{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:53:18Z","timestamp":1730328798943,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1942610","CNS-2247867","CNS-2247868","CNS-2114411","CNS-2114407"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678911","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"353-367","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0006-2928-7377","authenticated-orcid":false,"given":"Mohammad Hammas","family":"Saeed","sequence":"first","affiliation":[{"name":"Boston University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7520-5279","authenticated-orcid":false,"given":"Shiza","family":"Ali","sequence":"additional","affiliation":[{"name":"Boston University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0789-3898","authenticated-orcid":false,"given":"Pujan","family":"Paudel","sequence":"additional","affiliation":[{"name":"Boston University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4223-1304","authenticated-orcid":false,"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Binghamton University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6162-578X","authenticated-orcid":false,"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033666"},{"key":"e_1_3_2_1_2_1","unstructured":"Bobby Allyn. 2020. Study Exposes Russia Disinformation Campaign That Operated In The Shadows For 6 Years. https:\/\/www.npr.org\/2020\/06\/16\/878169027\/study-exposes-russia-disinformation-campaign-that-operated-in-the-shadows-for-6-."},{"volume-title":"\u201cfactory","author":"Antonov Evgeny","key":"e_1_3_2_1_3_1","unstructured":"Evgeny Antonov. 2017. Professions that people hate: Internet troll about the \u201cfactory\u201d, patriotism and Milonov. https:\/\/paperpaper-ru.translate.goog\/troll\/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317734157"},{"key":"e_1_3_2_1_6_1","unstructured":"Fabricio Benevenuto Gabriel Magno Tiago Rodrigues and Virgilio Almeida. 2010. Detecting spammers on twitter. In Collaboration electronic messaging anti-abuse and spam conference (CEAS)."},{"volume-title":"Social bots distort the 2016 US Presidential election online discussion. First Monday 21, 11","year":"2016","author":"Bessi Alessandro","key":"e_1_3_2_1_7_1","unstructured":"Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First Monday 21, 11 (2016)."},{"volume-title":"ISOC Network and Distributed Systems Security Symposium (NDSS).","year":"2012","author":"Cai Zhuhua","key":"e_1_3_2_1_8_1","unstructured":"Zhuhua Cai and Christopher Jermaine. 2012. The latent community model for detecting sybil attacks in social networks. In ISOC Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_10_1","unstructured":"Bilva Chandra and Lev\u00a0Navarre Chao. 2023. Dismantling the Disinformation Business of Chinese Influence Operations. https:\/\/www.rand.org\/blog\/2023\/10\/dismantling-the-disinformation-business-of-chinese.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"volume-title":"ISOC Network and Distributed Systems Security Symposium (NDSS).","year":"2009","author":"Danezis George","key":"e_1_3_2_1_13_1","unstructured":"George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks.. In ISOC Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274738"},{"volume-title":"Towards Detecting Compromised Accounts on Social Networks. Transactions on Dependable and Secure Computing (TDSC)","year":"2015","author":"Egele Manuel","key":"e_1_3_2_1_16_1","unstructured":"Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2015. Towards Detecting Compromised Accounts on Social Networks. Transactions on Dependable and Secure Computing (TDSC) (2015)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds"},{"key":"e_1_3_2_1_18_1","unstructured":"Georgia Fenwick. 2020. Flesch Reading Ease: Everything You Need to Know. https:\/\/writingstudio.com\/blog\/flesch-reading-ease\/."},{"volume-title":"Disinformation and social bot operations in the run up to the 2017 French presidential election. ArXiv 1707.00086","year":"2017","author":"Ferrara Emilio","key":"e_1_3_2_1_19_1","unstructured":"Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. ArXiv 1707.00086 (2017)."},{"volume-title":"The rise of social bots. Commun. ACM","year":"2016","author":"Ferrara Emilio","key":"e_1_3_2_1_20_1","unstructured":"Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.08.008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Patxi Gal\u00e1n-Garc\u00eda Jos\u00e9 Puerta Carlos Laorden Igor Santos and Pablo Bringas. 2014. Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying. Vol.\u00a0239. 419\u2013428. https:\/\/doi.org\/10.1007\/978-3-319-01854-6_43","DOI":"10.1007\/978-3-319-01854-6_43"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"volume-title":"Goldstein and Shelby Grossman","year":"2021","author":"A.","key":"e_1_3_2_1_24_1","unstructured":"Josh\u00a0A. Goldstein and Shelby Grossman. 2021. How disinformation evolved in 2020. https:\/\/www.brookings.edu\/techstream\/how-disinformation-evolved-in-2020\/."},{"volume-title":"AAAI International Conference on Web and Social Media (ICWSM).","year":"2016","author":"Hegelich Simon","key":"e_1_3_2_1_25_1","unstructured":"Simon Hegelich and Dietmar Janetzko. 2016. Are Social Bots on Twitter Political Actors? Empirical Evidence from a Ukrainian Social Botnet. In AAAI International Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1293951.1293954"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jarmac.2017.07.008"},{"key":"e_1_3_2_1_28_1","first-page":"18","article-title":"The R Journal: Classification and regression by randomForest","volume":"2","author":"Liaw Andy","year":"2002","unstructured":"Andy Liaw and Matthew Wiener. 2002. The R Journal: Classification and regression by randomForest. R News 2 (2002), 18\u201322. Issue 3. https:\/\/journal.r-project.org\/articles\/RN-2002-022\/.","journal-title":"R News"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Yang Liu and Yi-Fang\u00a0Brook Wu. 2018. Early Detection of Fake News on Social Media through Propagation Path Classification with Recurrent and Convolutional Networks. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence (New Orleans Louisiana USA) (AAAI\u201918\/IAAI\u201918\/EAAI\u201918). AAAI Press Article 44 8\u00a0pages.","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Luca Luceri Silvia Giordano and Emilio Ferrara. 2020. Detecting Troll Behavior via Inverse Reinforcement Learning: A Case Study of Russian Trolls in the 2016 US Election. In ICWSM.","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"e_1_3_2_1_31_1","unstructured":"Shibani Mahtani and Regine Cabato. 2019. Why crafty Internet trolls in the Philippines may be coming to a website near you. https:\/\/www.washingtonpost.com\/world\/asia_pacific\/why-crafty-internet-trolls-in-the-philippines-may-be-coming-to-a-website-near-you\/2019\/07\/25\/c5d42ee2-5c53-11e9-98d4-844088d135f2_story.html."},{"key":"e_1_3_2_1_32_1","unstructured":"Alexander Martin. 2022. After more than 200 takedowns Meta confirms covert online campaigns have gone global. https:\/\/therecord.media\/after-more-than-200-takedowns-meta-confirms-covert-online-campaigns-have-gone-global."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Todor Mihaylov and Preslav Nakov. 2016. Hunting for Troll Comments in News Community Forums. In ACL.","DOI":"10.18653\/v1\/P16-2065"},{"key":"e_1_3_2_1_34_1","unstructured":"Lynnette Hui\u00a0Xian Ng and Kathleen\u00a0M. Carley. 2022. BotBuster: Multi-platform Bot Detection Using A Mixture of Experts. arxiv:2207.13658\u00a0[cs.SI]"},{"key":"e_1_3_2_1_35_1","unstructured":"Stanford\u00a0Internet Observatory. 2020. A US PR Firm Steps Into Contested Elections. https:\/\/cyber.fsi.stanford.edu\/io\/news\/us-pr-firm-steps-contested-elections."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0227821"},{"volume-title":"Detecting and Tracking Political Abuse in Social Media. In AAAI International Conference on Web and Social Media (ICWSM).","year":"2011","author":"Ratkiewicz Jacob","key":"e_1_3_2_1_37_1","unstructured":"Jacob Ratkiewicz, Michael Conover, Mark\u00a0R. Meiss, Bruno Gon\u00e7alves, Alessandro Flammini, and Filippo Menczer. 2011. Detecting and Tracking Political Abuse in Social Media. In AAAI International Conference on Web and Social Media (ICWSM)."},{"volume-title":"TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit. In IEEE Symposium on Security and Privacy.","year":"2022","author":"Saeed Mohammad\u00a0Hammas","key":"e_1_3_2_1_38_1","unstructured":"Mohammad\u00a0Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano\u00a0De Cristofaro, Savvas Zannettou, and Gianluca Stringhini. 2022. TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"e_1_3_2_1_40_1","unstructured":"Scikit. 2023. Feature importances with a forest of trees. https:\/\/scikit-learn.org\/stable\/auto_examples\/ensemble\/plot_forest_importances.html."},{"key":"e_1_3_2_1_41_1","unstructured":"Chengcheng Shao Giovanni\u00a0Luca Ciampaglia Onur Varol Kaicheng Yang Alessandro Flammini and Filippo Menczer. 2018. The spread of low-credibility content by social bots. arxiv:1707.07592\u00a0[cs.SI]"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196087"},{"volume-title":"Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study. CoRR abs\/2112.04913","year":"2021","author":"Shevtsov Alexander","key":"e_1_3_2_1_44_1","unstructured":"Alexander Shevtsov, Christos Tzagkarakis, Despoina Antonakaki, and Sotiris Ioannidis. 2021. Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study. CoRR abs\/2112.04913 (2021). arXiv:2112.04913https:\/\/arxiv.org\/abs\/2112.04913"},{"volume-title":"A first look at COVID-19 information and misinformation sharing on Twitter. CoRR abs\/2003.13907","year":"2020","author":"Singh Lisa","key":"e_1_3_2_1_45_1","unstructured":"Lisa Singh, Shweta Bansal, Leticia Bode, Ceren Budak, Guangqing Chi, Kornraphop Kawintiranon, Colton Padden, Rebecca Vanarsdall, Emily\u00a0K. Vraga, and Yanchen Wang. 2020. A first look at COVID-19 information and misinformation sharing on Twitter. CoRR abs\/2003.13907 (2020). arXiv:2003.13907https:\/\/arxiv.org\/abs\/2003.13907"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211009073"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14878"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"e_1_3_2_1_49_1","unstructured":"Leo Steward Ahmer Arif and Kate Starbird. 2018. Examining Trolls and Polarization with a Retweet Network. In MIS2."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377781"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"volume-title":"USENIX Security Symposium.","year":"2015","author":"Stringhini Gianluca","key":"e_1_3_2_1_52_1","unstructured":"Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. { EVILCOHORT} : Detecting communities of malicious accounts on online services. In USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007326"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"e_1_3_2_1_56_1","unstructured":"Twitter. 2023. Twitter Moderation Research Consortium. https:\/\/transparency.twitter.com\/en\/reports\/moderation-research.html."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"e_1_3_2_1_58_1","unstructured":"John Villasenor. 2020. How to deal with AI-enabled disinformation. https:\/\/www.brookings.edu\/articles\/how-to-deal-with-ai-enabled-disinformation\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v18i1.31409"},{"volume-title":"USENIX Security Symposium.","year":"2014","author":"Viswanath Bimal","key":"e_1_3_2_1_60_1","unstructured":"Bimal Viswanath, Muhammad\u00a0Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna\u00a0P Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2014. Towards Detecting Anomalous User Behavior in Online Social Networks.. In USENIX Security Symposium."},{"volume-title":"The spread of true and false news online. Science","year":"2018","author":"Vosoughi Soroush","key":"e_1_3_2_1_61_1","unstructured":"Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science (2018)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"volume-title":"USENIX Security Symposium.","year":"2013","author":"Wang Gang","key":"e_1_3_2_1_63_1","unstructured":"Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben\u00a0Y Zhao. 2013. You Are How You Click: Clickstream Analysis for Sybil Detection.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-34245-1"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380256"},{"volume-title":"Distance Metric Learning for Large Margin Nearest Neighbor Classification. J. Mach. Learn. Res. 10 (jun","year":"2009","author":"Weinberger Q.","key":"e_1_3_2_1_66_1","unstructured":"Kilian\u00a0Q. Weinberger and Lawrence\u00a0K. Saul. 2009. Distance Metric Learning for Large Margin Nearest Neighbor Classification. J. Mach. Learn. Res. 10 (jun 2009), 207\u2013244."},{"key":"e_1_3_2_1_67_1","unstructured":"Wikipedia. 2022. Kolmogorov-Smirnov test. https:\/\/en.wikipedia.org\/wiki\/Kolmogorov-Smirnov_test."},{"key":"e_1_3_2_1_68_1","unstructured":"Melissa\u00a0De Witte. 2022. Disinformation about the COVID-19 vaccine is a problem. Stanford researchers are trying to solve it. https:\/\/news.stanford.edu\/press-releases\/2022\/02\/24\/curbing-spread-cs-disinformation\/."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","unstructured":"Y. Wu D. Guozhong W. Wei S. Guowei G. Liangyi Y. Miao Li Jiguang and H. Yaxue. 2014. Detecting Bots in Follower Markets. Communications in Computer and Information Science 472 (01 2014) 525\u2013530. https:\/\/doi.org\/10.1007\/978-3-662-45049-9_85","DOI":"10.1007\/978-3-662-45049-9_85"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1621921"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"},{"volume-title":"AAAI International Conference on Web and Social Media (ICWSM).","year":"2019","author":"Zannettou Savvas","key":"e_1_3_2_1_72_1","unstructured":"Savvas Zannettou, Barry Bradlyn, Emiliano De\u00a0Cristofaro, Gianluca Stringhini, and Jeremy Blackburn. 2019. Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter. In AAAI International Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Savvas Zannettou Tristan Caulfield Emiliano De\u00a0Cristofaro Michael Sirivianos Gianluca Stringhini and Jeremy Blackburn. 2019. Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the web. In WWW Companion.","DOI":"10.1145\/3308560.3316495"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326016"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309699"},{"volume-title":"Defending against neural fake news. Advances in neural information processing systems 32","year":"2019","author":"Zellers Rowan","key":"e_1_3_2_1_76_1","unstructured":"Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, and Yejin Choi. 2019. Defending against neural fake news. Advances in neural information processing systems 32 (2019)."}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '24","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3678890.3678911","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T10:32:01Z","timestamp":1727692321000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":76,"alternative-id":["10.1145\/3678890.3678911","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678911","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}