Netinfo Security ›› 2019, Vol. 19 ›› Issue (9): 96-100.doi: 10.3969/j.issn.1671-1122.2019.09.020
• Orginal Article • Previous Articles Next Articles
Like CHEN1,2, Shuhua RUAN1,2, Xingshu CHEN1,2, Haizhou WANG1,2
Received:
2019-07-15
Online:
2019-09-10
Published:
2020-05-11
CLC Number:
Like CHEN, Shuhua RUAN, Xingshu CHEN, Haizhou WANG. Research on Intelligent Detection of Social Media Robot Accounts[J]. Netinfo Security, 2019, 19(9): 96-100.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.09.020
[1] | BOVET A, MAKSE H A.Influence of Fake News in Twitter During the 2016 US Presidential Election[J]. Nature Communications, 2019, 10(1): 7. |
[2] | MICHAEL K.Bots Trending Now: Disinformation and Calculated Manipulation of the Masses[J]. IEEE Technology and Society Magazine, 2017, 36(2): 6-11. |
[3] | SHAO C, CIAMPAGLIA G L, VAROL O, et al.The Spread of Low-Credibility Content by Social Bots[J]. Nature Communications, 2018, 9(1): 4787. |
[4] | LIU Rong, CHEN Bo, YU Ling, et al.Overview of Detection Techniques for Malicious Social Bots[J]. Journal on Communications, 2017, 38(Z2): 197-210. |
刘蓉,陈波,于泠,等.恶意社交机器人检测技术研究[J].通信学报,2017,38(Z2):197-210. | |
[5] | GRIMME C, PREUSS M, ADAM L, et al.Social Bots: Human-Like by Means of Human Control?[J]. Big Data, 2017, 5(4): 279-293. |
[6] | VAROL O, FERRARA E, DAVIS C A, et al.Online Human-Bot Interactions: Detection, Estimation, and Characterization[C]//AAAI. Eleventh International AAAI Conference on Web and Social Media, May 15-18, 2017, Montréal, Québec, Canada. Palo Alto: AAAI Press, 2017: 280-289. |
[7] | KANTEPE M, GANIZ M C.Preprocessing Framework for Twitter Bot Detection[C]// IEEE. 2017 International Conference on Computer Science and Engineering(UBMK), October 5-7, 2017, Akdeniz University, Antalya, Turkey. New York: IEEE, 2017: 630-634. |
[8] | SADIQ S, YAN Y, TAYLOR A, et al.Aafa: Associative Affinity Factor Analysis for Bot Detection and Stance Classification in Twitter[C]//IEEE. 2017 IEEE International Conference on Information Reuse and Integration(IRI), August 4-6, 2017, San Diego, California, USA. New York: IEEE, 2017: 356-365. |
[9] | MINNICH A, CHAVOSHI N, KOUTRA D, et al.BotWalk: Efficient Adaptive Exploration of Twitter Bot Networks[C]//ACM. Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, July 31-August 3, 2017, Sydney, Australia. New York: ACM, 2017: 467-474. |
[10] | QU Ming.Research and Implementation of Microblogging Bot Detection Technology[D]. Hunan: National University of Defense Technology, 2014. |
曲铭. 微博机器人检测技术的研究与实现[D].长沙:国防科学技术大学,2014. | |
[11] | LIU Kan, YUAN Yunying, LIU Ping.A Weibo Bot-Users Indentification Model Based on Random Forest[J]. ActaScientiarumNaturaliumUniversitatisPekinensis, 2015, 51(2): 289-300. |
刘勘,袁蕴英,刘萍.基于随机森林分类的微博机器用户识别研究[J].北京大学学报(自然科学版),2015,51(2):289-300. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||