{"id":"https://openalex.org/W4403278449","doi":"https://doi.org/10.1109/is61756.2024.10705170","title":"Multiple Inputs and Hybrid Deep Learning Model to Identify Suspicious Posts on Social Media","display_name":"Multiple Inputs and Hybrid Deep Learning Model to Identify Suspicious Posts on Social Media","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4403278449","doi":"https://doi.org/10.1109/is61756.2024.10705170"},"language":"en","primary_location":{"id":"doi:10.1109/is61756.2024.10705170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is61756.2024.10705170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053747503","display_name":"Bandar Alotaibi","orcid":"https://orcid.org/0000-0001-9956-2027"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Bandar Alotaibi","raw_affiliation_strings":["University of Tabuk,Department of Information Technology,Tabuk,Saudi Arabia,47731"],"affiliations":[{"raw_affiliation_string":"University of Tabuk,Department of Information Technology,Tabuk,Saudi Arabia,47731","institution_ids":["https://openalex.org/I72264486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5053747503"],"corresponding_institution_ids":["https://openalex.org/I72264486"],"apc_list":null,"apc_paid":null,"fwci":1.1681,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83983735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7248727083206177},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.627126932144165},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5258137583732605},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5082830786705017},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32455939054489136},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2228153944015503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248727083206177},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.627126932144165},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5258137583732605},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5082830786705017},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32455939054489136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2228153944015503}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/is61756.2024.10705170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is61756.2024.10705170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2110543567","https://openalex.org/W2250539671","https://openalex.org/W2297444916","https://openalex.org/W2465152470","https://openalex.org/W2792245367","https://openalex.org/W2961827104","https://openalex.org/W2963624952","https://openalex.org/W3034238904","https://openalex.org/W3123933050","https://openalex.org/W3129453524","https://openalex.org/W3183161182","https://openalex.org/W3217696222","https://openalex.org/W4210494767","https://openalex.org/W4293417205","https://openalex.org/W4313563649","https://openalex.org/W4324268339","https://openalex.org/W4385516995","https://openalex.org/W4387682197","https://openalex.org/W4389888491","https://openalex.org/W4391241488"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4321369474","https://openalex.org/W4360585206","https://openalex.org/W4285208911","https://openalex.org/W3046775127"],"abstract_inverted_index":{"With":[0],"the":[1,8,53,58,71,116,124,149,152],"rise":[2],"of":[3,11,27,57,118,126,151],"social":[4,48],"media":[5,49],"platforms":[6],"and":[7,55,132,167,173],"vast":[9],"amount":[10],"text":[12,18,54,94,119,136],"content":[13,46],"generated":[14],"on":[15,47],"these":[16],"platforms,":[17],"data":[19,120,137,166],"forensics":[20,121,138],"has":[21,183],"emerged":[22],"as":[23,89,98],"a":[24,65,78],"new":[25],"area":[26],"research":[28,111],"that":[29,101],"aims":[30,41],"to":[31,42,69,85,104,115,147,163],"identify":[32,43],"suspicious":[33,128],"activities":[34,106],"by":[35,50,122],"analyzing":[36],"textual":[37,165],"content.":[38],"This":[39,110],"study":[40],"potentially":[44],"harmful":[45],"examining":[51],"both":[52],"metadata":[56,61],"posts.":[59],"The":[60,155,181],"is":[62,83,108],"fed":[63],"into":[64],"feature":[66],"selection":[67],"method":[68],"select":[70],"most":[72],"beneficial":[73],"features.":[74],"Using":[75],"multiple":[76],"inputs,":[77],"hybrid":[79,168],"deep":[80,174],"learning":[81],"framework":[82,157,182],"proposed":[84,153,156],"classify":[86],"Twitter":[87],"posts":[88],"normal":[90],"or":[91,107],"suspicious.":[92],"Suspicious":[93],"can":[95],"be":[96],"defined":[97],"any":[99],"post":[100],"appears":[102],"related":[103],"criminal":[105],"unusual.":[109],"would":[112],"significantly":[113],"contribute":[114],"field":[117],"enhancing":[123],"identification":[125],"such":[127],"texts.":[129],"A":[130],"comprehensive":[131],"recent":[133],"dataset":[134],"for":[135,179],"called":[139],"CIC":[140],"Truth":[141],"Seeker":[142],"Dataset":[143],"2023":[144],"was":[145],"used":[146],"assess":[148],"effectiveness":[150],"framework.":[154],"uses":[158],"long":[159],"short-term":[160],"memory":[161],"(LSTM)":[162],"process":[164],"residual":[169],"neural":[170,175],"network":[171,176],"(ResNet)":[172],"(DNN)":[177],"layers":[178],"metadata.":[180],"shown":[184],"promising":[185],"results":[186],"during":[187],"its":[188],"preliminary":[189],"evaluations.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
