{"id":"https://openalex.org/W2251925957","doi":"https://doi.org/10.1145/2740908.2745400","title":"Leveraging Careful Microblog Users for Spammer Detection","display_name":"Leveraging Careful Microblog Users for Spammer Detection","publication_year":2015,"publication_date":"2015-05-18","ids":{"openalex":"https://openalex.org/W2251925957","doi":"https://doi.org/10.1145/2740908.2745400","mag":"2251925957"},"language":"en","primary_location":{"id":"doi:10.1145/2740908.2745400","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2740908.2745400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on World Wide Web","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101611863","display_name":"Hao Fu","orcid":"https://orcid.org/0000-0003-1068-9465"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Fu","raw_affiliation_strings":["University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044651577","display_name":"Xing Xie","orcid":"https://orcid.org/0000-0002-8608-8482"},"institutions":[{"id":"https://openalex.org/I4210113369","display_name":"Microsoft Research Asia (China)","ror":"https://ror.org/0300m5276","country_code":"CN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210113369"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Xie","raw_affiliation_strings":["Microsoft Research, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Beijing, China","institution_ids":["https://openalex.org/I4210113369"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100728764","display_name":"Rui Yong","orcid":"https://orcid.org/0000-0003-4703-848X"},"institutions":[{"id":"https://openalex.org/I4210113369","display_name":"Microsoft Research Asia (China)","ror":"https://ror.org/0300m5276","country_code":"CN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210113369"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Rui","raw_affiliation_strings":["Microsoft Research, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Beijing, China","institution_ids":["https://openalex.org/I4210113369"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101611863"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":10.3298,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.9799265,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"419","last_page":"429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.9960102438926697},{"id":"https://openalex.org/keywords/microblogging","display_name":"Microblogging","score":0.8164465427398682},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.754797637462616},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6594150066375732},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4500666856765747},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41893020272254944},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18796706199645996}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.9960102438926697},{"id":"https://openalex.org/C143275388","wikidata":"https://www.wikidata.org/wiki/Q92438","display_name":"Microblogging","level":3,"score":0.8164465427398682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.754797637462616},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6594150066375732},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4500666856765747},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41893020272254944},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18796706199645996}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2740908.2745400","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2740908.2745400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on World Wide Web","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W9223698","https://openalex.org/W146417747","https://openalex.org/W1832529897","https://openalex.org/W1845137714","https://openalex.org/W1973644085","https://openalex.org/W1986678144","https://openalex.org/W1996802155","https://openalex.org/W2005556331","https://openalex.org/W2019786737","https://openalex.org/W2033755677","https://openalex.org/W2045775870","https://openalex.org/W2059640750","https://openalex.org/W2064237629","https://openalex.org/W2074835059","https://openalex.org/W2076219102","https://openalex.org/W2098395374","https://openalex.org/W2101108259","https://openalex.org/W2107569009","https://openalex.org/W2112554371","https://openalex.org/W2127124926","https://openalex.org/W2129957127","https://openalex.org/W2146008005","https://openalex.org/W2154454189","https://openalex.org/W2155186673","https://openalex.org/W2162758311","https://openalex.org/W2163898372","https://openalex.org/W2165701072","https://openalex.org/W2168508162","https://openalex.org/W2420733993","https://openalex.org/W2913668833","https://openalex.org/W2915063781"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W146417747","https://openalex.org/W2008664567","https://openalex.org/W2728430307","https://openalex.org/W2107786128","https://openalex.org/W2053241453","https://openalex.org/W2064237629","https://openalex.org/W2537388533","https://openalex.org/W2978974359","https://openalex.org/W2153980712"],"abstract_inverted_index":{"Microblogging":[0],"websites,":[1],"e.g.":[2,205],"Twitter":[3],"and":[4,14,55,124,137,165,184],"Sina":[5,172],"Weibo,":[6],"have":[7,21],"become":[8],"a":[9,78,104,113,118,126,158],"popular":[10],"platform":[11],"for":[12,42,59,66,81,202],"socializing":[13],"sharing":[15],"information":[16,80],"in":[17,149],"recent":[18,48],"years.":[19],"Spammers":[20],"also":[22,71,200],"discovered":[23],"this":[24,75,85],"new":[25],"opportunity":[26],"to":[27,44,111,120,130,188],"unfairly":[28],"overpower":[29],"normal":[30],"users":[31,54,64,164],"with":[32,161],"unsolicited":[33],"content,":[34],"namely":[35],"social":[36],"spams.":[37],"While":[38],"it":[39,132,185],"is":[40,70,106,109,186,199],"intuitive":[41],"everyone":[43],"follow":[45,57,112],"legitimate":[46,53,138],"users,":[47,99],"studies":[49],"show":[50,176],"that":[51,177,195],"both":[52],"spammers":[56,58,67,136],"different":[60],"reasons.":[61],"Evidence":[62],"of":[63,91,98,152,163],"seeking":[65],"on":[68,134,157,171],"purpose":[69],"observed.":[72],"We":[73,116,140],"regard":[74],"behavior":[76],"as":[77],"useful":[79],"spammer":[82,92,144],"detection.":[83],"In":[84,191],"paper,":[86],"we":[87,193],"approach":[88,179],"the":[89,96,122,150,153,182,196],"problem":[90],"detection":[93,145],"by":[94],"leveraging":[95],"\"carefulness\"":[97],"which":[100],"indicates":[101],"how":[102,143],"careful":[103],"user":[105],"when":[107],"she":[108],"about":[110],"potential":[114],"spammer.":[115],"propose":[117],"framework":[119],"measure":[121,198],"carefulness,":[123,183],"develop":[125],"supervised":[127],"learning":[128],"algorithm":[129],"estimate":[131],"based":[133],"known":[135],"users.":[139],"then":[141],"illustrate":[142],"can":[146],"be":[147],"improved":[148],"aid":[151],"proposed":[154,197],"measure.":[155],"Evaluation":[156],"real":[159],"dataset":[160],"millions":[162],"an":[166],"online":[167],"testing":[168],"are":[169],"performed":[170],"Weibo.":[173],"The":[174],"results":[175],"our":[178],"indeed":[180],"capture":[181],"effective":[187],"detect":[189],"spammers.":[190],"addition,":[192],"find":[194],"beneficial":[201],"other":[203],"applications,":[204],"link":[206],"prediction.":[207]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
