Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b38ad50f-b6f5-43d4-bb16-3f0f2cf68d58"}, "_deposit": {"id": "3401", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3401"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3401", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Detecting Social Spam Profile on Twitter", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The fast development of social networkingsites such as imparting, sharing, putting away andoverseeing huge data leads to pull in cybercriminals.Spammers misuse these social networking sites toabuse cyber laws for their unlawful arts. They startwith email, and then quickly spread to newadvancements, for example, texting, newsgroups andsmart phones. As online social networks, forexample, MySpace, Facebook and Twitter turned outto be progressively well known, spammers rapidlyfound another home for their spamming purposes.Spamming activities of social spammers not onlycauses dangerous for normal social network usersbut also annoys to these users. The aim of this paperis to develop social spammer detection approach withlow cost and low overhead. The detection approachis a three-phase process: (1) features extraction, (2)features selection and (3) classification. Validation ofthis approach is tested with 1KS-10KN dataset andCRESCI-2015 dataset."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "ICCA 2019 Proceedings Book-pages-52-58.pdf", "filesize": [{"value": "234 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 234000.0, "url": {"url": "https://meral.edu.mm/record/3401/files/ICCA 2019 Proceedings Book-pages-52-58.pdf"}, "version_id": "dad985ac-fd70-4d6d-95e6-faf2264ef35b"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Seventeenth International Conference on Computer Applications(ICCA 2019)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Swe, Myo Myo"}, {"subitem_authors_fullname": "Myo, Nyein Nyein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-02-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1156"}, "item_title": "Detecting Social Spam Profile on Twitter", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003401", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3401", "relation": {}, "relation_version_is_last": true, "title": ["Detecting Social Spam Profile on Twitter"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Detecting Social Spam Profile on Twitter

http://hdl.handle.net/20.500.12678/0000003401
http://hdl.handle.net/20.500.12678/0000003401
8119a493-576a-4531-97d5-a955a0d3054b
b38ad50f-b6f5-43d4-bb16-3f0f2cf68d58
None
Preview
Name / File License Actions
ICCA ICCA 2019 Proceedings Book-pages-52-58.pdf (234 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:05:30.965518
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL