Detecting sociosemantic communities by applying social network analysis in tweets, Social Network Analysis Mining, vol.5, issue.1, p.17, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01283863
Information quality challenges in social media, International conference on information quality (ICIQ), pp.234-248, 2010. ,
If it looks like a spammer and behaves like a spammer, it must be a spammer: Analysis and detection of microblogging spam accounts, International Journal of Information Security, vol.15, issue.5, pp.475-491, 2016. ,
Enhancing twitter spam accounts discovery using cross-account pattern mining, Integrated network management (IM), 2015 IFIP/IEEE international symposium on, pp.4-91, 2015. ,
Detecting spammers on twitter. In In collaboration, electronic messaging, anti-abuse and spam conference (CEAS), p.12, 2010. ,
Detecting spam urls in social media via behavioral analysis, Advances in information retrieval, pp.703-714, 2015. ,
N-gram-based text categorization, Ann Arbor MI, vol.48113, issue.2, pp.161-175, 1994. ,
Multi-criterion real time tweet summarization based upon adaptive threshold, IEEE/WIC/ACM international conference on web intelligence, pp.264-271, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01447220
Statistical features-based real-time detection of drifted twitter spam, IEEE Transactions on Information Forensics and Security, vol.12, issue.4, pp.914-925, 2017. ,
6 million spam tweets: A large ground truth for timely twitter spam detection, 2015 IEEE international conference on communications (ICC), pp.7065-7070, 2015. ,
Asymmetric self-learning for tackling twitter spam drift, Computer communications workshops (infocom wkshps), pp.208-213, 2015. ,
, Spammers are becoming "smarter" on twitter. IT Professional, vol.18, pp.66-70, 2016.
A performance evaluation of machine learning-based streaming spam tweets detection, IEEE Transactions on Computational Social Systems, vol.2, issue.3, pp.65-76, 2015. ,
Who is tweeting on twitter: Human, bot, or cyborg?, Proceedings of the 26th annual computer security applications conference In ACSAC'10, pp.21-30, 2010. ,
Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.6, pp.811-824, 2012. ,
Detecting social spam campaigns on twitter, Applied cryptography and network security, pp.455-472, 2012. ,
Like it or not: A survey of twitter sentiment analysis methods, ACM Computing Surveys, vol.49, pp.1-41, 2016. ,
@spam: The underground on 140 characters or less, Proceedings of the 17th ACM conference on computer and communications security, pp.27-37, 2010. ,
The weka data mining software: An update, SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
Building a knowledge base using microblogs: The case of cultural MicroBlog contextualization collection (regular paper), Conference on multilingual and multimodal information access evaluation (CLEF), pp.1226-1237, 2016. ,
Online social spammer detection, AAAI, pp.59-65, 2014. ,
Processing social media messages in mass emergency: A survey, Citeseer. Imran, vol.47, p.38, 2013. ,
Detection of spam-posting accounts on twitter, Neurocomputing, p.315, 2018. ,
A survey of spam detection methods on twitter, International Journal of Advanced Computer Science and Applications, vol.8, 2017. ,
Discretization techniques: A recent survey, GESTS International Transactions on Computer Science and Engineering, vol.32, pp.47-58, 2005. ,
On information and sufficiency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951. ,
Uncovering social spammers: Social honeypots + machine learning, Proceedings of the 33rd international ACM SI-GIR conference on research and development in information retrieval . In SIGIR '10, pp.435-442, 2010. ,
Warningbird: Detecting suspicious urls in twitter stream, NDSS: 12, pp.1-13, 2012. ,
Warningbird: A near real-time detection system for suspicious urls in twitter stream, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.3, pp.183-195, 2013. ,
Learning to detect malicious urls, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2011. ,
Introduction to information retrieval, 2008. ,
Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, 2013. ,
Spam detection on twitter using traditional classifiers, Proceedings of the 8th international conference on autonomic and trusted computing . In ATC'11, pp.175-186, 2011. ,
Spam detection of twitter traffic: A framework based on random forests and non-uniform feature sampling, Advances in social networks analysis and mining (asonam), pp.811-817, 2016. ,
A case study on the influence of the user profile enrichment on buzz propagation in social media: Experiments on delicious, New trends in databases and information systems -ADBIS 2015 short papers and workshops, pp.567-577, 2015. ,
Dynamic enrichment of social users' interests, IEEE 8th international conference on research challenges in information science, pp.1-11, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01147325
A survey on feature selection, Promoting Business Analytics and Quantitative Management of Technology: 4th International Conference on Information Technology and Quantitative Management, vol.91, pp.919-926, 2016. ,
Stock prediction using twitter sentiment analysis, 2011. ,
Handling imbalanced data: A survey, International proceedings on advances in soft computing, pp.431-443, 1999. ,
Hspam14: A collection of 14 million tweets for hashtag-oriented spam research, 2015. ,
An analysis of 14 million tweets on hashtag-oriented spamming, Journal of the Association for Information Science and Technology, vol.68, issue.7, pp.1638-1651, 2017. ,
Semi-supervised spam detection in twitter stream, IEEE Transactions on Computational Social Systems, 2017. ,
Detecting spammers on social networks, Proceedings of the 26th annual computer security applications conference . In ACSAC '10, pp.1-9, 2010. ,
Design and evaluation of a real-time url spam filtering service, 2011 IEEE symposium on security and privacy, pp.447-462, 2011. ,
Suspended accounts in retrospect: An analysis of twitter spam, Internet measurement conference . Twitter, 2011. ,
Don't follow me: Spam detection in twitter, Security and cryptography (secrypt), proceedings of the 2010 international conference on, pp.1-10, 2010. ,
Making the most of tweet--inherent features for social spam detection on twitter, 2015. ,
Bean: a behavior analysis approach of url spam filtering in twitter, Information reuse and integration (IRI), 2015 IEEE international conference on, pp.403-410, 2015. ,
Information quality in social networks: A collaborative method for detecting spam tweets in trending topics, Advances in artificial intelligence: From theory to practice -30th international conference on industrial engineering and other applications of applied intelligent systems, pp.211-223, 2017. ,
Information quality in social networks: Predicting spammy naming patterns for retrieving twitter spam accounts, ICEIS 2017 -proceedings of the 19th international conference on enterprise information systems, vol.2, pp.610-622, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01809318
Leveraging time for spammers detection on twitter, Proceedings of the 8th international conference on management of digital ecosystems, pp.109-116, 2016. ,
Information quality in online social networks: A fast unsupervised social spam detection method for trending topics, ICEIS 2017 -proceedings of the 19th international conference on enterprise information systems, vol.2, pp.663-675, 2017. ,
Twitter spam detection based on deep learning, Proceedings of the Australasian computer science week multiconference, p.3, 2017. ,
Twitter spam detection: Survey of new approaches and comparative study. Computers and Security, p.76, 2017. ,
Empirical evaluation and new design for fighting evolving twitter spammers, IEEE Transactions on Information Forensics and Security, vol.8, issue.8, pp.1280-1293, 2013. ,
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter, Proceedings of the 21st international conference on world wide web . In WWW '12, pp.71-80, 2012. ,
Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers, Proceedings of the 14th international conference on recent advances in intrusion detection . In RAID'11, pp.318-337, 2011. ,
Overlapping community detection at scale: A nonnegative matrix factorization approach, Proceedings of the sixth ACM international conference on web search and data mining, pp.587-596, 2013. ,
,
Towards real-time summarization of scheduled events from twitter streams, 23rd ACM conference on hypertext and social media, HT '12, pp.319-320, 2012. ,
Classifying trending topics: A typology of conversation triggers on twitter, Proceedings of the 20th ACM conference on information and knowledge management, CIKM 2011, pp.2461-2464, 2011. ,