2018
DOI: 10.1109/access.2018.2877685
|View full text |Cite
|
Sign up to set email alerts
|

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…Nevertheless, quite few researchers have analyzed fake accounts detection as based on a semantic approach and ontology engineering. A novel ontology-based method was proposed to identify dubious content on Twitter during instances or events where tweets are linked to ontologies of specific themes, eventually in order to verify the similarities between tweet texts and ontologies dealing with relevant subjects [17]. A new spam detection algorithm has been presented, called Social Event Detection, and it is based on ontology Multiple steps are introduced, beginning with the creation of the ontology, attribute extraction, the correlation of words to the current class context and ending with the identification of whether it is spam or not [18].…”
Section: Semantic Modelling Approachmentioning
confidence: 99%
“…Nevertheless, quite few researchers have analyzed fake accounts detection as based on a semantic approach and ontology engineering. A novel ontology-based method was proposed to identify dubious content on Twitter during instances or events where tweets are linked to ontologies of specific themes, eventually in order to verify the similarities between tweet texts and ontologies dealing with relevant subjects [17]. A new spam detection algorithm has been presented, called Social Event Detection, and it is based on ontology Multiple steps are introduced, beginning with the creation of the ontology, attribute extraction, the correlation of words to the current class context and ending with the identification of whether it is spam or not [18].…”
Section: Semantic Modelling Approachmentioning
confidence: 99%
“…This means scholars using data obtained via API need to apply caution when drawing inferences from such data. In particular, it has been observed that the source of biases arise from the order connected nodes are returned [23] based on the age of the link created between two nodes and on the fixed time-frames used for selecting the nodes to be included in the sample APIs [41] .…”
Section: Related Workmentioning
confidence: 99%
“…In the present work, we propose a mining platform to help researchers and data collector to mine and directly analyze social networks, defining API-specific and budget-constrained strategies able to filter data collection based on concurrent sampling and ontology-enhanced filtering algorithms [23] . To test our approach we exploited it in creating a content-based recommender system.…”
Section: Introductionmentioning
confidence: 99%
“…This reduces replication and maintains consistency once an ontology is stable, but also means they can be leveraged by other models. For example, [87] generates separate ontologies within an evaluation model to categorise tweets and detect spam.…”
Section: Semantic Modeling Rdf/rdfs and Ontologies A Semantic mentioning
confidence: 99%