A review on social spam detection: Challenges, open issues, and future directions

S Rao, AK Verma, T Bhatia - Expert Systems with Applications, 2021 - Elsevier
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …

A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B **ao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks

D Antonakaki, P Fragopoulou, S Ioannidis - Expert systems with …, 2021 - Elsevier
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …

Twitter and research: A systematic literature review through text mining

A Karami, M Lundy, F Webb, YK Dwivedi - IEEE access, 2020 - ieeexplore.ieee.org
Researchers have collected Twitter data to study a wide range of topics. This growing body
of literature, however, has not yet been reviewed systematically to synthesize Twitter-related …

A total error framework for digital traces of human behavior on online platforms

I Sen, F Flöck, K Weller, B Weiß… - Public Opinion …, 2021 - academic.oup.com
People's activities and opinions recorded as digital traces online, especially on social media
and other web-based platforms, offer increasingly informative pictures of the public. They …

A neural network-based ensemble approach for spam detection in Twitter

S Madisetty, MS Desarkar - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the social networking sites get more popular, spammers target these sites to spread
spam posts. Twitter is one of the most popular online social networking sites where users …

DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection

S Liu, G Lin, QL Han, S Wen, J Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Software vulnerability has long been an important but critical research issue in
cybersecurity. Recently, the machine learning (ML)-based approach has attracted …

Learning textual features for Twitter spam detection: A systematic literature review

SB Abkenar, MH Kashani, M Akbari… - Expert Systems with …, 2023 - Elsevier
Background—Nowadays, with the rise of Internet access and mobile devices around the
globe, more people are using social networks for collaboration and receiving real-time …

Data-driven cyber security in perspective—Intelligent traffic analysis

R Coulter, QL Han, L Pan, J Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks.
Traditional approaches resorting to manually defined rules are gradually replaced by …