{"id":"https://openalex.org/W2530294484","doi":"https://doi.org/10.1109/tdsc.2016.2616879","title":"Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter","display_name":"Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2530294484","doi":"https://doi.org/10.1109/tdsc.2016.2616879","mag":"2530294484"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2616879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2616879","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004447380","display_name":"Muhammad Usman Shahid Khan","orcid":"https://orcid.org/0000-0002-7299-621X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Usman U. S. Khan","raw_affiliation_strings":["Department of Computer Science, COMSATS Institute of Information Technology, Abbottabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS Institute of Information Technology, Abbottabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000409923","display_name":"Mazhar Ali","orcid":"https://orcid.org/0000-0003-2351-6520"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mazhar Ali","raw_affiliation_strings":["Department of Computer Science, COMSATS Institute of Information Technology, Abbottabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS Institute of Information Technology, Abbottabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059175047","display_name":"Assad Abbas","orcid":"https://orcid.org/0000-0002-4233-053X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Assad Abbas","raw_affiliation_strings":["COMSATS Institute of Information Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS Institute of Information Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003909640","display_name":"Samee U. Khan","orcid":"https://orcid.org/0000-0001-5640-4942"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samee Khan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015993565","display_name":"Albert Y. Zomaya","orcid":"https://orcid.org/0000-0002-3090-1059"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Albert Zomaya","raw_affiliation_strings":["School of Information Technologies, The University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technologies, The University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004447380"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":2.9127,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.91348079,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13274","display_name":"Expert finding and Q&A systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7780331373214722},{"id":"https://openalex.org/keywords/hyperlink","display_name":"Hyperlink","score":0.6878689527511597},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6567186713218689},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.636819064617157},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6170557141304016},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5974643230438232},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.42218634486198425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3836967945098877},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.1340675950050354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7780331373214722},{"id":"https://openalex.org/C30088001","wikidata":"https://www.wikidata.org/wiki/Q102014","display_name":"Hyperlink","level":3,"score":0.6878689527511597},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6567186713218689},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.636819064617157},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6170557141304016},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5974643230438232},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.42218634486198425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3836967945098877},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.1340675950050354},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2016.2616879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2616879","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W19838944","https://openalex.org/W146417747","https://openalex.org/W1546647790","https://openalex.org/W1592908051","https://openalex.org/W1815362064","https://openalex.org/W1968133322","https://openalex.org/W2007790744","https://openalex.org/W2012035409","https://openalex.org/W2065602119","https://openalex.org/W2069914810","https://openalex.org/W2088027524","https://openalex.org/W2090182207","https://openalex.org/W2092277251","https://openalex.org/W2136548128","https://openalex.org/W2158270125","https://openalex.org/W2164641162","https://openalex.org/W2194080939","https://openalex.org/W2205158676","https://openalex.org/W2217205176","https://openalex.org/W3142588439","https://openalex.org/W6605889898","https://openalex.org/W6638343385","https://openalex.org/W6687376643"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2384033143","https://openalex.org/W2366569016","https://openalex.org/W2169968158","https://openalex.org/W1999760390","https://openalex.org/W2086877241","https://openalex.org/W2521046503","https://openalex.org/W1989883077","https://openalex.org/W2086028161","https://openalex.org/W1974853862"],"abstract_inverted_index":{"Online":[0],"Social":[1],"Networks":[2],"(OSNs)":[3],"have":[4,14],"not":[5],"only":[6],"significantly":[7],"reformed":[8],"the":[9,32,45,48,59,66,71,79,87,99,115,124,130,149,153,158,169,177,183,186],"social":[10,42,51],"interaction":[11],"pattern":[12],"but":[13],"also":[15,35],"emerged":[16],"as":[17,75,189],"an":[18],"effective":[19],"platform":[20],"for":[21],"recommendation":[22,82,93],"of":[23,31,61,70,81,92,112,133,160,185],"services":[24],"and":[25,64,126,171,195],"products.":[26],"The":[27,89,137,162],"upswing":[28],"in":[29,38,168],"use":[30],"OSNs":[33],"has":[34],"witnessed":[36],"growth":[37],"unwanted":[39],"activities":[40],"on":[41,50,65,155,157],"media.":[43],"On":[44],"one":[46],"hand,":[47],"spammers":[49,125],"media":[52],"can":[53,77,95],"be":[54,96],"a":[55,120,134],"high":[56],"risk":[57],"towards":[58],"security":[60],"legitimate":[62,72],"users":[63,113],"other":[67],"hand":[68],"some":[69],"users,":[73],"such":[74,110],"bloggers":[76,128,151],"pollute":[78],"results":[80,91,181],"systems":[83,94],"that":[84,101,122],"work":[85],"alongside":[86],"OSNs.":[88],"polluted":[90],"precarious":[97],"to":[98,108,147,175,191],"masses":[100],"track":[102],"recommendations.":[103],"Therefore,":[104],"it":[105],"is":[106],"necessary":[107],"segregate":[109],"type":[111],"from":[114,129,152],"genuine":[116,131],"experts.":[117],"We":[118],"propose":[119],"framework":[121],"separates":[123],"unsolicited":[127,150,178],"experts":[132,154],"specific":[135,166],"domain.":[136],"proposed":[138,187],"approach":[139,163],"employs":[140],"modified":[141],"Hyperlink":[142],"Induced":[143],"Topic":[144],"Search":[145],"(HITS)":[146],"separate":[148],"Twitter":[156],"basis":[159],"tweets.":[161],"considers":[164],"domain":[165],"keywords":[167],"tweets":[170],"several":[172,192],"tweet":[173],"characteristics":[174],"identify":[176],"bloggers.":[179],"Experimental":[180],"demonstrate":[182],"effectiveness":[184],"methodology":[188],"compared":[190],"state-of-the-art":[193],"approaches":[194],"classifiers.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
