available online: https:\/\/keras.io\/api\/optimizers\/adadelta\/."},{"key":"ref_49","unstructured":"Keras (2025, November 11). ReduceLROnPlateau Callback; Year of Access. Available online: https:\/\/keras.io\/api\/callbacks\/reduce_lr_on_plateau\/."},{"key":"ref_50","unstructured":"Keras (2025, November 11). EarlyStopping; Year of Access. Available online: https:\/\/keras.io\/api\/callbacks\/early_stopping\/."},{"key":"ref_51","unstructured":"Grandini, M., Bagli, E., and Visani, G. (2020). Metrics for multi-class classification: An overview. arXiv."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A Review on Evaluation Metrics for Data Classification Evaluations","volume":"5","author":"Hossin","year":"2015","journal-title":"Int. J. Data Min. Knowl. Manag. Process"},{"key":"ref_53","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_54","unstructured":"OpenAI (2025, November 11). Dense Layer-Keras API. Available online: https:\/\/keras.io\/api\/layers\/core_layers\/dense\/."},{"key":"ref_55","unstructured":"Baldi, P., and Sadowski, P.J. (2013, January 5\u201310). Understanding dropout. Proceedings of the Advances in Neural Information Processing Systems Volume 26, Lake Tahoe, NV, USA."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"53040","DOI":"10.1109\/ACCESS.2019.2912200","article-title":"Review of Deep Learning Algorithms and Architectures","volume":"7","author":"Shrestha","year":"2019","journal-title":"IEEE Access"},{"key":"ref_57","unstructured":"Hern\u00e1ndez-Garc\u00eda, A., and K\u00f6nig, P. (2018). Do Deep Nets Really Need Weight Decay and Dropout?. arXiv."},{"key":"ref_58","unstructured":"Gu, A., and Dao, T. (2024, January 7\u20139). Mamba: Linear-time sequence modeling with selective state spaces. Proceedings of the First Conference on Language Modeling (COLM 2024), Philadelphia, PA, USA."},{"key":"ref_59","unstructured":"Li, D., Tan, S., Zhang, Y., Jin, M., Pan, S., Okumura, M., and Jiang, R. (2024). Dyg-mamba: Continuous state space modeling on dynamic graphs. arXiv."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Li, D., Kosugi, S., Zhang, Y., Okumura, M., Xia, F., and Jiang, R. (2025, January 22). Revisiting dynamic graph clustering via matrix factorization. Proceedings of the ACM on Web Conference 2025, Sydney, NSW, Australia.","DOI":"10.1145\/3696410.3714646"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1109\/TCYB.2021.3107679","article-title":"Joint learning of feature extraction and clustering for large-scale temporal networks","volume":"53","author":"Li","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Chen, Y., Feng, L., Zheng, C., Zhou, T., Liu, L., Liu, P., and Chen, Y. (2023). LDANet: Automatic lung parenchyma segmentation from CT images. Comput. Biol. Med., 155.","DOI":"10.1016\/j.compbiomed.2023.106659"},{"key":"ref_63","first-page":"1447","article-title":"A Hybrid GAN-CNN Network with Attention Mechanism for Detecting Fake Profile Images in Microblogs","volume":"30","year":"2025","journal-title":"Ing. Des Syst. D\u2019Information"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/12\/298\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:33:35Z","timestamp":1763746415000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/12\/298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":63,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["bdcc9120298"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9120298","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]}}}