2021 International Conference on Military Communication and Information Systems (ICMCIS) 2021
DOI: 10.1109/icmcis52405.2021.9486423
|View full text |Cite
|
Sign up to set email alerts
|

Finding a line between trusted and untrusted information on tweets through sequence classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…However, certain features were good candidates for differentiating trusted and untrusted users such as high R hind (u i ), L hind (u i ), Inf (u i ), Sen s (u i ), T wt cr (u i ), R s (u i ). In Table 3, the features marked with * were used for classification in the existing literature [3], [58], [61] while the features marked with ∩ were based on the correlation among the features. The impact of the individual feature is shown in Figure 3.…”
Section: Active Learning and ML Modelsmentioning
confidence: 99%
“…However, certain features were good candidates for differentiating trusted and untrusted users such as high R hind (u i ), L hind (u i ), Inf (u i ), Sen s (u i ), T wt cr (u i ), R s (u i ). In Table 3, the features marked with * were used for classification in the existing literature [3], [58], [61] while the features marked with ∩ were based on the correlation among the features. The impact of the individual feature is shown in Figure 3.…”
Section: Active Learning and ML Modelsmentioning
confidence: 99%
“…There are various ways for X user classification such as using Machine Learning (ML) [6], and Natural Language Processing (NLP) [7]. Among these, ML models have been widely used in various research to classify X users into different categories based on their profiles, activity, and content of the tweets.…”
Section: Introductionmentioning
confidence: 99%