A review on social spam detection: Challenges, open issues, and future directions
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …
applications such as content sharing, chatting, making friends/followers, customer …
Applications of link prediction in social networks: A review
Link prediction methods anticipate the likelihood of a future connection between two nodes
in a given network. The methods are essential in social networks to infer social interactions …
in a given network. The methods are essential in social networks to infer social interactions …
Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
Detection of bots in social media: a systematic review
Social media bots (automated accounts) attacks are organized crimes that pose potential
threats to public opinion, democracy, public health, stock market and other disciplines. While …
threats to public opinion, democracy, public health, stock market and other disciplines. While …
Machine learning techniques for spam detection in email and IoT platforms: analysis and research challenges
Nowaday, emails are used in almost every field, from business to education. Emails have
two subcategories, ie, ham and spam. Email spam, also called junk emails or unwanted …
two subcategories, ie, ham and spam. Email spam, also called junk emails or unwanted …
Understanding the effect of deplatforming on social networks
Aiming to enhance the safety of their users, social media platforms enforce terms of service
by performing active moderation, including removing content or suspending users …
by performing active moderation, including removing content or suspending users …
The rise of “blockchain”: bibliometric analysis of blockchain study
The blockchain is a technology which accumulates and compiles data into a chain of
multiple blocks. Many blockchain researchers are adopting it in multiple areas. However …
multiple blocks. Many blockchain researchers are adopting it in multiple areas. However …
[HTML][HTML] Fake news outbreak 2021: Can we stop the viral spread?
Social Networks' omnipresence and ease of use has revolutionized the generation and
distribution of information in today's world. However, easy access to information does not …
distribution of information in today's world. However, easy access to information does not …
Twitter spam detection: Survey of new approaches and comparative study
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …
researchers have proposed many detection and defence methods in order to protect Twitter …
Susceptibility to phishing on social network sites: A personality information processing model
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …
websites has evolved to include social network sites (SNSs). This is because phishers are …