2020
DOI: 10.3233/jifs-182895
|View full text |Cite
|
Sign up to set email alerts
|

A socialbots analysis-driven graph-based approach for identifying coordinated campaigns in twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Examples of valid options are the cosine similarity between user feature vectors encoding account profile characteristics, as done in (Fazil and Abulaish 2020), or the Jaccard similarity between the sets of hashtags used by each user, or between the sets of followings or retweeted accounts.…”
Section: Methods Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Examples of valid options are the cosine similarity between user feature vectors encoding account profile characteristics, as done in (Fazil and Abulaish 2020), or the Jaccard similarity between the sets of hashtags used by each user, or between the sets of followings or retweeted accounts.…”
Section: Methods Overviewmentioning
confidence: 99%
“…In addition, they also develop an astroturfing detection methodology based on the previously identified coordination patterns. In (Fazil and Abulaish 2020) is proposed a multi-attributed graph-based approach for detecting CIB in Twitter. Authors model each user with a 6-dimensional feature vector, compute pairwise similarities obtaining a user-similarity graph and finally ap-ply Markov clustering, labeling the resulting clusters as inauthentic coordinated groups.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Here, challenges include the limited availability of data itself, missing or ambiguous ground truth and the obsolescence of existing datasets that hardly cope with the rapid evolution of malicious accounts. To this regard, continuous data-sharing initiatives such as that of Twitter for accounts involved in information operations 12 , are extremely welcome as they can enable the next wave of research on these issues. Then, we should also devise additional ways for creating a broad array of diverse adversarial examples.…”
Section: Open Challenges and The Way Aheadmentioning
confidence: 99%