GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hassan, Mohammad Mehedi  (2)
  • Mathematics  (2)
Material
Publisher
Person/Organisation
Language
Years
Subjects(RVK)
  • Mathematics  (2)
RVK
  • 1
    Online Resource
    Online Resource
    Elsevier BV ; 2017
    In:  Future Generation Computer Systems Vol. 72 ( 2017-07), p. 319-326
    In: Future Generation Computer Systems, Elsevier BV, Vol. 72 ( 2017-07), p. 319-326
    Type of Medium: Online Resource
    ISSN: 0167-739X
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2017
    detail.hit.zdb_id: 48781-8
    detail.hit.zdb_id: 2020551-X
    detail.hit.zdb_id: 1100390-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Wiley ; 2017
    In:  Concurrency and Computation: Practice and Experience Vol. 29, No. 19 ( 2017-10-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 29, No. 19 ( 2017-10-10)
    Abstract: Twitter spam has long been a critical but difficult problem to be addressed. So far, researchers have developed a series of machine learning–based methods and blacklisting techniques to detect spamming activities on Twitter. According to our investigation, current methods and techniques have achieved the accuracy of around 87%. However, because of the problems of spam drift and information fabrication, these machine learning–based methods cannot efficiently detect spam activities in real‐life scenarios. Meanwhile, the blacklisting method also cannot catch up with the variations of spamming activities, as manually inspecting suspicious URLs is extremely timeconsuming. In this paper, we proposed a novel technique based on deep‐learning technique to address the above challenges. The syntax of each tweet will be learned through WordVector and trained by deep learning. We then constructed a binary classifier to differentiate spam and regular tweets. In experiments, we collected and labeled a 10‐day real tweet dataset as ground truth to evaluate our proposed method. We first went for empirical analysis with a series of comparisons to other methods: (1) performance of different classifiers, (2) other existing text‐based methods, and (3) nontext‐based detection techniques. According to the experiment results, our proposed method largely outperformed previous methods. We further conducted principle component analysis on typical methods to theoretically justify the outperformance of our method. We extracted all kinds of features via dimensionality reduction. It was found that our features were most distinct among all the detection methods. This well demonstrated the outperformance of our method.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2017
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...