{"id":"https://openalex.org/W4396909917","doi":"https://doi.org/10.1109/tnnls.2024.3396192","title":"Dispelling the Fake: Social Bot Detection Based on Edge Confidence Evaluation","display_name":"Dispelling the Fake: Social Bot Detection Based on Edge Confidence Evaluation","publication_year":2024,"publication_date":"2024-05-14","ids":{"openalex":"https://openalex.org/W4396909917","doi":"https://doi.org/10.1109/tnnls.2024.3396192","pmid":"https://pubmed.ncbi.nlm.nih.gov/38743543"},"language":"en","primary_location":{"id":"doi:10.1109/tnnls.2024.3396192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnnls.2024.3396192","pdf_url":null,"source":{"id":"https://openalex.org/S4210175523","display_name":"IEEE Transactions on Neural Networks and Learning Systems","issn_l":"2162-237X","issn":["2162-237X","2162-2388"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Neural Networks and Learning Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080845346","display_name":"Beibei Qiao","orcid":"https://orcid.org/0009-0000-0582-9078"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Boyu Qiao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026526428","display_name":"Wei Zhou","orcid":"https://orcid.org/0000-0003-3622-3970"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhou","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377529","display_name":"Kun Li","orcid":"https://orcid.org/0000-0002-1013-1325"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085100668","display_name":"Shilong Li","orcid":"https://orcid.org/0009-0000-0565-3420"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shilong Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018288181","display_name":"Songlin Hu","orcid":"https://orcid.org/0000-0002-7170-3809"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songlin Hu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080845346"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":4.8852,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.95165333,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"36","issue":"4","first_page":"7302","last_page":"7315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.531313419342041},{"id":"https://openalex.org/keywords/confidence-interval","display_name":"Confidence interval","score":0.41031986474990845},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3834877610206604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37699735164642334},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33632680773735046},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3224561810493469},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.23478680849075317},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15060856938362122}],"concepts":[{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.531313419342041},{"id":"https://openalex.org/C44249647","wikidata":"https://www.wikidata.org/wiki/Q208498","display_name":"Confidence interval","level":2,"score":0.41031986474990845},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3834877610206604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37699735164642334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33632680773735046},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3224561810493469},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.23478680849075317},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15060856938362122}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnnls.2024.3396192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnnls.2024.3396192","pdf_url":null,"source":{"id":"https://openalex.org/S4210175523","display_name":"IEEE Transactions on Neural Networks and Learning Systems","issn_l":"2162-237X","issn":["2162-237X","2162-2388"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Neural Networks and Learning Systems","raw_type":"journal-article"},{"id":"pmid:38743543","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38743543","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on neural networks and learning systems","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G237047247","display_name":null,"funder_award_id":"2022YFC3302102","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":72,"referenced_works":["https://openalex.org/W1672660286","https://openalex.org/W1837843568","https://openalex.org/W1849719402","https://openalex.org/W1965555277","https://openalex.org/W1992685726","https://openalex.org/W1995341919","https://openalex.org/W2033664129","https://openalex.org/W2238500808","https://openalex.org/W2263846226","https://openalex.org/W2269924745","https://openalex.org/W2583516892","https://openalex.org/W2604314403","https://openalex.org/W2767370829","https://openalex.org/W2787296320","https://openalex.org/W2810193935","https://openalex.org/W2898440519","https://openalex.org/W2903694883","https://openalex.org/W2907352650","https://openalex.org/W2907492528","https://openalex.org/W2914064919","https://openalex.org/W2916302242","https://openalex.org/W2954482098","https://openalex.org/W2963806301","https://openalex.org/W2965373594","https://openalex.org/W2965469092","https://openalex.org/W2970127247","https://openalex.org/W2997788455","https://openalex.org/W2998496395","https://openalex.org/W3004034277","https://openalex.org/W3010115535","https://openalex.org/W3012871709","https://openalex.org/W3019320019","https://openalex.org/W3032981809","https://openalex.org/W3035376925","https://openalex.org/W3035739162","https://openalex.org/W3039695075","https://openalex.org/W3041367927","https://openalex.org/W3068123808","https://openalex.org/W3095296552","https://openalex.org/W3106914636","https://openalex.org/W3155564043","https://openalex.org/W3175498457","https://openalex.org/W3176405886","https://openalex.org/W3187966659","https://openalex.org/W3192856967","https://openalex.org/W3197022418","https://openalex.org/W3217103056","https://openalex.org/W4213147383","https://openalex.org/W4220686914","https://openalex.org/W4226124904","https://openalex.org/W4280504205","https://openalex.org/W4282982824","https://openalex.org/W4285378361","https://openalex.org/W4289253852","https://openalex.org/W4313066228","https://openalex.org/W4365458124","https://openalex.org/W4382406504","https://openalex.org/W4384828840","https://openalex.org/W4385571401","https://openalex.org/W4386160441","https://openalex.org/W4388185949","https://openalex.org/W4389045767","https://openalex.org/W6638836233","https://openalex.org/W6726873649","https://openalex.org/W6738964360","https://openalex.org/W6745537798","https://openalex.org/W6755321125","https://openalex.org/W6760045743","https://openalex.org/W6797464607","https://openalex.org/W6838846991","https://openalex.org/W6848740612","https://openalex.org/W6853743256"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2931662336","https://openalex.org/W2077865380","https://openalex.org/W3006817050","https://openalex.org/W4401768695","https://openalex.org/W2765597752","https://openalex.org/W2134894512","https://openalex.org/W2083375246","https://openalex.org/W2067108088"],"abstract_inverted_index":{"Social":[0],"bot":[1,29,91,204],"detection":[2,30,112,231],"is":[3,198],"essential":[4],"for":[5,144],"maintaining":[6],"the":[7,75,88,96,130,133,137,148,160,178],"safety":[8],"and":[9,51,80,92,95,135,153,181,200],"integrity":[10],"of":[11,132,150],"online":[12],"social":[13,28,110,203],"networks":[14,18],"(OSNs).":[15],"Graph":[16],"neural":[17],"(GNNs)":[19],"have":[20],"emerged":[21],"as":[22,49,54,226],"a":[23,109,164,227],"promising":[24],"solution.":[25],"Mainstream":[26],"GNN-based":[27],"methods":[31,58],"learn":[32],"rich":[33],"user":[34,151],"representations":[35],"by":[36,172],"recursively":[37],"performing":[38],"message":[39],"passing":[40],"along":[41],"user-user":[42],"interaction":[43],"edges,":[44],"where":[45],"users":[46],"are":[47],"treated":[48],"nodes":[50,152],"their":[52,183],"relationships":[53],"edges.":[55,82,139],"However,":[56],"these":[57,170],"face":[59],"challenges":[60],"when":[61],"detecting":[62],"advanced":[63],"bots":[64],"interacting":[65],"with":[66,70,87],"genuine":[67],"accounts.":[68],"Interaction":[69],"real":[71],"accounts":[72],"results":[73,190,208],"in":[74,202],"graph":[76,98],"structure":[77],"containing":[78],"camouflaged":[79],"unreliable":[81,84,138],"These":[83],"edges":[85,134,145],"interfere":[86],"differentiation":[89],"between":[90],"human":[93],"representations,":[94],"iterative":[97],"encoding":[99],"process":[100],"amplifies":[101],"this":[102,105],"unreliability.":[103],"In":[104],"article,":[106],"we":[107,141],"propose":[108],"Bot":[111],"method":[113],"based":[114,146,185],"on":[115,147,186,191,209],"Edge":[116],"Confidence":[117],"Evaluation":[118],"(BECE).":[119],"Our":[120],"model":[121],"incorporates":[122],"an":[123],"edge":[124,161,187,219],"confidence":[125,184,220],"evaluation":[126,221],"module":[127,222],"that":[128,196,216],"assesses":[129],"reliability":[131],"identifies":[136],"Specifically,":[140],"design":[142],"features":[143],"representation":[149],"introduce":[154],"parameterized":[155],"Gaussian":[156],"distributions":[157],"to":[158,229],"map":[159],"embeddings":[162,171],"into":[163],"latent":[165],"semantic":[166],"space.":[167],"We":[168],"optimize":[169],"minimizing":[173],"Kullback-Leibler":[174],"(KL)":[175],"divergence":[176],"from":[177],"standard":[179],"distribution":[180],"evaluate":[182],"representation.":[188],"Experimental":[189],"three":[192],"real-world":[193],"datasets":[194],"demonstrate":[195,215],"BECE":[197],"effective":[199],"superior":[201],"detection.":[205],"Additionally,":[206],"experimental":[207],"six":[210],"widely":[211],"used":[212,225],"GNN":[213],"architectures":[214],"our":[217],"proposed":[218],"can":[223],"be":[224],"plug-in":[228],"improve":[230],"performance.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
