2021
DOI: 10.1142/s0129183122500607
|View full text |Cite
|
Sign up to set email alerts
|

A novel hybrid approach of gravitational search algorithm and decision tree for twitter spammer detection

Abstract: With the increasing popularity of online social networking platforms, the amount of social data has grown exponentially. Social data analysis is essential as spamming activities and spammers are escalating over online social networking platforms. This paper focuses on spammer detection on the Twitter social networking platform. Although existing researchers have developed numerous machine learning methods to detect spammers, these methods are inefficient for appropriately detecting spammers on Twitter due to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…In the GSDF approach, the heuristic function η A i ,V j for the attributes A i and values V j is calculated by following the Twoing splitting criteria to attain the best split of the tree. It also retains the maximum homogeneity of the nodes in the tree (Vives et al, 2021). The formula for the evaluation of η A i ,V j is described by Equation (20).…”
Section: Fingerprint Matching Using Proposed Gsdf Approachmentioning
confidence: 99%
“…In the GSDF approach, the heuristic function η A i ,V j for the attributes A i and values V j is calculated by following the Twoing splitting criteria to attain the best split of the tree. It also retains the maximum homogeneity of the nodes in the tree (Vives et al, 2021). The formula for the evaluation of η A i ,V j is described by Equation (20).…”
Section: Fingerprint Matching Using Proposed Gsdf Approachmentioning
confidence: 99%
“…Our DSpamOnto, which includes concepts, relationships, attributes, and examples, was designed using the steps outlined above. A comprehensive investigation of various academic papers and corporate reports was conducted in order to extract the technical terminology required to build the ontology [1,4,[27][28][29][30]. Protégé is used to develop DSpa-mOnto.…”
mentioning
confidence: 99%