Twitter Spam Detection: A Systematic Review
- URL: http://arxiv.org/abs/2011.14754v2
- Date: Tue, 1 Dec 2020 11:31:06 GMT
- Title: Twitter Spam Detection: A Systematic Review
- Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari,
Ebrahim Mahdipour
- Abstract summary: This review focuses on comparing the existing research techniques on Twitter spam detection systematically.
Most of the existing methods rely on Machine Learning-based algorithms.
We propose a taxonomy based on different feature selection methods and analyses, namely content analysis, user analysis, tweet analysis, network analysis, and hybrid analysis.
- Score: 4.348112720799065
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Nowadays, with the rise of Internet access and mobile devices around the
globe, more people are using social networks for collaboration and receiving
real-time information. Twitter, the microblogging that is becoming a critical
source of communication and news propagation, has grabbed the attention of
spammers to distract users. So far, researchers have introduced various defense
techniques to detect spams and combat spammer activities on Twitter. To
overcome this problem, in recent years, many novel techniques have been offered
by researchers, which have greatly enhanced the spam detection performance.
Therefore, it raises a motivation to conduct a systematic review about
different approaches of spam detection on Twitter. This review focuses on
comparing the existing research techniques on Twitter spam detection
systematically. Literature review analysis reveals that most of the existing
methods rely on Machine Learning-based algorithms. Among these Machine Learning
algorithms, the major differences are related to various feature selection
methods. Hence, we propose a taxonomy based on different feature selection
methods and analyses, namely content analysis, user analysis, tweet analysis,
network analysis, and hybrid analysis. Then, we present numerical analyses and
comparative studies on current approaches, coming up with open challenges that
help researchers develop solutions in this topic.
Related papers
- To ChatGPT, or not to ChatGPT: That is the question! [78.407861566006]
This study provides a comprehensive and contemporary assessment of the most recent techniques in ChatGPT detection.
We have curated a benchmark dataset consisting of prompts from ChatGPT and humans, including diverse questions from medical, open Q&A, and finance domains.
Our evaluation results demonstrate that none of the existing methods can effectively detect ChatGPT-generated content.
arXiv Detail & Related papers (2023-04-04T03:04:28Z) - Countering Malicious Content Moderation Evasion in Online Social
Networks: Simulation and Detection of Word Camouflage [64.78260098263489]
Twisting and camouflaging keywords are among the most used techniques to evade platform content moderation systems.
This article contributes significantly to countering malicious information by developing multilingual tools to simulate and detect new methods of evasion of content.
arXiv Detail & Related papers (2022-12-27T16:08:49Z) - Identification of Twitter Bots based on an Explainable ML Framework: the
US 2020 Elections Case Study [72.61531092316092]
This paper focuses on the design of a novel system for identifying Twitter bots based on labeled Twitter data.
Supervised machine learning (ML) framework is adopted using an Extreme Gradient Boosting (XGBoost) algorithm.
Our study also deploys Shapley Additive Explanations (SHAP) for explaining the ML model predictions.
arXiv Detail & Related papers (2021-12-08T14:12:24Z) - A Review of Web Infodemic Analysis and Detection Trends across
Multi-modalities using Deep Neural Networks [3.42658286826597]
Fake news detection is one of the most analyzed and prominent areas of research.
Facebook, Reddit, WhatsApp, YouTube, and other social applications are gradually gaining attention in this emerging field.
This review primarily deals with multi-modal fake news detection techniques that include images, videos, and their combinations with text.
arXiv Detail & Related papers (2021-11-23T16:02:28Z) - Human-in-the-Loop Disinformation Detection: Stance, Sentiment, or
Something Else? [93.91375268580806]
Both politics and pandemics have recently provided ample motivation for the development of machine learning-enabled disinformation (a.k.a. fake news) detection algorithms.
Existing literature has focused primarily on the fully-automated case, but the resulting techniques cannot reliably detect disinformation on the varied topics, sources, and time scales required for military applications.
By leveraging an already-available analyst as a human-in-the-loop, canonical machine learning techniques of sentiment analysis, aspect-based sentiment analysis, and stance detection become plausible methods to use for a partially-automated disinformation detection system.
arXiv Detail & Related papers (2021-11-09T13:30:34Z) - Adversarial Attacks and Defenses for Social Network Text Processing
Applications: Techniques, Challenges and Future Research Directions [7.84287273674205]
We provide a review of the main approaches for adversarial attacks and defenses in the context of social media applications.
In detail, we cover on six key applications, namely (i) rumors detection, (ii) satires detection, (iii) clickbait & spams identification, (iv) hate speech detection, (v)misinformation detection, and (vi) sentiment analysis.
arXiv Detail & Related papers (2021-10-26T19:33:40Z) - Surveying the Research on Fake News in Social Media: a Tale of Networks
and Language [0.0]
The history of journalism and news diffusion is tightly coupled with the effort to dispel hoaxes, misinformation, propaganda, unverified rumours, poor reporting, and messages containing hate and divisions.
With the explosive growth of online social media and billions of individuals engaged with consuming, creating, and sharing news, this ancient problem has surfaced with a renewed intensity.
This has triggered many researchers to develop new methods for studying, understanding, detecting, and preventing fake-news diffusion.
arXiv Detail & Related papers (2021-09-13T14:10:44Z) - From Handcrafted to Deep Features for Pedestrian Detection: A Survey [148.35460817092908]
Pedestrian detection is an important but challenging problem in computer vision.
Over the past decade, significant improvement has been witnessed with the help of handcrafted features and deep features.
In addition to single-spectral pedestrian detection, we also review multi-spectral pedestrian detection.
arXiv Detail & Related papers (2020-10-01T14:51:10Z) - Stance Detection in Web and Social Media: A Comparative Study [3.937145867005019]
Online forums and social media platforms are increasingly being used to discuss topics of varying polarities where different people take different stances.
Several methodologies for automatic stance detection from text have been proposed in literature.
To our knowledge, there has not been any systematic investigation towards their, and their comparative performances.
arXiv Detail & Related papers (2020-07-12T12:39:35Z) - Stance Detection on Social Media: State of the Art and Trends [5.584060970507506]
Stance detection on social media is an emerging opinion mining paradigm for various social and political applications in which sentiment analysis may be sub-optimal.
This paper surveys the work on stance detection within those communities and situates its usage within current opinion mining techniques in social media.
It presents an exhaustive review of stance detection techniques on social media, including the task definition, different types of targets in stance detection, features set used, and various machine learning approaches applied.
arXiv Detail & Related papers (2020-06-05T19:24:16Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.