Skip to main content
Top
Published in: Soft Computing 6/2021

01-01-2021 | Methodologies and Application

An intrinsic authorship verification technique for compromised account detection in social networks

Authors: Ravneet Kaur, Sarbjeet Singh, Harish Kumar

Published in: Soft Computing | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The proliferation of social networks resulted in a remarkable increase in their popularity empowering users to create, share and exchange content for interaction and communication among them. However, these have also opened new avenues for malicious and unauthorized use. This paper presents an intrinsic profiling-based technique for the assessment of authorship verification and its application toward detection of compromised accounts. For the same, efficiency of different textual features has been examined. Four categories of features, namely content free, content specific, stylometric and folksonomy, are extracted and evaluated. Experiments are performed with 3057 twitter users taking 4000 latest tweets for each user. Various feature selection techniques are used to rank and select optimal features for each user which are further combined using a popular rank aggregation technique called BORDA. The problem of authorship verification in this paper is studied as a unary classification problem. Performance of various one-class classifiers, namely Local Outlier Factor, Isolation Forest and One-Class SVM, is analyzed on the basis of different evaluation metrics. Experimental results depict that OCC-SVM with rbf kernel outperformed other one class classifiers attaining an average F-score of 87.29% and Matthews Correlation Coefficient of 74.42% under varied parameter settings.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Al-Ayyoub M, Al-andoli M, Jararweh Y, Smadi M, Gupta B (2019) Improving fuzzy c-mean-based community detection in social networks using dynamic parallelism. Comput Electr Eng 74:533–546CrossRef Al-Ayyoub M, Al-andoli M, Jararweh Y, Smadi M, Gupta B (2019) Improving fuzzy c-mean-based community detection in social networks using dynamic parallelism. Comput Electr Eng 74:533–546CrossRef
go back to reference Al-Qurishi M, Alhuzami S, AlRubaian M, Hossain MS, Alamri A, Rahman MA (2018) User profiling for big social media data using standing ovation model. Multimed Tools Appl 77(9):11179–11201CrossRef Al-Qurishi M, Alhuzami S, AlRubaian M, Hossain MS, Alamri A, Rahman MA (2018) User profiling for big social media data using standing ovation model. Multimed Tools Appl 77(9):11179–11201CrossRef
go back to reference Amato F, Moscato V, Picariello A, Sperli’ì G (2019) Extreme events management using multimedia social networks. Future Gener Comput Syst 94:444–452CrossRef Amato F, Moscato V, Picariello A, Sperli’ì G (2019) Extreme events management using multimedia social networks. Future Gener Comput Syst 94:444–452CrossRef
go back to reference Barbon S, Igawa RA, Zarpelao BB (2017) Authorship verification applied to detection of compromised accounts on online social networks. Multimed Tools Appl 76(3):3213–3233CrossRef Barbon S, Igawa RA, Zarpelao BB (2017) Authorship verification applied to detection of compromised accounts on online social networks. Multimed Tools Appl 76(3):3213–3233CrossRef
go back to reference Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: ACM sigmod record, vol 29. ACM, pp 93–104 Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: ACM sigmod record, vol 29. ACM, pp 93–104
go back to reference Brocardo ML, Traore I (2014) Continuous authentication using micro-messages. In: 2014 12th annual international conference on privacy, security and trust (PST). IEEE, pp 179–188 Brocardo ML, Traore I (2014) Continuous authentication using micro-messages. In: 2014 12th annual international conference on privacy, security and trust (PST). IEEE, pp 179–188
go back to reference Brocardo ML, Traore I, Woungang I (2015) Authorship verification of e-mail and tweet messages applied for continuous authentication. J Comput Syst Sci 81(8):1429–1440MathSciNetMATHCrossRef Brocardo ML, Traore I, Woungang I (2015) Authorship verification of e-mail and tweet messages applied for continuous authentication. J Comput Syst Sci 81(8):1429–1440MathSciNetMATHCrossRef
go back to reference Brocardo ML, Traore I, Woungang I, Obaidat MS (2017) Authorship verification using deep belief network systems. Int J Commun Syst 30(12):1–10CrossRef Brocardo ML, Traore I, Woungang I, Obaidat MS (2017) Authorship verification using deep belief network systems. Int J Commun Syst 30(12):1–10CrossRef
go back to reference Brocardo ML, Traore I, Woungang I (2019) Continuous authentication using writing style. In: Obaidat M, Traore I, Woungang I (eds) Biometric-based physical and cybersecurity systems. Springer, Berlin, pp 211–232CrossRef Brocardo ML, Traore I, Woungang I (2019) Continuous authentication using writing style. In: Obaidat M, Traore I, Woungang I (eds) Biometric-based physical and cybersecurity systems. Springer, Berlin, pp 211–232CrossRef
go back to reference Chakraborty M, Pal S, Pramanik R, Chowdary CR (2016) Recent developments in social spam detection and combating techniques: a survey. Inf Process Manag 52(6):1053–1073CrossRef Chakraborty M, Pal S, Pramanik R, Chowdary CR (2016) Recent developments in social spam detection and combating techniques: a survey. Inf Process Manag 52(6):1053–1073CrossRef
go back to reference de Borda JC (1784) Mémoire sur les élections au scrutin de Borda JC (1784) Mémoire sur les élections au scrutin
go back to reference Dwork C, Kumar R, Naor M, Sivakumar D (2001) Rank aggregation methods for the web. In: Proceedings of the 10th international conference on World Wide Web. ACM, pp 613–622 Dwork C, Kumar R, Naor M, Sivakumar D (2001) Rank aggregation methods for the web. In: Proceedings of the 10th international conference on World Wide Web. ACM, pp 613–622
go back to reference Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans Dependable Secure Comput 14(4):447–460CrossRef Egele M, Stringhini G, Kruegel C, Vigna G (2017) Towards detecting compromised accounts on social networks. IEEE Trans Dependable Secure Comput 14(4):447–460CrossRef
go back to reference Feng W, Zhang Z, Wang J, Han L (2016) A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption. Multimed Tools Appl 75(21):13995–14014CrossRef Feng W, Zhang Z, Wang J, Han L (2016) A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption. Multimed Tools Appl 75(21):13995–14014CrossRef
go back to reference Green RM, Sheppard JW (2013) Comparing frequency-and style-based features for twitter author identification. In: FLAIRS conference. AAAI, pp 64–69 Green RM, Sheppard JW (2013) Comparing frequency-and style-based features for twitter author identification. In: FLAIRS conference. AAAI, pp 64–69
go back to reference Gupta BB, Perez GM, Agrawal DP, Gupta D (2020) Handbook of computer networks and cyber security. Springer, BerlinCrossRef Gupta BB, Perez GM, Agrawal DP, Gupta D (2020) Handbook of computer networks and cyber security. Springer, BerlinCrossRef
go back to reference Halvani O, Steinebach M (2014) Vebav-a simple, scalable and fast authorship verification scheme. In: CLEF (working notes), pp 1049–1062 Halvani O, Steinebach M (2014) Vebav-a simple, scalable and fast authorship verification scheme. In: CLEF (working notes), pp 1049–1062
go back to reference Halvani O, Graner L, Vogel I (2018a) Authorship verification in the absence of explicit features and thresholds. In: European conference on information retrieval. Springer, pp 454–465 Halvani O, Graner L, Vogel I (2018a) Authorship verification in the absence of explicit features and thresholds. In: European conference on information retrieval. Springer, pp 454–465
go back to reference Halvani O, Winter C, Graner L (2018b) Unary and binary classification approaches and their implications for authorship verification. arXiv preprint arXiv:1901.00399 Halvani O, Winter C, Graner L (2018b) Unary and binary classification approaches and their implications for authorship verification. arXiv preprint arXiv:​1901.​00399
go back to reference Igawa RA, Almeida A, Zarpelão B, Barbon S Jr (2016) Recognition on online social network by user’s writing style. iSys-Revista Brasileira de Sistemas de Informação 8(3):64–85 Igawa RA, Almeida A, Zarpelão B, Barbon S Jr (2016) Recognition on online social network by user’s writing style. iSys-Revista Brasileira de Sistemas de Informação 8(3):64–85
go back to reference Inuwa-Dutse I, Liptrott M, Korkontzelos I (2018) Detection of spam-posting accounts on twitter. Neurocomputing 315:496–511CrossRef Inuwa-Dutse I, Liptrott M, Korkontzelos I (2018) Detection of spam-posting accounts on twitter. Neurocomputing 315:496–511CrossRef
go back to reference Jankowska M, Keselj V, Milios E (2013) Proximity based one-class classification with common n-gram dissimilarity for authorship verification task. In: CLEF 2013 evaluation labs and workshop—working notes papers, pp 23–26 Jankowska M, Keselj V, Milios E (2013) Proximity based one-class classification with common n-gram dissimilarity for authorship verification task. In: CLEF 2013 evaluation labs and workshop—working notes papers, pp 23–26
go back to reference Javed A, Burnap P, Rana O (2019) Prediction of drive-by download attacks on twitter. Inf Process Manag 56(3):1133–1145CrossRef Javed A, Burnap P, Rana O (2019) Prediction of drive-by download attacks on twitter. Inf Process Manag 56(3):1133–1145CrossRef
go back to reference Kaur R, Singh S, Kumar H (2018a) Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches. J Netw Comput Appl 112:53–88CrossRef Kaur R, Singh S, Kumar H (2018a) Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches. J Netw Comput Appl 112:53–88CrossRef
go back to reference Kaur R, Singh S, Kumar H (2018b) Authcom: authorship verification and compromised account detection in online social networks using ahp-topsis embedded profiling based technique. Expert Syst Appl 113:397–414CrossRef Kaur R, Singh S, Kumar H (2018b) Authcom: authorship verification and compromised account detection in online social networks using ahp-topsis embedded profiling based technique. Expert Syst Appl 113:397–414CrossRef
go back to reference Kocher M, Savoy J (2016) Unine at clef 2016: author profiling. In: CLEF (working notes), pp 903–911 Kocher M, Savoy J (2016) Unine at clef 2016: author profiling. In: CLEF (working notes), pp 903–911
go back to reference Kocher M, Savoy J (2017) A simple and efficient algorithm for authorship verification. J Assoc Inf Sci Technol 68(1):259–269CrossRef Kocher M, Savoy J (2017) A simple and efficient algorithm for authorship verification. J Assoc Inf Sci Technol 68(1):259–269CrossRef
go back to reference Koppel M, Schler J (2004) Authorship verification as a one-class classification problem. In: Proceedings of the 21st international conference on machine learning. ACM, p 62 Koppel M, Schler J (2004) Authorship verification as a one-class classification problem. In: Proceedings of the 21st international conference on machine learning. ACM, p 62
go back to reference Koppel M, Winter Y (2014) Determining if two documents are written by the same author. J Assoc Inf Sci Technol 65(1):178–187CrossRef Koppel M, Winter Y (2014) Determining if two documents are written by the same author. J Assoc Inf Sci Technol 65(1):178–187CrossRef
go back to reference Li R, Wang S, Deng H, Wang R, Chang KC-C (2012) Towards social user profiling: unified and discriminative influence model for inferring home locations. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 1023–1031 Li R, Wang S, Deng H, Wang R, Chang KC-C (2012) Towards social user profiling: unified and discriminative influence model for inferring home locations. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 1023–1031
go back to reference Li JS, Chen L-C, Monaco JV, Singh P, Tappert CC (2016) A comparison of classifiers and features for authorship authentication of social networking messages. Concurr Comput Pract Exp 29(14):1–15 Li JS, Chen L-C, Monaco JV, Singh P, Tappert CC (2016) A comparison of classifiers and features for authorship authentication of social networking messages. Concurr Comput Pract Exp 29(14):1–15
go back to reference Li C, Zhang Z, Zhang L (2018) A novel authorization scheme for multimedia social networks under cloud storage method by using ma-cp-abe. Int J Cloud Appl Comput 8(3):32–47 Li C, Zhang Z, Zhang L (2018) A novel authorization scheme for multimedia social networks under cloud storage method by using ma-cp-abe. Int J Cloud Appl Comput 8(3):32–47
go back to reference Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 8th IEEE international conference on data mining. IEEE, pp 413–422 Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 8th IEEE international conference on data mining. IEEE, pp 413–422
go back to reference Lorena LH, Carvalho AC, Lorena AC (2015) Filter feature selection for one-class classification. J Intell Robot Syst 80(1):227–243CrossRef Lorena LH, Carvalho AC, Lorena AC (2015) Filter feature selection for one-class classification. J Intell Robot Syst 80(1):227–243CrossRef
go back to reference Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inf Sci 260:64–73CrossRef
go back to reference Namsrai E, Munkhdalai T, Li M, Shin J-H, Namsrai O-E, Ryu KH (2013) A feature selection-based ensemble method for arrhythmia classification. J Inf Process Syst 9(1):31–40CrossRef Namsrai E, Munkhdalai T, Li M, Shin J-H, Namsrai O-E, Ryu KH (2013) A feature selection-based ensemble method for arrhythmia classification. J Inf Process Syst 9(1):31–40CrossRef
go back to reference Neal T, Sundararajan K, Woodard D (2018) Exploiting linguistic style as a cognitive biometric for continuous verification. In: 2018 international conference on biometrics (ICB). IEEE, pp 270–276 Neal T, Sundararajan K, Woodard D (2018) Exploiting linguistic style as a cognitive biometric for continuous verification. In: 2018 international conference on biometrics (ICB). IEEE, pp 270–276
go back to reference Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825–2830MathSciNetMATH Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825–2830MathSciNetMATH
go back to reference Peng J, Choo K-KR, Ashman H (2016) Bit-level n-gram based forensic authorship analysis on social media: identifying individuals from linguistic profiles. J Netw Comput Appl 70:171–182CrossRef Peng J, Choo K-KR, Ashman H (2016) Bit-level n-gram based forensic authorship analysis on social media: identifying individuals from linguistic profiles. J Netw Comput Appl 70:171–182CrossRef
go back to reference Prati RC (2012) Combining feature ranking algorithms through rank aggregation. In: The 2012 international joint conference on neural networks (IJCNN). IEEE, pp 1–8 Prati RC (2012) Combining feature ranking algorithms through rank aggregation. In: The 2012 international joint conference on neural networks (IJCNN). IEEE, pp 1–8
go back to reference Ruan X, Wu Z, Wang H, Jajodia S (2016) Profiling online social behaviors for compromised account detection. IEEE Trans Inf Forensics Secur 11(1):176–187CrossRef Ruan X, Wu Z, Wang H, Jajodia S (2016) Profiling online social behaviors for compromised account detection. IEEE Trans Inf Forensics Secur 11(1):176–187CrossRef
go back to reference Saari D (2001) Chaotic elections!: a mathematician looks at voting. American Mathematical Society, ProvidenceMATH Saari D (2001) Chaotic elections!: a mathematician looks at voting. American Mathematical Society, ProvidenceMATH
go back to reference Sageder J, Demleitner A, Irlbacher O, Wimmer R (2019) Applying voting methods in user research. In: Proceedings of Mensch und computer 2019, pp 571–575 Sageder J, Demleitner A, Irlbacher O, Wimmer R (2019) Applying voting methods in user research. In: Proceedings of Mensch und computer 2019, pp 571–575
go back to reference Sahoo SR, Gupta BB (2019) Hybrid approach for detection of malicious profiles in twitter. Comput Elect Eng 76:65–81CrossRef Sahoo SR, Gupta BB (2019) Hybrid approach for detection of malicious profiles in twitter. Comput Elect Eng 76:65–81CrossRef
go back to reference Schölkopf B, Williamson RC, Smola AJ, Shawe-Taylor J, Platt JC (2000) Support vector method for novelty detection. Adv Neural Inf Process Syst 12:582–588 Schölkopf B, Williamson RC, Smola AJ, Shawe-Taylor J, Platt JC (2000) Support vector method for novelty detection. Adv Neural Inf Process Syst 12:582–588
go back to reference Seidman S (2013) Authorship verification using the impostors method. In: CLEF 2013 evaluation labs and workshop-online working notes, Citeseer Seidman S (2013) Authorship verification using the impostors method. In: CLEF 2013 evaluation labs and workshop-online working notes, Citeseer
go back to reference Serrai W, Abdelli A, Mokdad L, Hammal Y (2017) Towards an efficient and a more accurate web service selection using mcdm methods. J Comput Sci 22:253–267CrossRef Serrai W, Abdelli A, Mokdad L, Hammal Y (2017) Towards an efficient and a more accurate web service selection using mcdm methods. J Comput Sci 22:253–267CrossRef
go back to reference Seyler D, Li L, Zhai C (2018) Identifying compromised accounts on social media using statistical text analysis. arXiv preprint arXiv:1804.07247 Seyler D, Li L, Zhai C (2018) Identifying compromised accounts on social media using statistical text analysis. arXiv preprint arXiv:​1804.​07247
go back to reference Shen Q, Diao R, Su P (2012) Feature selection ensemble. Turing-100 10:289–306 Shen Q, Diao R, Su P (2012) Feature selection ensemble. Turing-100 10:289–306
go back to reference Singh M, Bansal D, Sofat S (2018) Who is who on twitter-spammer, fake or compromised account? A tool to reveal true identity in real-time. Cybern Syst 49(1):1–25CrossRef Singh M, Bansal D, Sofat S (2018) Who is who on twitter-spammer, fake or compromised account? A tool to reveal true identity in real-time. Cybern Syst 49(1):1–25CrossRef
go back to reference Sokolova M, Lapalme G (2009) A systematic analysis of performance measures for classification tasks. Inf Process Manag 45(4):427–437CrossRef Sokolova M, Lapalme G (2009) A systematic analysis of performance measures for classification tasks. Inf Process Manag 45(4):427–437CrossRef
go back to reference Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3):538–556CrossRef Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3):538–556CrossRef
go back to reference Trång D, Johansson F, Rosell M (2015) Evaluating algorithms for detection of compromised social media user accounts. In: 2nd European network intelligence conference. IEEE, pp 75–82 Trång D, Johansson F, Rosell M (2015) Evaluating algorithms for detection of compromised social media user accounts. In: 2nd European network intelligence conference. IEEE, pp 75–82
go back to reference Tsymbal A, Pechenizkiy M, Cunningham P (2003) Diversity in ensemble feature selection. The University of Dublin: technical report TCD-CS-2003-44 Tsymbal A, Pechenizkiy M, Cunningham P (2003) Diversity in ensemble feature selection. The University of Dublin: technical report TCD-CS-2003-44
go back to reference Tsymbal A, Pechenizkiy M, Cunningham P (2005) Diversity in search strategies for ensemble feature selection. Inf Fusion 6(1):83–98CrossRef Tsymbal A, Pechenizkiy M, Cunningham P (2005) Diversity in search strategies for ensemble feature selection. Inf Fusion 6(1):83–98CrossRef
go back to reference Van Der Walt E, Eloff J (2018) Using machine learning to detect fake identities: bots vs humans. IEEE Access 6:6540–6549CrossRef Van Der Walt E, Eloff J (2018) Using machine learning to detect fake identities: bots vs humans. IEEE Access 6:6540–6549CrossRef
go back to reference Velayudhan SP, Somasundaram MSB (2019) Compromised account detection in online social networks: a survey. Concurr Comput Practi Exp 31:e5346 Velayudhan SP, Somasundaram MSB (2019) Compromised account detection in online social networks: a survey. Concurr Comput Practi Exp 31:e5346
go back to reference Wald R, Khoshgoftaar TM, Dittman D, Awada W, Napolitano A (2012) An extensive comparison of feature ranking aggregation techniques in bioinformatics. In: 2012 IEEE 13th international conference on information reuse and integration (IRI). IEEE, pp 377–384 Wald R, Khoshgoftaar TM, Dittman D, Awada W, Napolitano A (2012) An extensive comparison of feature ranking aggregation techniques in bioinformatics. In: 2012 IEEE 13th international conference on information reuse and integration (IRI). IEEE, pp 377–384
go back to reference Wang G, Park J, Sandhu R, Wang J, Gui X (2019) Dynamic trust evaluation model based on bidding and multi-attributes for social networks. Int J High Perform Comput Netw 13(4):436–454CrossRef Wang G, Park J, Sandhu R, Wang J, Gui X (2019) Dynamic trust evaluation model based on bidding and multi-attributes for social networks. Int J High Perform Comput Netw 13(4):436–454CrossRef
go back to reference Wu T, Wen S, Xiang Y, Zhou W (2018) Twitter spam detection: survey of new approaches and comparative study. Comput Secur 76:265–284CrossRef Wu T, Wen S, Xiang Y, Zhou W (2018) Twitter spam detection: survey of new approaches and comparative study. Comput Secur 76:265–284CrossRef
go back to reference Zhang X, Ghorbani AA (2020) An overview of online fake news: Characterization, detection, and discussion. Info Process Manag 57(2):1–26 Zhang X, Ghorbani AA (2020) An overview of online fake news: Characterization, detection, and discussion. Info Process Manag 57(2):1–26
go back to reference Zhang Z, Sun R, Zhao C, Wang J, Chang CK, Gupta BB (2017) Cyvod: a novel trinity multimedia social network scheme. Multimed Tools Appl 76(18):18513–18529CrossRef Zhang Z, Sun R, Zhao C, Wang J, Chang CK, Gupta BB (2017) Cyvod: a novel trinity multimedia social network scheme. Multimed Tools Appl 76(18):18513–18529CrossRef
go back to reference Zhang Z, Sun R, Choo K-KR, Fan K, Wu W, Zhang M, Zhao C (2019b) A novel social situation analytics-based recommendation algorithm for multimedia social networks. IEEE Access 7:117749–117760CrossRef Zhang Z, Sun R, Choo K-KR, Fan K, Wu W, Zhang M, Zhao C (2019b) A novel social situation analytics-based recommendation algorithm for multimedia social networks. IEEE Access 7:117749–117760CrossRef
go back to reference Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378–393CrossRef Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378–393CrossRef
Metadata
Title
An intrinsic authorship verification technique for compromised account detection in social networks
Authors
Ravneet Kaur
Sarbjeet Singh
Harish Kumar
Publication date
01-01-2021
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 6/2021
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-05445-y

Other articles of this Issue 6/2021

Soft Computing 6/2021 Go to the issue

Premium Partner