Detection of Social Network Spam Based on Improved Extreme Learning Machine

被引:18
|
作者
Zhang, Zhijie [1 ]
Hou, Rui [1 ]
Yang, Jin [2 ]
机构
[1] Lingnan Normal Univ, Sch Informat Engn, Zhanjiang 524048, Peoples R China
[2] Guangdong Pharmaceut Univ, Sch Med Informat & Engn, Guangzhou 510006, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Twitter; Feature extraction; Classification algorithms; Machine learning algorithms; Support vector machines; Radio frequency; Social network; spam detection; spam features; machine learning; I2FELM;
D O I
10.1109/ACCESS.2020.3002940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of the online social network, social media like Twitter has been increasingly critical to real life and become the prime objective of spammers. Twitter spam detection refers to a complex task for the involvement of a range of characteristics, and spam and non-spam have caused unbalanced data distribution in Twitter. To solve the mentioned problems, Twitter spam characteristics are analyzed as the user attribute, content, activity and relationship in this study, and a novel spam detection algorithm is designed based on regularized extreme learning machine, called the Improved Incremental Fuzzy-kernel-regularized Extreme Learning Machine (I2FELM), which is used to detect the Twitter spam accurately. As revealed from the experience validation results, the proposed I2FELM can efficiently identify the balanced and unbalanced dataset. Moreover, with few characteristics taken, the I2FELM can more effectively detect spam, which proves the effectiveness of the algorithm.
引用
收藏
页码:112003 / 112014
页数:12
相关论文
共 50 条
  • [31] Network Intrusion Detection Based on Hybrid Rice Algorithm Optimized Extreme Learning Machine
    Zheng, Xiao
    Ye, Zhiwei
    Su, Jun
    Chen, Hongwei
    Wang, Ruoxi
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 149 - 153
  • [32] IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine
    Hasan, Nasimul
    Chen, Zhenxiang
    Zhao, Chuan
    Zhu, Yuhui
    Liu, Cong
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [33] Network Intrusion Detection Based on Kernel Principal Component Analysis and Extreme Learning Machine
    Zhou, Yuan
    Yu, Le
    Liu, Mingshan
    Zhang, Yuanyuan
    Li, Helin
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 860 - 864
  • [34] Counter Propagation Network Based Extreme Learning Machine
    Kayhan, Gokhan
    Iseri, Ismail
    NEURAL PROCESSING LETTERS, 2023, 55 (01) : 857 - 872
  • [35] Counter Propagation Network Based Extreme Learning Machine
    Gökhan Kayhan
    İsmail İşeri
    Neural Processing Letters, 2023, 55 : 857 - 872
  • [36] Network Intrusion Classification Based on Extreme Learning Machine
    Ye, Zhifan
    Yu, Yuanlong
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1642 - 1647
  • [37] Network embedding based on deep extreme learning machine
    Yunfei Chu
    Chunyan Feng
    Caili Guo
    Yaqing Wang
    International Journal of Machine Learning and Cybernetics, 2019, 10 : 2709 - 2724
  • [38] Network embedding based on deep extreme learning machine
    Chu, Yunfei
    Feng, Chunyan
    Guo, Caili
    Wang, Yaqing
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2019, 10 (10) : 2709 - 2724
  • [39] An Improved Self-localization Algorithm for Ad Hoc Network Based on Extreme Learning Machine
    Chang, Xiaohui
    Luo, Xiong
    2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 564 - 569
  • [40] Using Social Network Analysis for Spam Detection
    DeBarr, Dave
    Wechsler, Harry
    ADVANCES IN SOCIAL COMPUTING, PROCEEDINGS, 2010, 6007 : 62 - 69