{"id":"https://openalex.org/W2902936325","doi":"https://doi.org/10.1109/snams.2018.8554898","title":"Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter","display_name":"Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2902936325","doi":"https://doi.org/10.1109/snams.2018.8554898","mag":"2902936325"},"language":"en","primary_location":{"id":"doi:10.1109/snams.2018.8554898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams.2018.8554898","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1812.06156","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110359832","display_name":"\u00c1lvaro Garc\u00eda-Recuero","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alvaro Garcia-Recuero","raw_affiliation_strings":["ATOS Research, Privacy Lab, Spain"],"affiliations":[{"raw_affiliation_string":"ATOS Research, Privacy Lab, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057703642","display_name":"Aneta Morawin","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210133778","display_name":"Centre Inria de l'Universit\u00e9 de Rennes","ror":"https://ror.org/04040yw90","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Aneta Morawin","raw_affiliation_strings":["INRIA, Rennes, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Rennes, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023313904","display_name":"Gareth Tyson","orcid":"https://orcid.org/0000-0003-3010-791X"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gareth Tyson","raw_affiliation_strings":["Queen Mary University of London"],"affiliations":[{"raw_affiliation_string":"Queen Mary University of London","institution_ids":["https://openalex.org/I166337079"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110359832"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6447,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89078747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7493988275527954},{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.7033190727233887},{"id":"https://openalex.org/keywords/jaccard-index","display_name":"Jaccard index","score":0.6146851778030396},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.608368456363678},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5794894099235535},{"id":"https://openalex.org/keywords/misinformation","display_name":"Misinformation","score":0.5626696348190308},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5359872579574585},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5026249885559082},{"id":"https://openalex.org/keywords/web-crawler","display_name":"Web crawler","score":0.45022034645080566},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.42917609214782715},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.42633816599845886},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4160974323749542},{"id":"https://openalex.org/keywords/microblogging","display_name":"Microblogging","score":0.4108375310897827},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4057062268257141},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3659515678882599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3112156391143799},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24601414799690247},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.1775922179222107},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.14236900210380554}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7493988275527954},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.7033190727233887},{"id":"https://openalex.org/C203519979","wikidata":"https://www.wikidata.org/wiki/Q865360","display_name":"Jaccard index","level":3,"score":0.6146851778030396},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.608368456363678},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5794894099235535},{"id":"https://openalex.org/C2776990098","wikidata":"https://www.wikidata.org/wiki/Q13579947","display_name":"Misinformation","level":2,"score":0.5626696348190308},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5359872579574585},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5026249885559082},{"id":"https://openalex.org/C13743948","wikidata":"https://www.wikidata.org/wiki/Q45842","display_name":"Web crawler","level":2,"score":0.45022034645080566},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.42917609214782715},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.42633816599845886},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4160974323749542},{"id":"https://openalex.org/C143275388","wikidata":"https://www.wikidata.org/wiki/Q92438","display_name":"Microblogging","level":3,"score":0.4108375310897827},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4057062268257141},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3659515678882599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3112156391143799},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24601414799690247},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.1775922179222107},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.14236900210380554},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/snams.2018.8554898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams.2018.8554898","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1812.06156","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1812.06156","pdf_url":"https://arxiv.org/pdf/1812.06156","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-161754","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-161754","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1812.06156","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1812.06156","pdf_url":"https://arxiv.org/pdf/1812.06156","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W49973572","https://openalex.org/W84853486","https://openalex.org/W112197792","https://openalex.org/W1071251684","https://openalex.org/W1546721273","https://openalex.org/W1814023381","https://openalex.org/W1904898195","https://openalex.org/W1974209382","https://openalex.org/W1992685726","https://openalex.org/W2029553347","https://openalex.org/W2029749307","https://openalex.org/W2090212887","https://openalex.org/W2101196063","https://openalex.org/W2149490731","https://openalex.org/W2156836300","https://openalex.org/W2168508162","https://openalex.org/W2171468534","https://openalex.org/W2340954483","https://openalex.org/W2341275906","https://openalex.org/W2517796890","https://openalex.org/W2951392332","https://openalex.org/W6638399519","https://openalex.org/W6639959072","https://openalex.org/W6657943608","https://openalex.org/W6684716366"],"related_works":["https://openalex.org/W4254879869","https://openalex.org/W3022576529","https://openalex.org/W2628526247","https://openalex.org/W2596401011","https://openalex.org/W2913569734","https://openalex.org/W2702570413","https://openalex.org/W3127229356","https://openalex.org/W2901284887","https://openalex.org/W2089702591","https://openalex.org/W2304841839"],"abstract_inverted_index":{"As":[0],"of":[1,12,28,34,67,98,102,116,150,170,194,202],"today":[2],"abuse":[3,68,217],"is":[4,138],"a":[5,29,63,79,88,113,184,212],"pressing":[6],"issue":[7],"to":[8,36,85,157,187,209,215],"participants":[9,51],"and":[10,40,61,77,147],"administrators":[11],"Online":[13],"Social":[14],"Networks":[15],"(OSN).":[16],"Abuse":[17],"in":[18,59,108,161,197,218],"Twitter":[19,73,93],"can":[20,166],"spawn":[21],"from":[22,71,91,140],"arguments":[23],"generated":[24],"for":[25],"influencing":[26],"outcomes":[27],"political":[30],"election,":[31],"the":[32,54,57,72,92,96,100,109,132,136,141,145,148,168,174,180,189,200,207],"use":[33,84],"bots":[35],"automatically":[37],"spread":[38],"misinformation,":[39],"generally":[41],"speaking,":[42],"activities":[43],"that":[44,82],"deny,":[45],"disrupt,":[46],"degrade":[47],"or":[48,53,191],"deceive":[49],"other":[50],"and,":[52],"network.":[55,175],"Given":[56],"difficulty":[58],"finding":[60],"accessing":[62],"large":[64],"enough":[65],"sample":[66],"ground":[69],"truth":[70],"platform,":[74],"we":[75,83,178,205],"built":[76],"deployed":[78],"custom":[80],"crawler":[81],"judiciously":[86],"collect":[87],"new":[89],"dataset":[90],"platform":[94],"with":[95],"aim":[97],"characterizing":[99],"nature":[101,193],"abusive":[103,106],"users,":[104],"a.k.a":[105],"\u201cbirds\u201d,":[107],"wild.":[110],"We":[111],"provide":[112],"comprehensive":[114],"set":[115],"features":[117,154,165],"based":[118],"on":[119],"users'":[120],"attributes,":[121],"as":[122,124,183],"well":[123],"social-graph":[125],"metadata.":[126],"The":[127],"former":[128],"includes":[129],"metadata":[130],"about":[131],"account":[133],"itself,":[134],"while":[135,163],"latter":[137],"computed":[139],"social":[142],"graph":[143],"among":[144],"sender":[146],"receiver":[149],"each":[151],"message.":[152],"Attribute-based":[153],"are":[155,206],"useful":[156],"characterize":[158,216],"user's":[159],"accounts":[160],"OSN,":[162],"graph-based":[164],"reveal":[167,188],"dynamics":[169],"information":[171],"dissemination":[172],"across":[173],"In":[176],"particular,":[177],"derive":[179],"Jaccard":[181],"index":[182],"key":[185],"feature":[186],"benign":[190],"malicious":[192],"directed":[195],"messages":[196],"Twitter.":[198,219],"To":[199],"best":[201],"our":[203],"knowledge,":[204],"first":[208],"propose":[210],"such":[211],"similarity":[213],"metric":[214]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-05T06:14:27.290980","created_date":"2020-11-23T00:00:00"}
