Skip to main content

Detecting Social Spammers in Sina Weibo Using Extreme Deep Factorization Machine

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2020 (WISE 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12342))

Included in the following conference series:

Abstract

Online social networks (OSNs) are a form of social media that allow users to obtain news and information as well as connect with others to share content. However, the emergence of social spammers disrupts the normal order of OSNs significantly. As one of the most popular Chinese OSNs in the world, Sina Weibo is seriously affected by social spammers. With the continuous evolution of social spammers in Sina Weibo, they are gradually indistinguishable from benign users. In this paper, we propose a novel approach for social spammer detection in Sina Weibo using extreme deep factorization machine (xDeepFM). Specifically, we extract thirty features from four categories, namely profile-based, interaction-based, content-based, and temporal-based features to distinguish between social spammers and benign users. Furthermore, we build a detection model based on xDeepFM to implement the effective detection of social spammers. The proposed approach is empirically validated on the real-world data collected from Sina Weibo. The experimental results show that this approach can detect social spammers in Sina Weibo more effectively than most of the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Qurishi, M., Hossain, M.S., Alrubaian, M., Rahman, S.M.M., Alamri, A.: Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans. Ind. Inform. 14(2), 799–813 (2017)

    Article  Google Scholar 

  2. Alghamdi, B., Xu, Y., Watson, J.: A hybrid approach for detecting spammers in online social networks. In: Hacid, H., Cellary, W., Wang, H., Paik, H.-Y., Zhou, R. (eds.) WISE 2018. LNCS, vol. 11233, pp. 189–198. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02922-7_13

    Chapter  Google Scholar 

  3. Beğenilmiş, E., Uskudarli, S.: Organized behavior classification of tweet sets using supervised learning methods. In: Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, pp. 1–9. ACM (2018)

    Google Scholar 

  4. Boshmaf, Y., et al.: Íntegro: leveraging victim prediction for robust fake account detection in large scale OSNs. Comput. Secur. 61, 142–168 (2016)

    Article  Google Scholar 

  5. Cai, C., Li, L., Zeng, D.: Detecting social bots by jointly modeling deep behavior and content information. In: Proceedings of the 26th ACM Conference on Information and Knowledge Management, pp. 1995–1998. ACM (2017)

    Google Scholar 

  6. Cao, Q., Yang, X., Yu, J., Palow, C.: Uncovering large groups of active malicious accounts in online social networks. In: Proceedings of the 21st ACM Conference on Computer and Communications Security, pp. 477–488. ACM (2014)

    Google Scholar 

  7. Chakraborty, M., Pal, S., Pramanik, R., Ravindranath Chowdary, C.: Recent developments in social spam detection and combating techniques: a survey. Inf. Process. Manag. 52(6), 1053–1073 (2016)

    Article  Google Scholar 

  8. Chen, H., Liu, J., Lv, Y., Li, M.H., Liu, M., Zheng, Q.: Semi-supervised clue fusion for spammer detection in Sina Weibo. Inf. Fusion 44, 22–32 (2018)

    Article  Google Scholar 

  9. Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of Twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secur. Comput. 9(6), 811–824 (2012)

    Article  Google Scholar 

  10. Fazil, M., Abulaish, M.: A hybrid approach for detecting automated spammers in Twitter. IEEE Trans. Inf. Forensics Secur. 13(11), 2707–2719 (2018)

    Article  Google Scholar 

  11. Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467, 312–322 (2018)

    Article  Google Scholar 

  12. Lian, J., Zhou, X., Zhang, F., Chen, Z., Xie, X., Sun, G.: XDeepFM: combining explicit and implicit feature interactions for recommender systems. In: Proceedings of the 24th ACM Conference on Knowledge Discovery and Data Mining, pp. 1754–1763. ACM (2018)

    Google Scholar 

  13. Lian, Y., Dong, X., Chi, Y., Tang, X., Liu, Y.: An internet water army detection supernetwork model. IEEE Access 7, 55108–55120 (2019)

    Article  Google Scholar 

  14. Loyola-González, O., López-Cuevas, A., Medina-Pérez, M.A., Camiña, B., Ramírez-Márquez, J.E., Monroy, R.: Fusing pattern discovery and visual analytics approaches in tweet propagation. Inf. Fusion 46, 91–101 (2019)

    Article  Google Scholar 

  15. Mohammad, S., Khan, M.U., Ali, M., Liu, L., Shardlow, M., Nawaz, R.: Bot detection using a single post on social media. In: Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, pp. 215–220. IEEE (2019)

    Google Scholar 

  16. Pan, J., Liu, Y., Liu, X., Hu, H.: Discriminating bot accounts based solely on temporal features of microblog behavior. Phys. A 450, 193–204 (2016)

    Article  Google Scholar 

  17. Ping, H., Qin, S.: A social bots detection model based on deep learning algorithm. In: Proceedings of the 18th IEEE International Conference on Communication Technology, pp. 1435–1439. IEEE (2018)

    Google Scholar 

  18. Santia, G.C., Mujib, M.I., Williams, J.R.: Detecting social bots on Facebook in an information veracity context. In: Proceedings of the 13th International AAAI Conference on Web and Social Media, pp. 463–472. AAAI (2019)

    Google Scholar 

  19. Shao, C., Ciampaglia, G.L., Varol, O., Yang, K.C., Flammini, A., Menczer, F.: The spread of low-credibility content by social bots. Nat. Commun. 9(1), 1–9 (2018)

    Article  Google Scholar 

  20. Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the 11th International AAAI Conference on Web and Social Media, pp. 280–289. AAAI (2017)

    Google Scholar 

  21. Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280–1293 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC) under grant nos. 61802270, 61802271, 81602935, and 81773548. Haizhou Wang is the corresponding author. The authors thank anonymous reviewers for their helpful comments to improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haizhou Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, Y., Fang, Y., Shang, S., Wei, L., Jin, J., Wang, H. (2020). Detecting Social Spammers in Sina Weibo Using Extreme Deep Factorization Machine. In: Huang, Z., Beek, W., Wang, H., Zhou, R., Zhang, Y. (eds) Web Information Systems Engineering – WISE 2020. WISE 2020. Lecture Notes in Computer Science(), vol 12342. Springer, Cham. https://doi.org/10.1007/978-3-030-62005-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62005-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62004-2

  • Online ISBN: 978-3-030-62005-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics