0% found this document useful (0 votes)
25 views1 page

Vi Jayalakshmi

publications

Uploaded by

Deepa Jeyaseelan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views1 page

Vi Jayalakshmi

publications

Uploaded by

Deepa Jeyaseelan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Hindawi

Wireless Communications and Mobile Computing


Volume 2022, Article ID 6356152, 10 pages
https://doi.org/10.1155/2022/6356152

Research Article
Machine Learning-Based Secure Data Acquisition for Fake
Accounts Detection in Future Mobile Communication Networks

B. Prabhu Kavin,1 Sagar Karki,2 S. Hemalatha,3 Deepmala Singh,2 R. Vijayalakshmi,4


M. Thangamani,5 Sulaima Lebbe Abdul Haleem,6 Deepa Jose,7 Vineet Tirth,8
Pravin R. Kshirsagar ,9 and Amsalu Gosu Adigo 10
1
Sri Ramachandra Institute of Higher Education and Research and Technology, Chennai, India
2
LBEF Campus (In Academic Collaboration with APU Malaysia), Kathmandu, Nepal
3
Department of Computer Science and Engineering, Panimalar Institute of Technology, Chennai, India
4
Department of Computer Science and Engineering, Velammal College of Engineering and Technology, Madurai, India
5
Department of Information Technology, Kongu Engineering College, Perundurai, Tamil Nadu, India
6
Department of Information & Communication Technology, South Eastern University of Sri Lanka (SEUSL), Sri Lanka
7
KCG College of Technology, Karapakkam, Chennai, Tamil Nadu, India
8
Mechanical Engineering Department, College of Engineering, King Khalid University, 61411 Abha, Asir, Saudi Arabia
9
Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur, India
10
Center of Excellence for Bioprocess and Biotechnology, Department of Chemical Engineering, College of Biological and
Chemical Engineering, Addis Ababa Science and Technology University, Ethiopia

Correspondence should be addressed to Pravin R. Kshirsagar; pravinrkshirsagarphd@gmail.com


and Amsalu Gosu Adigo; amsalu.gosu@aastu.edu.et

Received 20 December 2021; Revised 25 December 2021; Accepted 29 December 2021; Published 27 January 2022

Academic Editor: Deepak Kumar Jain

Copyright © 2022 B. Prabhu Kavin et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Social media websites are becoming more prevalent on the Internet. Sites, such as Twitter, Facebook, and Instagram, spend
significantly more of their time on users online. People in social media share thoughts, views, and facts and create new
acquaintances. Social media sites supply users with a great deal of useful information. This enormous quantity of social media
information invites hackers to abuse data. These hackers establish fraudulent profiles for actual people and distribute useless
material. The material on spam might include commercials and harmful URLs that disrupt natural users. This spam content is a
massive problem in social networks. Spam identification is a vital procedure on social media networking platforms. In this paper,
we have proposed a spam detection artificial intelligence technique for Twitter social networks. In this approach, we employed a
vector support machine, a neural artificial network, and a random forest technique to build a model. The results indicate that,
compared with RF and ANN algorithms, the suggested support vector machine algorithm has the greatest precision, recall, and F-
measure. The findings of this paper would be useful in monitoring and tracking social media shared photos for the identification of
inappropriate content and forged images and to safeguard social media from digital threats and attacks.

1. Introduction The data set created has been preprocessed to identify false
accounts on social networking sites, and the intelligent
In the last few years, online social networks (OSNs), including systems have identified false accounts. Random forest, neural
Facebook, Twitter, and LinkedIn, are becoming extremely network, and help vector machine classification output is used
common. People use OSNs to remain in contact, exchange to identify fraudulent accounts. The precision rates of fake
details, plan activities, and even operate their e-business [1]. accounts are compared using certain algorithms, and the

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy