Al-Thelaya et al., 2020 - Google Patents
Social networks spam detection using graph-based features analysis and sequence of interactions between usersAl-Thelaya et al., 2020
- Document ID
- 2033294542341692180
- Author
- Al-Thelaya K
- Al-Nethary T
- Ramadan E
- Publication year
- Publication venue
- 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)
External Links
Snippet
The growing interest in the different social network platforms leads to huge number of interactions between different users all around the globe. These unlimited interactions provide a suitable environment for spammers to spread as the complexity of the social …
- 230000003993 interaction 0 title abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
- G06N3/082—Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | GCAN: Graph-aware co-attention networks for explainable fake news detection on social media | |
Chen et al. | Multi-view learning with distinguishable feature fusion for rumor detection | |
Shamantha et al. | Sentiment analysis using machine learning classifiers: evaluation of performance | |
Raisi et al. | Weakly supervised cyberbullying detection using co-trained ensembles of embedding models | |
Kanakaraddi et al. | Comparison study of sentiment analysis of tweets using various machine learning algorithms | |
Akinyemi et al. | An improved classification model for fake news detection in social media | |
Golam Mostafa et al. | Investigation of different machine learning algorithms to determine human sentiment using Twitter data | |
Manimaran et al. | A comprehensive novel model for network speech anomaly detection system using deep learning approach | |
Wu et al. | Graphbert: Bridging graph and text for malicious behavior detection on social media | |
Al-Thelaya et al. | Social networks spam detection using graph-based features analysis and sequence of interactions between users | |
Chadha et al. | Performance evaluation of learning models for identification of suicidal thoughts | |
Gautam et al. | A review on cyberstalking detection using machine learning techniques: Current trends and future direction | |
Pellicani et al. | SAIRUS: Spatially-aware identification of risky users in social networks | |
Najee-Ullah et al. | Towards detection of ai-generated texts and misinformation | |
Singh et al. | Rumour veracity estimation with deep learning for Twitter | |
Ferhat Hamida et al. | Fake news detection methods: A survey and new perspectives | |
Nguyen et al. | Supervised learning models for social bot detection: Literature review and benchmark | |
Iqbal et al. | Artificial intelligence and digital forensics | |
Alqhtani et al. | Data mining approach for classifying twitter’s users | |
Sarvmaili et al. | A Modularized Framework for Explaining Black Box Classifiers for Text Data. | |
Vyrodov et al. | Detecting of Anti-Ukrainian Trolling Tweets | |
Nanduri et al. | Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN's). | |
Islam et al. | Approach to Social Media Cyberbullying and Harassment Detection Using Advanced Machine Learning | |
Elizabeth et al. | Cellular Automata Enhanced Machine Learning Model for Toxic Text Classification | |
Román et al. | A review of techniques for detecting illicit messages on twitter |