{"id":"https://openalex.org/W2994902831","doi":"https://doi.org/10.1145/3368756.3369015","title":"Social networks fake profiles detection based on account setting and activity","display_name":"Social networks fake profiles detection based on account setting and activity","publication_year":2019,"publication_date":"2019-10-02","ids":{"openalex":"https://openalex.org/W2994902831","doi":"https://doi.org/10.1145/3368756.3369015","mag":"2994902831"},"language":"en","primary_location":{"id":"doi:10.1145/3368756.3369015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369015","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090960420","display_name":"Yasyn Elyusufi","orcid":"https://orcid.org/0000-0002-0284-4704"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Yasyn Elyusufi","raw_affiliation_strings":["Abdelmalek Essa\u00e2di University, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Abdelmalek Essa\u00e2di University, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083038249","display_name":"Zakaria Elyusufi","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Zakaria Elyusufi","raw_affiliation_strings":["Abdelmalek Essa\u00e2di University, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Abdelmalek Essa\u00e2di University, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022391897","display_name":"M. A\u00eft Kbir","orcid":"https://orcid.org/0000-0002-9943-6503"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"M'hamed Ait Kbir","raw_affiliation_strings":["Abdelmalek Essa\u00e2di University, Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"Abdelmalek Essa\u00e2di University, Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090960420"],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":1.1032,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.83341584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.7704956531524658},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.769317626953125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6958472728729248},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6297285556793213},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5758621692657471},{"id":"https://openalex.org/keywords/fake-news","display_name":"Fake news","score":0.5111506581306458},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4970913231372833},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.46437516808509827},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38731980323791504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3488999009132385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3433099389076233},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2990936040878296},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11715671420097351},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08799085021018982},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.08043327927589417}],"concepts":[{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.7704956531524658},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.769317626953125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6958472728729248},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6297285556793213},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5758621692657471},{"id":"https://openalex.org/C2779756789","wikidata":"https://www.wikidata.org/wiki/Q28549308","display_name":"Fake news","level":2,"score":0.5111506581306458},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4970913231372833},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.46437516808509827},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38731980323791504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3488999009132385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3433099389076233},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2990936040878296},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11715671420097351},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08799085021018982},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.08043327927589417},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368756.3369015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369015","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1233141674","https://openalex.org/W1986678144","https://openalex.org/W1992685726","https://openalex.org/W2025440088","https://openalex.org/W2183382489","https://openalex.org/W2769470793","https://openalex.org/W2905582790"],"related_works":["https://openalex.org/W2890339288","https://openalex.org/W4389954502","https://openalex.org/W2771255398","https://openalex.org/W2930428186","https://openalex.org/W3200027047","https://openalex.org/W4385770464","https://openalex.org/W4224262160","https://openalex.org/W3120363735","https://openalex.org/W4214820172","https://openalex.org/W2394323384"],"abstract_inverted_index":{"Social":[0],"networks":[1],"have":[2,92],"become":[3],"popular":[4],"due":[5],"to":[6,9,35,60,74,118],"the":[7,13,45,79,84,96,107,120],"ability":[8],"connect":[10],"people":[11],"around":[12],"world":[14],"and":[15,20,90,114,125],"share":[16],"media":[17,39],"(videos,":[18],"photos,":[19],"communications).":[21],"The":[22,33],"present":[23],"paper":[24,103],"focuses":[25],"on":[26,48],"identifying":[27,36],"fake":[28,37,55,85,99,124],"profiles":[29,40,50,122],"in":[30],"social":[31,38,53],"media.":[32],"approaches":[34,46],"can":[41],"be":[42,75],"classified":[43],"into":[44,123],"aimed":[47],"analysing":[49],"data.":[51],"On":[52],"networks,":[54],"profile":[56,86],"creation":[57],"is":[58,81],"considered":[59],"cause":[61],"more":[62],"harm":[63],"than":[64],"any":[65],"other":[66],"form":[67],"of":[68,98,109],"cyber":[69],"crime.":[70],"This":[71],"crime":[72],"has":[73],"detected":[76],"even":[77],"before":[78],"user":[80,121],"notified":[82],"about":[83],"creation.":[87],"Many":[88],"algorithms":[89],"methods":[91],"been":[93],"proposed":[94],"for":[95],"detection":[97],"profiles.":[100],"In":[101],"this":[102],"we":[104],"will":[105],"assess":[106],"impact":[108],"using":[110],"Decision":[111],"Tree":[112],"(DT),":[113],"Na\u00efve":[115],"Bayes":[116],"(NB)":[117],"classify":[119],"genuine.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
