{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T01:40:07Z","timestamp":1726364407521},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3320687","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T17:45:30Z","timestamp":1696009530000},"page":"108365-108385","source":"Crossref","is-referenced-by-count":3,"title":["CrediBot: Applying Bot Detection for Credibility Analysis on Twitter"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0726-1759","authenticated-orcid":false,"given":"Ana","family":"Aguilera","sequence":"first","affiliation":[{"name":"Universidad de Valparaíso, Valparaíso, Chile"}]},{"given":"Pamela","family":"Quinteros","sequence":"additional","affiliation":[{"name":"Universidad de Valparaíso, Valparaíso, Chile"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4859-0428","authenticated-orcid":false,"given":"Irvin","family":"Dongo","sequence":"additional","affiliation":[{"name":"Electrical and Electronics Engineering Department, Universidad Católica San Pablo, Arequipa, Peru"}]},{"given":"Yudith","family":"Cardinale","sequence":"additional","affiliation":[{"name":"Electrical and Electronics Engineering Department, Universidad Católica San Pablo, Arequipa, Peru"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841038"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752287"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-021-00139-3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004887"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423632"},{"key":"ref59","first-page":"209","article-title":"Sparse multinomial logistic regression via Bayesian L1 regularisation","author":"sch\u00f6lkopf","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref14","first-page":"19","article-title":"Bot-ivistm: Assessing information manipulation in social media using network analytics","author":"benigni","year":"2018","journal-title":"Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining"},{"key":"ref58","first-page":"37","article-title":"Feature selection for classification: A review","author":"tang","year":"2014","journal-title":"Data Classification Algorithms and Applications"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47880-7_6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01647-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2196\/26933"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093483"},{"key":"ref10","article-title":"False information on web and social media: A survey","author":"kumar","year":"2018","journal-title":"arXiv 1804 08559"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093420"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026360"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"ref18","first-page":"493","article-title":"Information network or social network? The structure of the Twitter follow graph","author":"myers","year":"2014","journal-title":"Proc Int World Wide Web Conf"},{"key":"ref51","article-title":"Its all in a name: Detecting and labeling bots by their name","author":"beskow","year":"2018","journal-title":"arXiv 1812 05932"},{"key":"ref50","first-page":"185","article-title":"COVID-19 fake news detection on Twitter based on author credibility using information gain and KNN methods COVID-19 fake news detection on Twitter based on author credibility using information gain and KNN methods","volume":"7","author":"saputri","year":"2023","journal-title":"Jurnal RESTI Rekayasa Sistem dan Teknologi Informasi"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752431"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2013.148"},{"key":"ref48","first-page":"6166","article-title":"A real-time system for credibility on Twitter","author":"iftene","year":"2020","journal-title":"Proc 12th Lang Resour Eval Conf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36987-3_17"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"157","DOI":"10.7494\/csci.2015.16.2.157","article-title":"Automated credibility assessment on Twitter","volume":"16","author":"lorek","year":"2015","journal-title":"Comput Sci"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-022-00177-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1108\/17440081111141772"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/app12189081"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427241"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21902-4_22"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49570-1_26"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-319-47880-7_6","article-title":"On profiling bots in social media","author":"oentaryo","year":"2016","journal-title":"Social Informatics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-014-0549-4"},{"key":"ref6","article-title":"A fake follower story: Improving fake accounts detection on Twitter","author":"cresci","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3428757.3429104"},{"key":"ref81","author":"raschka","year":"2022","journal-title":"Machine Learning With PyTorch and Scikit-Learn Develop Machine Learning and Deep Learning Models With Python"},{"key":"ref40","author":"bouzy","year":"2018","journal-title":"Bot sentinel"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-03-2021-0037"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00121-9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00869-w"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref34","first-page":"1","article-title":"Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets","volume":"14","author":"barbon","year":"2018","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"ref78","author":"rosenblatt","year":"1962","journal-title":"Principles of Neurodynamics Perceptrons and the Theory of Brain Mechanisms"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00880-1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11050743"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/08944393211034991"},{"key":"ref75","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-01020-5"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/cyto.990080516"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.019"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.036"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.446"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.an.03.100174.001431"},{"key":"ref39","year":"2018","journal-title":"Tweetbotornot R Package for Detecting Twitter Bots via Machine Learning"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT52121.2021.9616841"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.4310\/SII.2009.v2.n3.a8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51367-6_3"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/EI250167.2020.9347147"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00897-6"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS48664.2019.8987623"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997425"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666593"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3157724"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI51738.2020.00053"},{"key":"ref63","first-page":"4768","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3391812.3396274"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3905\/jfds.2020.1.047"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060623"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102250"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoinf.2021.101224"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-35978-8_30"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.028"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10267924.pdf?arnumber=10267924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T19:23:57Z","timestamp":1698693837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10267924\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":83,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3320687","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}