0% found this document useful (0 votes)
13 views1 page

A11. Spam Detection and Fake User

This document discusses the challenges posed by spam and fake users on Twitter, highlighting their negative impact on user experience and information integrity. It proposes using extreme learning machine (ELM) for detecting spammers and identifying fake users, comparing its effectiveness with other machine learning algorithms. Additionally, it presents a taxonomy of Twitter spam detection methods categorized by their detection capabilities and features.

Uploaded by

Experi Mental
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views1 page

A11. Spam Detection and Fake User

This document discusses the challenges posed by spam and fake users on Twitter, highlighting their negative impact on user experience and information integrity. It proposes using extreme learning machine (ELM) for detecting spammers and identifying fake users, comparing its effectiveness with other machine learning algorithms. Additionally, it presents a taxonomy of Twitter spam detection methods categorized by their detection capabilities and features.

Uploaded by

Experi Mental
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Unveiling The Power of Extreme Learning Machine: Combatting

Spam and Identifying Fake Users On Twitter

Abstract

Social networking sites engage millions of users around the world. The users' interactions
with these social sites, such as Twitter and Facebook have a tremendous impact and
occasionally undesirable repercussions for daily life. The prominent social networking sites
have turned into a target platform for the spammers to disperse a huge amount of irrelevant
and deleterious information. Twitter, for example, has become one of the most extravagantly
used platforms of all times and therefore allows an unreasonable amount of spam. Fake users
send undesired tweets to users to promote services or websites that not only affect legitimate
users but also disrupt resource consumption. Moreover, the possibility of expanding invalid
information to users through fake identities has increased that results in the unrolling of
harmful content. Recently, the detection of spammers and identification of fake users on
Twitter has become a common area of research in contemporary online social Networks
(OSNs). This work proposes the detection of spammers and fake user identification on
Twitter data using extreme learning machine (ELM) and compared the obtained results with
various machine learning algorithms like random forest, naevi bayes and support vector
machine. Moreover, a taxonomy of the Twitter spam detection approaches is presented that
classifies the techniques based on their ability to detect: (i) fake content, (ii) spam based on
URL, (iii) spam in trending topics, and (iv) fake users. The presented techniques are also
compared based on various features, such as user features, content features, graph features,
structure features, and time features.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy