2017
DOI: 10.1007/978-3-319-67256-4_40
|View full text |Cite
|
Sign up to set email alerts
|

Hunting Malicious Bots on Twitter: An Unsupervised Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 8 publications
0
6
0
2
Order By: Relevance
“…Building on the previous research, we enhanced our list of URL shorteners, including the most common shorteners among bots (e.g., dlvr.it, dld.bz, viid.me, or ln.is). In the study by Chen et al (2017), which compiled a comprehensive list of this type of shortener, more than 10% of tweets including them would be generated by bots.…”
Section: Content Analysismentioning
confidence: 99%
“…Building on the previous research, we enhanced our list of URL shorteners, including the most common shorteners among bots (e.g., dlvr.it, dld.bz, viid.me, or ln.is). In the study by Chen et al (2017), which compiled a comprehensive list of this type of shortener, more than 10% of tweets including them would be generated by bots.…”
Section: Content Analysismentioning
confidence: 99%
“…erefore, in this paper, the number of likes, comments, and reposts of a post is defined as λ nl , λ nc , and λ nr . (2) e originality of post: Many social bots generate their own posts by reposting or copying other users' posts, and thus the frequency of reposted posts of social bots is higher than that of normal users [46]. In this paper, we use λ or to define the originality of user post, and take 1 when the post is reposted from other users, otherwise, take 0.…”
Section: Semantic Feature Sequencementioning
confidence: 99%
“…Over the years, many methods have been proposed to detect spam based on the content of the email. These methods fall into three main categories: supervised, semi-supervised [8], and unsupervised [9] methods. Supervised methods treat mail detection as a classification task, and supervised methods generally show better performance compared to other methods [10].…”
Section: Related Workmentioning
confidence: 99%