2019
DOI: 10.1109/access.2019.2900474
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Identification Technology for Online News Comment Spammers in Internet Media

Abstract: With the development of mobile Internet, it is changing the way we communicate with others. Internet media have gradually become the main mobile crowdsourcing applications for information dissemination and user communication, including online news and social networks. However, the potential business opportunities have stimulated the emergence of a large number of spammers, who release false speech, advertisements, pornographic contents, and phishing websites on the media to gain commercial benefits, which seri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…Si et al [16] introduced a new label propagation algorithm (LPA) identification technology for online news comment spammers. e LPA is mainly used here to identify users' behaviors over comments and replays.…”
Section: Related Workmentioning
confidence: 99%
“…Si et al [16] introduced a new label propagation algorithm (LPA) identification technology for online news comment spammers. e LPA is mainly used here to identify users' behaviors over comments and replays.…”
Section: Related Workmentioning
confidence: 99%
“…Semi-structured data represented by HTML, XML tags are extracted by Object Exchange Model (OEM) and XML tags, email contents are derived under top-down extraction method during real-time applications running time [17]. A specific language is used to retrieve the facts from the data repository is Web Data Extraction languages [18].…”
Section: Denotes the Approaches Used In Web Miningmentioning
confidence: 99%
“…Si et al [18] proposed a method to find the large number of spammers who release the wrong data from the network and phishing websites. Spammers are used to removing pornographic contents and unwanted speech from the whole database warehouse.…”
Section: Literature Surveymentioning
confidence: 99%
“…After the network is restored, the response between the cooperative users is normal, and the cooperative information of the network congestion may be transmitted to the different cooperative computers or lost. The result may be inconsistent owing to the lag of the response, resulting in inconsistent computer collaboration among the collaborative users [38].…”
Section: Some Problems Of Graphics Collaborative Editingmentioning
confidence: 99%