{"id":"https://openalex.org/W3093731462","doi":"https://doi.org/10.1109/asonam49781.2020.9381432","title":"Semantic Text Analysis for Detection of Compromised Accounts on Social Networks","display_name":"Semantic Text Analysis for Detection of Compromised Accounts on Social Networks","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3093731462","doi":"https://doi.org/10.1109/asonam49781.2020.9381432","mag":"3093731462"},"language":"en","primary_location":{"id":"doi:10.1109/asonam49781.2020.9381432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam49781.2020.9381432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1804.07247","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006755170","display_name":"Dominic Seyler","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dominic Seyler","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Urbana-Champaign","***University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"***University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003714505","display_name":"Lunan Li","orcid":"https://orcid.org/0000-0002-5898-1353"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lunan Li","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Urbana-Champaign","[University of Illinois at Urbana-Champaign,Department of Computer Science]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign,Department of Computer Science]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028518494","display_name":"ChengXiang Zhai","orcid":"https://orcid.org/0000-0002-6434-3702"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"ChengXiang Zhai","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Urbana-Champaign","[University of Illinois at Urbana-Champaign,Department of Computer Science]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign,Department of Computer Science]","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006755170"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":0.2781,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67101661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"417","last_page":"424"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8133766651153564},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7804778814315796},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6141822338104248},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5984201431274414},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5325286388397217},{"id":"https://openalex.org/keywords/semantic-analysis","display_name":"Semantic analysis (machine learning)","score":0.47702571749687195},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47177696228027344},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.46054548025131226},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.45587271451950073},{"id":"https://openalex.org/keywords/divergence","display_name":"Divergence (linguistics)","score":0.4449731409549713},{"id":"https://openalex.org/keywords/semantic-computing","display_name":"Semantic computing","score":0.43144312500953674},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4125276207923889},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33711573481559753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2517825961112976},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.09440076351165771},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.08049392700195312}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133766651153564},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7804778814315796},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6141822338104248},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5984201431274414},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5325286388397217},{"id":"https://openalex.org/C2777946921","wikidata":"https://www.wikidata.org/wiki/Q7449044","display_name":"Semantic analysis (machine learning)","level":2,"score":0.47702571749687195},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47177696228027344},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.46054548025131226},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.45587271451950073},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.4449731409549713},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.43144312500953674},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4125276207923889},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33711573481559753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2517825961112976},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.09440076351165771},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.08049392700195312},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/asonam49781.2020.9381432","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam49781.2020.9381432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1804.07247","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.07247","pdf_url":"https://arxiv.org/pdf/1804.07247","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:3093731462","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1804.07247v4","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1804.07247","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1804.07247","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1804.07247","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.07247","pdf_url":"https://arxiv.org/pdf/1804.07247","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3093731462.pdf","grobid_xml":"https://content.openalex.org/works/W3093731462.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1530869392","https://openalex.org/W1892874464","https://openalex.org/W1965555277","https://openalex.org/W2047537658","https://openalex.org/W2056765730","https://openalex.org/W2081769211","https://openalex.org/W2107541186","https://openalex.org/W2112056172","https://openalex.org/W2131744502","https://openalex.org/W2155743899","https://openalex.org/W2165701072","https://openalex.org/W2187846933","https://openalex.org/W2218242280","https://openalex.org/W2230089931","https://openalex.org/W2250539671","https://openalex.org/W2397135192","https://openalex.org/W2460680144","https://openalex.org/W2463592278","https://openalex.org/W2517317079","https://openalex.org/W2591263075","https://openalex.org/W2615697402","https://openalex.org/W2743269056","https://openalex.org/W2757951280","https://openalex.org/W2767350339","https://openalex.org/W2898395483","https://openalex.org/W2898610665","https://openalex.org/W2962783931","https://openalex.org/W2999449913","https://openalex.org/W6679775712","https://openalex.org/W6688513127","https://openalex.org/W6711907643"],"related_works":["https://openalex.org/W2119383590","https://openalex.org/W2258759058","https://openalex.org/W2982330476","https://openalex.org/W2898610665","https://openalex.org/W2978320321","https://openalex.org/W3122894070","https://openalex.org/W2952629394","https://openalex.org/W3149950623","https://openalex.org/W2809732875","https://openalex.org/W2964429385","https://openalex.org/W3152673436","https://openalex.org/W3090515407","https://openalex.org/W2947600905","https://openalex.org/W3000474518","https://openalex.org/W3153115344","https://openalex.org/W3196997278","https://openalex.org/W1961590190","https://openalex.org/W2804316219","https://openalex.org/W2038561156","https://openalex.org/W3151227833"],"abstract_inverted_index":{"Compromised":[0],"accounts":[1,8,38,150],"on":[2,71,151],"social":[3,152],"networks":[4,153],"are":[5],"regular":[6],"user":[7],"that":[9,74,80,87,141],"have":[10],"been":[11],"taken":[12],"over":[13],"by":[14],"an":[15,61,88],"entity":[16],"with":[17],"malicious":[18],"intent.":[19],"Since":[20],"the":[21,24,41,72,85,93,101,126,129,142],"adversary":[22,89],"exploits":[23],"already":[25],"established":[26],"trust":[27],"of":[28,55,103,106,128],"a":[29,48,121,134,155],"compromised":[30,65,149],"account,":[31],"it":[32],"is":[33,69,81,95,145],"crucial":[34],"to":[35,39,63,99,110],"detect":[36,64],"these":[37],"limit":[40],"damage":[42],"they":[43],"can":[44],"cause.":[45],"We":[46,97,124],"propose":[47,98],"novel":[49,112],"general":[50],"framework":[51,68,144],"for":[52,116,147],"semantic":[53,114,118,131],"analysis":[54],"text":[56],"messages":[57],"coming":[58],"out":[59],"from":[60,84],"account":[62,94],"accounts.":[66],"Our":[67],"built":[70],"observation":[73],"normal":[75],"users":[76,107],"will":[77],"use":[78,91,100],"language":[79,86,104,157],"measurably":[82],"different":[83],"would":[90],"when":[92],"compromised.":[96],"difference":[102],"models":[105],"and":[108,154],"adversaries":[109],"define":[111],"interpretable":[113],"features":[115,132],"measuring":[117],"incoherence":[119],"in":[120],"message":[122],"stream.":[123],"study":[125],"effectiveness":[127],"proposed":[130,143],"using":[133],"Twitter":[135],"data":[136],"set.":[137],"Evaluation":[138],"results":[139],"show":[140],"effective":[146],"discovering":[148],"KL-divergence-based":[156],"model":[158],"feature":[159],"works":[160],"best.":[161]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2022-10-02T00:00:00"}
