2018
DOI: 10.1186/s40537-018-0147-2
|View full text |Cite
|
Sign up to set email alerts
|

TSim: a system for discovering similar users on Twitter

Abstract: Lately, social networks have become a vital part of our lives. Among many different uses, most people use social networks to communicate and stay informed. Twitter, a microblogging site, is currently one of the most popular social network sites. Users follow different accounts such as friends, celebrities, or companies to get information through 280 character messages (or tweets). There are currently 1.3 billion registered users on Twitter with 330 million of them active users generating 500 million tweets dai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Unlike direct tweets, here the contacts and the com-munication elements of the users were examined, to deduce the chosen political party from similar users. The connections analyzed in our work are described below [62].…”
Section: Homophily Detectionmentioning
confidence: 99%
“…Unlike direct tweets, here the contacts and the com-munication elements of the users were examined, to deduce the chosen political party from similar users. The connections analyzed in our work are described below [62].…”
Section: Homophily Detectionmentioning
confidence: 99%
“…This paper [9] identifies the similar users for the purpose of profiling users with respect to social and security purposes. Seven attributes are used to profile users such as retweets, favourite and common hash tags, common interest, profile similarly following and followers.…”
Section: Related Workmentioning
confidence: 99%
“…Creating unique content or running every single account separately to hide the similarity among the group would greatly increase the costs and time to administer these accounts; therefore, researchers have suggested several systems and strategies expose various types of malicious accounts at the campaign level. For instance, a study [14] proposed examining the social graph between users and pages to reveal Fake-Likes campaigns on Facebook, and several studies have used the synchronized behavior and timing of social spammers' fraud activities, fake Twitter followers, and malicious retweeter groups to expose their accounts on Twitter [15], [16], [17], [18], [19]. Besides, a variety of analysis studies have been carried out to understand the various aspects of social spammers.…”
Section: A Malicious Campaign Studiesmentioning
confidence: 99%