{"id":"https://openalex.org/W4414693309","doi":"https://doi.org/10.1109/tsc.2025.3616617","title":"RACEMAN: Cross-Platform Intrusion Detection in Online Social Networks","display_name":"RACEMAN: Cross-Platform Intrusion Detection in Online Social Networks","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414693309","doi":"https://doi.org/10.1109/tsc.2025.3616617"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2025.3616617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3616617","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074686490","display_name":"Edward Kwadwo Boahen","orcid":"https://orcid.org/0000-0002-2911-8112"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]},{"id":"https://openalex.org/I50379099","display_name":"Adana Science and Technology University","ror":"https://ror.org/013z3yn41","country_code":"TR","type":"education","lineage":["https://openalex.org/I50379099"]}],"countries":["AU","TR"],"is_corresponding":true,"raw_author_name":"Edward Kwadwo Boahen","raw_affiliation_strings":["Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC, Australia","Department of Computer ScienceGhana Communication Technology University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]},{"raw_affiliation_string":"Department of Computer ScienceGhana Communication Technology University","institution_ids":["https://openalex.org/I50379099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010636899","display_name":"Ahmad Salehi Shahraki","orcid":null},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ahmad Salehi Shahraki","raw_affiliation_strings":["Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC, Australia","Department of Computer Science and Information TechnologyLa Trobe University"],"raw_orcid":"https://orcid.org/0000-0003-2115-6269","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, La Trobe University, Bundoora, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]},{"raw_affiliation_string":"Department of Computer Science and Information TechnologyLa Trobe University","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086593836","display_name":"Carsten Rudolph","orcid":"https://orcid.org/0000-0001-9050-5675"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Carsten Rudolph","raw_affiliation_strings":["Faculty of Information Technology, Department of Software Systems &amp; Cybersecurity, Monash University, Melbourne, VIC, Australia","Faculty of Information Technology, Dep of Software Systems &amp; Cybersecurity, Monash University, Melbourne, Australia"],"raw_orcid":"https://orcid.org/0000-0001-9050-5675","affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Department of Software Systems &amp; Cybersecurity, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Faculty of Information Technology, Dep of Software Systems &amp; Cybersecurity, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054836950","display_name":"Zahir Tari","orcid":"https://orcid.org/0000-0002-1235-9673"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Zahir Tari","raw_affiliation_strings":["Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, VIC, Australia","Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1235-9673","affiliations":[{"raw_affiliation_string":"Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I4210095297"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Faculty of Information Technology, Department of Software Systems &amp; Cybersecurity, Monash University, Melbourne, VIC, Australia","Faculty of Information Technology, Dep of Software Systems &amp; Cybersecurity, Monash University, Melbourne, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6656-6240","affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Department of Software Systems &amp; Cybersecurity, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Faculty of Information Technology, Dep of Software Systems &amp; Cybersecurity, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5074686490"],"corresponding_institution_ids":["https://openalex.org/I196829312","https://openalex.org/I50379099"],"apc_list":null,"apc_paid":null,"fwci":5.8102,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.96373313,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"18","issue":"6","first_page":"4109","last_page":"4124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6371999979019165},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6247000098228455},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4544000029563904},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.40700000524520874},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3580999970436096},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.35420000553131104},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.3427000045776367},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.3400999903678894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8841999769210815},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6371999979019165},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6247000098228455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4652000069618225},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4544000029563904},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.40700000524520874},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3580999970436096},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.35420000553131104},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.3427000045776367},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.33980000019073486},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3377000093460083},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.30219998955726624},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.289900004863739},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27320000529289246},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2524999976158142},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3616617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3616617","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2101196063","https://openalex.org/W2272806125","https://openalex.org/W2513222658","https://openalex.org/W2789467011","https://openalex.org/W3092091320","https://openalex.org/W3146764396","https://openalex.org/W4205927892","https://openalex.org/W4282958541","https://openalex.org/W4285300984","https://openalex.org/W4294310845","https://openalex.org/W4299314632","https://openalex.org/W4312181988","https://openalex.org/W4313887253","https://openalex.org/W4318618625","https://openalex.org/W4321484315","https://openalex.org/W4321617063","https://openalex.org/W4323644405","https://openalex.org/W4323848867","https://openalex.org/W4324125794","https://openalex.org/W4367059765","https://openalex.org/W4367593702","https://openalex.org/W4367663338","https://openalex.org/W4375787811","https://openalex.org/W4375798909","https://openalex.org/W4377969753","https://openalex.org/W4381162153","https://openalex.org/W4382882547","https://openalex.org/W4384911909","https://openalex.org/W4387339248","https://openalex.org/W4387717424","https://openalex.org/W4390776918","https://openalex.org/W4398756655","https://openalex.org/W4399666315","https://openalex.org/W4401864185","https://openalex.org/W4402302142","https://openalex.org/W4408224328"],"related_works":[],"abstract_inverted_index":{"Online":[0],"Social":[1],"Networks":[2,257],"(OSNs)":[3],"face":[4],"various":[5],"security":[6],"threats,":[7],"including":[8],"account":[9,56],"compromisation,":[10],"where":[11,308],"attackers":[12],"seize":[13],"control":[14],"over":[15],"legitimate":[16],"user":[17,97,179,193,208],"accounts":[18],"and":[19,28,43,51,78,143,203,210,259,267,281,306,330],"create":[20],"fake":[21],"profiles":[22],"for":[23,36,115,262],"nefarious":[24],"purposes.":[25],"The":[26,229],"dynamic":[27,134],"open":[29],"nature":[30],"of":[31,177,287,315],"OSNs":[32,64],"presents":[33],"unique":[34],"challenges":[35],"cybersecurity,":[37],"particularly":[38],"in":[39,63,87,96],"detecting":[40],"unauthorized":[41],"access":[42],"malicious":[44],"activities":[45],"such":[46,132,320],"as":[47,133,321],"phishing":[48],"attacks,":[49],"spamming,":[50],"spreading":[52],"misinformation":[53],"associated":[54],"with":[55],"compromisation.":[57],"Traditional":[58],"intrusion":[59,212,223,263],"detection":[60,272],"systems":[61,261,280],"(IDS)":[62],"often":[65,85],"miss":[66],"attacks":[67],"or":[68,90,100],"generate":[69],"false":[70,91],"positives":[71,92],"due":[72],"to":[73,119,155,167,190,206,220,232],"static":[74],"thresholds,":[75],"delayed":[76],"responses,":[77],"poor":[79],"real-time":[80,139,164],"data":[81],"handling.":[82],"These":[83,214],"limitations":[84],"result":[86],"missed":[88],"detections":[89],"during":[93],"sudden":[94],"shifts":[95],"activity":[98],"patterns":[99],"emerging":[101],"attack":[102],"vectors.":[103],"We":[104,289],"introduce":[105],"<inline-formula":[106,125,159,247,291],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[107,126,160,248,292],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[108,127,161,249,293],"notation=\"LaTeX\">$RACEMAN$</tex-math></inline-formula>,":[109],"an":[110,174],"adaptive":[111],"IDS":[112,269],"designed":[113],"explicitly":[114],"the":[116,243],"OSN":[117,165],"environment":[118],"address":[120],"this.":[121],"To":[122],"enhance":[123],"adaptability,":[124],"notation=\"LaTeX\">$RACEMAN$</tex-math></inline-formula>":[128,162,250,294],"incorporates":[129],"emergency":[130],"strategies":[131],"threshold":[135],"adjustments":[136],"based":[137],"on":[138],"network":[140],"traffic":[141],"analysis":[142,189],"early":[144],"stopping":[145],"mechanisms":[146],"triggered":[147],"by":[148,242,274],"anomalous":[149],"behavior":[150],"spikes,":[151],"enabling":[152],"rapid":[153],"adaptation":[154],"changing":[156],"threat":[157],"landscapes.":[158],"leverages":[163],"interactions":[166],"continuously":[168],"update":[169],"its":[170],"metamorphic":[171,245],"relations,":[172],"ensuring":[173,282],"up-to-date":[175],"understanding":[176],"normal":[178],"behaviour":[180],"versus":[181],"potential":[182,211],"intrusions.":[183],"This":[184],"system":[185],"utilises":[186],"advanced":[187],"semantic":[188,227],"accurately":[191],"represent":[192],"interactions.":[194],"It":[195],"generates":[196],"diverse":[197],"test":[198,215,234],"cases":[199,216,235],"using":[200,295],"genetic":[201],"algorithms":[202],"reinforcement":[204],"learning":[205],"simulate":[207],"scenarios":[209],"methods.":[213],"undergo":[217],"input":[218],"transformations":[219],"realistically":[221],"mimic":[222],"attempts":[224],"while":[225],"maintaining":[226],"integrity.":[228],"system's":[230],"responses":[231],"these":[233],"are":[236],"evaluated":[237,290],"against":[238],"expected":[239],"behaviours":[240],"defined":[241],"updated":[244],"relations.":[246],"utilizes":[251],"statistical":[252],"analysis,":[253],"Multi-view":[254],"Convolutional":[255,322],"Neural":[256,323,327],"(MVCNN),":[258],"rule-based":[260],"classification.":[264],"Our":[265],"collaborative":[266],"distributed":[268],"approach":[270],"enhances":[271],"capabilities":[273],"promoting":[275],"knowledge":[276],"sharing":[277],"across":[278],"multiple":[279],"scalability":[283],"without":[284],"central":[285],"points":[286],"failure.":[288],"six":[296],"publicly":[297],"available":[298],"datasets":[299],"from":[300],"Facebook,":[301],"Google+,":[302],"Twitter,":[303],"linkedIn,":[304],"Youtube":[305],"Reddit":[307],"it":[309],"demonstrated":[310],"a":[311],"high":[312],"accuracy":[313],"rate":[314],"98.85%,":[316],"outperforming":[317],"other":[318],"models":[319],"Network":[324,328],"(CNN-85.67%),":[325],"Artificial":[326],"(ANN-86.63%),":[329],"Random":[331],"Forest":[332],"(RF-78.26%).":[333]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2025-12-12T23:16:27.785689","created_date":"2025-10-10T00:00:00"}
