Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
DOI: 10.1145/3297280.3297486
|View full text |Cite
|
Sign up to set email alerts
|

Identification of credulous users on Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(25 citation statements)
references
References 33 publications
0
25
0
Order By: Relevance
“…Moreover, some of these datasets were already used to train and evaluate the so-called Botometer (formerly BotOrNot) service proposed by [12]. However, as authors described in [7], [28], the generation of bot accounts continuously changes over time and additionally, some of the provided accounts have been already suspended by Twitter. Thus, a preprocessing is needed to improve the usability of this large collection of datasets by removing the identifiers those accounts that were already removed by Twitter.…”
Section: ) Dataset Generationmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, some of these datasets were already used to train and evaluate the so-called Botometer (formerly BotOrNot) service proposed by [12]. However, as authors described in [7], [28], the generation of bot accounts continuously changes over time and additionally, some of the provided accounts have been already suspended by Twitter. Thus, a preprocessing is needed to improve the usability of this large collection of datasets by removing the identifiers those accounts that were already removed by Twitter.…”
Section: ) Dataset Generationmentioning
confidence: 99%
“…[11] model. In previous related studies [7], [12], [13], [20], the proposed solutions had two main constraints: 1) either they were metadata-oriented approaches so that, the text-based features were extracted at a semantic-level in terms of Natural Language Processing, or 2) they employed more advanced NLP procedures based on N-grams or DL solutions but they only supported a limited number of languages when performing the analysis. However, our proposal addresses the aforementioned constraints by combining relevant metadata features along with powerful models capable of transforming text-based features into vectors independently of the language of the input text.…”
Section: Political-bots-2019mentioning
confidence: 99%
See 1 more Smart Citation
“…Balestrucci et al [7] investigated the relationship between bots and legitimate human accounts. The authors sought to detect credulous accounts on Twitter starting with those involved in any social relationship with a bot, and proposed an approach to automatically rank them based on their gullibility.…”
Section: Sockpuppet Detectionmentioning
confidence: 99%
“…In a previous work [3], the authors shed light on so called credulous Twitter users assuming, with a harmless abuse of language, that they refer to humanoperated accounts with a high percentage of bots as friends. Unlike [3], where the authors performed an analysis involving the friends of a set of human-operated accounts -a highly time consuming task -here we design and develop a classifier to find out credulous Twitter users, by considering a number of features that do not take the friendship with bots into account. Starting by considering a set of features commonly employed in the literature to detect bots [26,10], we end up with a lightweight classifier, in terms of costs for gathering the data needed for the feature engineering phase.…”
Section: Introductionmentioning
confidence: 99%