共 38 条
- [1] Regulations on Ecological Governance of Network Information Content
- [2] Yu Z D, Yu H Q., Untrusted User Detection in Microblogs, Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 558-564, (2014)
- [3] Dempster A P., Upper and Lower Probabilities Induced by a Multivalued Mapping, The Annals of Mathematical Statistics, 38, 2, pp. 325-339, (1967)
- [4] Ersahin B, Aktas O, Kilinc D, Et al., Twitter Fake Account Detection, Proceedings of the 2017 International Conference on Computer Science and Engineering(UBMK), pp. 388-392, (2017)
- [5] Wu Y H, Fang Y Z, Shang S K, Et al., A Novel Framework for Detecting Social Bots with Deep Neural Networks and Active Learning, Knowledge-Based Systems, 211, (2021)
- [6] Liang Xiaohe, Tian Ruya, Wu Lei, Et al., Microblog Similarity Based on Super Network and Its Application in Microblog Public Opinion Topic Detection, Library and Information Service, 64, 11, pp. 77-86, (2020)
- [7] Mccord M, Chuah M., Spam Detection on Twitter Using Traditional Classifiers, Proceedings of the 8th International Conference on Autonomic and Trusted Computing, pp. 175-186, (2011)
- [8] Chen Huimin, Jin Sichen, Lin Wei, Et al., Quantitative Analysis on the Communication of COVID-19 Related Social Media Rumors, Journal of Computer Research and Development, 58, 7, pp. 1366-1384, (2021)
- [9] Barbon S, Campos G F C, Tavares G M, Et al., Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets, ACM Transactions on Multimedia Computing, Communications, and Applications, 14, 1s, (2018)
- [10] Jia Junjie, Duan Chaoqiang, A Shilling Attack Detection Algorithm Based on Score Dispersion[J], Computer Engineering & Science, 44, 3, pp. 554-562, (2022)