{"id":"https://openalex.org/W2898610665","doi":"https://doi.org/10.1109/asonam.2018.8508654","title":"CADET: A Multi-View Learning Framework for Compromised Account Detection on Twitter","display_name":"CADET: A Multi-View Learning Framework for Compromised Account Detection on Twitter","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2898610665","doi":"https://doi.org/10.1109/asonam.2018.8508654","mag":"2898610665"},"language":"en","primary_location":{"id":"doi:10.1109/asonam.2018.8508654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2018.8508654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027134824","display_name":"Courtland VanDam","orcid":"https://orcid.org/0000-0003-0027-4151"},"institutions":[{"id":"https://openalex.org/I4210111179","display_name":"Michigan United","ror":"https://ror.org/0291ys696","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111179"]},{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Courtland VanDam","raw_affiliation_strings":["Computer Science and Enginering, Michigan State University, Michigan, United States"],"affiliations":[{"raw_affiliation_string":"Computer Science and Enginering, Michigan State University, Michigan, United States","institution_ids":["https://openalex.org/I87216513","https://openalex.org/I4210111179"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071546444","display_name":"Pang\u2010Ning Tan","orcid":"https://orcid.org/0000-0003-3205-0339"},"institutions":[{"id":"https://openalex.org/I4210111179","display_name":"Michigan United","ror":"https://ror.org/0291ys696","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111179"]},{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pang-Ning Tan","raw_affiliation_strings":["Computer Science and Enginering, Michigan State University, Michigan, United States"],"affiliations":[{"raw_affiliation_string":"Computer Science and Enginering, Michigan State University, Michigan, United States","institution_ids":["https://openalex.org/I87216513","https://openalex.org/I4210111179"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040639891","display_name":"Jiliang Tang","orcid":"https://orcid.org/0000-0001-7125-3898"},"institutions":[{"id":"https://openalex.org/I4210111179","display_name":"Michigan United","ror":"https://ror.org/0291ys696","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111179"]},{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiliang Tang","raw_affiliation_strings":["Computer Science and Enginering, Michigan State University, Michigan, United States"],"affiliations":[{"raw_affiliation_string":"Computer Science and Enginering, Michigan State University, Michigan, United States","institution_ids":["https://openalex.org/I87216513","https://openalex.org/I4210111179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090855504","display_name":"Hamid Reza Karimi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111179","display_name":"Michigan United","ror":"https://ror.org/0291ys696","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111179"]},{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamid Karimi","raw_affiliation_strings":["Computer Science and Enginering, Michigan State University, Michigan, United States"],"affiliations":[{"raw_affiliation_string":"Computer Science and Enginering, Michigan State University, Michigan, United States","institution_ids":["https://openalex.org/I87216513","https://openalex.org/I4210111179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027134824"],"corresponding_institution_ids":["https://openalex.org/I4210111179","https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":3.5342,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.94164897,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"471","last_page":"478"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cadet","display_name":"Cadet","score":0.9043987989425659},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8458819389343262},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7697497606277466},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6705130338668823},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6143137812614441},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5618513822555542},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4863186776638031},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4819783568382263},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4782944321632385},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.46168676018714905},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.44972068071365356},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4418475031852722},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3595086336135864},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32138535380363464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3174862265586853},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3056681752204895}],"concepts":[{"id":"https://openalex.org/C2777522355","wikidata":"https://www.wikidata.org/wiki/Q316498","display_name":"Cadet","level":2,"score":0.9043987989425659},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8458819389343262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7697497606277466},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6705130338668823},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6143137812614441},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5618513822555542},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4863186776638031},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4819783568382263},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4782944321632385},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.46168676018714905},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.44972068071365356},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4418475031852722},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3595086336135864},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32138535380363464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3174862265586853},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3056681752204895},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asonam.2018.8508654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2018.8508654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W203516808","https://openalex.org/W560371024","https://openalex.org/W2047537658","https://openalex.org/W2119383590","https://openalex.org/W2132903355","https://openalex.org/W2155743899","https://openalex.org/W2218242280","https://openalex.org/W2397135192","https://openalex.org/W2615697402","https://openalex.org/W2743269056","https://openalex.org/W6608217792","https://openalex.org/W6615500831","https://openalex.org/W6678285956","https://openalex.org/W6688513127","https://openalex.org/W6711907643"],"related_works":["https://openalex.org/W3091418875","https://openalex.org/W2973544587","https://openalex.org/W2356727871","https://openalex.org/W4238963770","https://openalex.org/W4317037113","https://openalex.org/W4381659477","https://openalex.org/W2790827479","https://openalex.org/W4297381517","https://openalex.org/W4230392039","https://openalex.org/W2401035105"],"abstract_inverted_index":{"Social":[0],"media":[1,29],"has":[2],"become":[3],"a":[4,43,67,100,136],"valuable":[5],"tool":[6],"for":[7],"hackers":[8,53],"to":[9,23,75,128,135],"disseminate":[10],"misleading":[11],"content":[12],"through":[13],"compromised":[14,17,47],"accounts.":[15],"Detecting":[16],"accounts,":[18],"however,":[19],"is":[20],"challenging":[21],"due":[22],"the":[24,32,77,85,96,116,123],"noisy":[25],"nature":[26],"of":[27,46,52,125],"social":[28],"posts":[30],"and":[31,90,93],"difficulty":[33],"in":[34,115],"acquiring":[35],"sufficient":[36],"labeled":[37],"data":[38],"that":[39,71],"can":[40],"effectively":[41],"capture":[42],"wide":[44],"variety":[45],"tweets":[48],"from":[49,80],"different":[50],"types":[51],"(spammers,":[54],"vandals,":[55],"cybercriminals,":[56],"revenge":[57],"hackers,":[58],"etc).":[59],"To":[60],"address":[61],"these":[62],"challenges,":[63],"this":[64],"proposal":[65],"presents":[66],"multiview":[68],"learning":[69],"framework":[70],"employs":[72],"nonlinear":[73],"autoencoders":[74],"learn":[76],"feature":[78,103],"embedding":[79],"multiple":[81],"views,":[82],"such":[83],"as":[84],"tweets'":[86],"content,":[87],"source,":[88],"location,":[89],"timing":[91],"information":[92],"then":[94],"projects":[95],"embedded":[97],"features":[98],"into":[99],"common":[101],"lower-rank":[102],"representation.":[104],"Suspicious":[105],"user":[106],"accounts":[107],"are":[108],"detected":[109],"based":[110],"on":[111],"their":[112],"reconstruction":[113],"errors":[114],"shared":[117],"subspace.":[118],"Our":[119],"empirical":[120],"results":[121],"show":[122],"superiority":[124],"CADET":[126],"compared":[127],"several":[129],"existing":[130],"representative":[131],"approaches":[132],"when":[133],"applied":[134],"realworld":[137],"Twitter":[138],"dataset.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-22T13:39:03.778224","created_date":"2025-10-10T00:00:00"}
