{"id":"https://openalex.org/W3094049489","doi":"https://doi.org/10.1109/icccnt49239.2020.9225321","title":"CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection","display_name":"CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094049489","doi":"https://doi.org/10.1109/icccnt49239.2020.9225321","mag":"3094049489"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038404555","display_name":"E. Elakkiya","orcid":"https://orcid.org/0000-0001-6175-762X"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"E. Elakkiya","raw_affiliation_strings":["National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100638043","display_name":"S. Selvakumar","orcid":"https://orcid.org/0000-0002-4900-4745"},"institutions":[{"id":"https://openalex.org/I4210127244","display_name":"Indian Institute of Information Technology Una","ror":"https://ror.org/02z8z1589","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127244"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Selvakumar","raw_affiliation_strings":["IIIT Una, Himachal Pradesh"],"affiliations":[{"raw_affiliation_string":"IIIT Una, Himachal Pradesh","institution_ids":["https://openalex.org/I4210127244"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020764369","display_name":"R. Leela Velusamy","orcid":"https://orcid.org/0000-0002-3418-9927"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Leela Velusamy","raw_affiliation_strings":["National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038404555"],"corresponding_institution_ids":["https://openalex.org/I122964287"],"apc_list":null,"apc_paid":null,"fwci":1.8684,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.894446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.8467220067977905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7848114967346191},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7508864402770996},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5894638895988464},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5576410889625549},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5022811889648438},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.47542694211006165},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.46748822927474976},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4556984007358551},{"id":"https://openalex.org/keywords/microblogging","display_name":"Microblogging","score":0.43469634652137756},{"id":"https://openalex.org/keywords/firefly-algorithm","display_name":"Firefly algorithm","score":0.4310705065727234},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42273271083831787},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.42053475975990295},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.39604854583740234},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2650394141674042},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16417750716209412}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.8467220067977905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7848114967346191},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7508864402770996},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5894638895988464},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5576410889625549},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5022811889648438},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.47542694211006165},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.46748822927474976},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4556984007358551},{"id":"https://openalex.org/C143275388","wikidata":"https://www.wikidata.org/wiki/Q92438","display_name":"Microblogging","level":3,"score":0.43469634652137756},{"id":"https://openalex.org/C154982244","wikidata":"https://www.wikidata.org/wiki/Q5451844","display_name":"Firefly algorithm","level":3,"score":0.4310705065727234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42273271083831787},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.42053475975990295},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.39604854583740234},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2650394141674042},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16417750716209412},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137},{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W9223698","https://openalex.org/W1523741643","https://openalex.org/W1583145088","https://openalex.org/W2008794359","https://openalex.org/W2050431484","https://openalex.org/W2099111195","https://openalex.org/W2143043751","https://openalex.org/W2148633389","https://openalex.org/W2149454242","https://openalex.org/W2154053567","https://openalex.org/W2210387432","https://openalex.org/W2264629467","https://openalex.org/W2295464403","https://openalex.org/W2570565373","https://openalex.org/W2782356391","https://openalex.org/W2955396085","https://openalex.org/W2995334612","https://openalex.org/W2997674406","https://openalex.org/W2998216295","https://openalex.org/W3016471134","https://openalex.org/W3037316620","https://openalex.org/W4285719527","https://openalex.org/W6682496738","https://openalex.org/W6771815560","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W1987732684","https://openalex.org/W2286465138","https://openalex.org/W637393809","https://openalex.org/W146417747","https://openalex.org/W2064237629","https://openalex.org/W2008664567","https://openalex.org/W3122659889","https://openalex.org/W2120116197","https://openalex.org/W159653547","https://openalex.org/W3094514835"],"abstract_inverted_index":{"Social":[0],"network":[1],"sites":[2],"such":[3],"as":[4,83,173],"Facebook,":[5],"Twitter,":[6],"YouTube,":[7],"etc.,":[8],"are":[9,135],"very":[10],"popular":[11],"among":[12],"internet":[13],"users":[14,47],"for":[15,59,120,152,162,241],"information":[16,39,78,99,112,119,129,187,197],"sharing":[17],"and":[18,48,225,238],"communication.":[19],"This":[20,74,124],"popularity":[21],"also":[22],"attracts":[23],"cybercriminals":[24],"to":[25,127,158,184,195,220],"spread":[26],"their":[27],"malicious":[28,41],"activities":[29],"including":[30],"spams":[31],"using":[32,169],"social":[33],"networks.":[34],"Spam":[35,153],"may":[36,44,125,139],"contain":[37,110,117],"unsolicited":[38],"or":[40],"links":[42],"that":[43,68,90,109,116,134,165,211],"harm":[45],"Twitter":[46],"make":[49],"them":[50],"feel":[51],"insecure.":[52],"So":[53],"there":[54],"is":[55,75,156,179],"a":[56],"crucial":[57],"need":[58],"effective":[60],"spam":[61,218],"detection":[62,154],"which":[63],"requires":[64],"the":[65,71,87,92,97,107,122,128,132,163,174,186,190,196,204,212,221,229,242],"distinctive":[66],"features":[67,89,108,115,133,164],"clearly":[69],"portray":[70],"spammer":[72],"behavior.":[73],"accomplished":[76],"by":[77],"theoretic-based":[79],"feature":[80,101,192,201,223],"selection":[81,102],"methods,":[82],"these":[84],"methods":[85,103],"select":[86],"informative":[88],"retain":[91],"original":[93,222],"meaning.":[94],"Most":[95],"of":[96,234],"existing":[98,230],"theory-based":[100],"focus":[104],"on":[105],"retaining":[106],"more":[111],"while":[113],"removing":[114],"less":[118,137],"improving":[121],"performance.":[123],"lead":[126],"loss.":[130],"Also,":[131],"individually":[136],"significant":[138],"be":[140],"useful":[141],"when":[142],"combined":[143],"with":[144],"other":[145],"features.":[146],"So,":[147],"Community":[148],"Inspired":[149],"Firefly":[150],"Algorithm":[151],"(CIFAS)":[155],"proposed":[157,213],"handle":[159],"combination":[160],"search":[161],"provide":[166],"good":[167],"performance":[168],"fuzzy":[170],"cross":[171],"entropy":[172],"fitness":[175],"function.":[176],"Fuzzy":[177],"cross-entropy":[178],"used":[180],"in":[181,189,199,232],"this":[182],"work,":[183],"preserve":[185],"contained":[188,198],"selected":[191],"subset":[193],"equally":[194],"full":[200],"set.":[202],"From":[203],"experimental":[205],"result,":[206],"it":[207],"has":[208],"been":[209],"proven":[210],"CIFAS":[214],"offers":[215],"defense":[216],"against":[217],"similar":[219],"set":[224],"performs":[226],"better":[227],"than":[228],"approaches":[231],"terms":[233],"accuracy,":[235],"false-positive":[236],"rate,":[237],"F":[239],"measure":[240],"two":[243],"standard":[244],"twitter":[245],"datasets.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-09T23:09:16.995542","created_date":"2025-10-10T00:00:00"}
