12 results on '"Abulaish, Muhammad"'
Search Results
2. A Unified Framework for Community Structure Analysis in Dynamic Social Networks
- Author
-
Bhat, Sajid Yousuf, Abulaish, Muhammad, Banati, Hema, editor, Bhattacharyya, Siddhartha, editor, Mani, Ashish, editor, and Köppen, Mario, editor
- Published
- 2017
- Full Text
- View/download PDF
3. Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks
- Author
-
Ahmed, Faraz, Abulaish, Muhammad, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Ishikawa, Yoshiharu, editor, Li, Jianzhong, editor, Wang, Wei, editor, Zhang, Rui, editor, and Zhang, Wenjie, editor
- Published
- 2013
- Full Text
- View/download PDF
4. DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection.
- Author
-
Fazil, Mohd, Sah, Amit Kumar, and Abulaish, Muhammad
- Abstract
Online Social Networks (OSNs) are witnessing sophisticated cyber threats, that are generally conducted using fake or compromised profiles. Automated agents (aka socialbots), a category of sophisticated and modern threat entities, are the native of the social media platforms and responsible for various modern weaponized information-related attacks, such as astroturfing, misinformation diffusion, and spamming. Detecting socialbots is a challenging and vital task due to their deceiving character of imitating human behavior. To this end, this paper presents an attention-aware deep neural network model, DeepSBD, for detecting socialbots on OSNs. The DeepSBD models users’ behavior using profile, temporal, activity, and content information. It jointly models OSN users’ behavior using Bidirectional Long Short Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures. It models profile, temporal, and activity information as sequences, which are fed to a two-layers stacked BiLSTM, whereas content information is fed to a deep CNN. We have evaluated DeepSBD over five real-world benchmark datasets and found that it performs significantly better in comparison to the state-of-the-arts and baseline methods. We have also analyzed the efficacy of DeepSBD at different ratios of socialbots and benign users and found that an imbalanced dataset moderately affects the classification accuracy. Finally, we have analyzed the discrimination power of different behavioral components, and it is found that both profile characteristics and content behavior are most impactful, whereas diurnal temporal behavior is the least effective for detecting socialbots on OSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
5. A machine learning approach for socialbot targets detection on Twitter.
- Author
-
Abulaish, Muhammad and Fazil, Mohd
- Subjects
- *
MACHINE learning , *ONLINE social networks , *PERSONALITY , *INFORMATION-seeking behavior , *BEHAVIORAL assessment - Abstract
In online social networks (OSNs), socialbots are responsible for various malicious activities, and they are mainly programmed to imitate human-behavior to bypass the existing detection systems. The socialbots are generally successful in their malicious intent due to the existence of OSN users who follow them and thereby increase their reputation in the network. Analysis of the socialbot networks and their users is vital to comprehend the socialbot problem from target users' perspective. In this paper, we present a machine learning-based approach for characterizing and detecting socialbot targets, i.e., users who are susceptible to be trapped by the socialbots. We model OSN users based on their identity and behavior information, representing the static and dynamic components of their personality. The proposed approach classifies socialbot targets into three categories viz. active, reactive, and inactive users. We evaluate the proposed approach using three classifiers over a dataset collected from a live socialbot injection experiment conducted on Twitter. We also present a comparative evaluation of the proposed approach with a state-of-the-art method and show that it performs significantly better. On feature ablation analysis, we found that network structure and user intention and personality related dynamic features are most discriminative, whereas static features show the least impact on the classification. Additionally, following rate, multimedia ratio, and follower rate are most relevant to segregate different categories of the socialbot targets. We also perform a detailed topical and behavioral analysis of socialbot targets and found active users to be suspicious. Further, joy and agreeableness are the most dominating personality traits among the three categories of the users. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
6. A socialbots analysis-driven graph-based approach for identifying coordinated campaigns in twitter.
- Author
-
Fazil, Mohd and Abulaish, Muhammad
- Subjects
- *
INFORMATION dissemination - Abstract
Twitter is a popular microblogging platform, which facilitates users to express views and thoughts on day-to-day events using short texts limited to a maximum of 280 characters. However, it is generally targeted by socialbots for political astroturfing, advertising, spamming, and other illicit activities due to its open and real-time information sharing and dissemination nature. In this paper, we present a socialbots analysis-driven graph-based approach for identifying coordinated campaigns among Twitter users. To this end, we first present statistical insights derived from the analysis of logged data of 98 socialbots, which were injected in Twitter and associated with top-six Twitter using countries. In the analysis, we study and present the impact of socialbots' profile features, such as age and gender on infiltration. We also present a multi-attributed graph-based approach to model the profile attributes and interaction behavior of users as a similarity graph for identifying different groups of synchronized users involved in coordinated campaigns. The proposed approach is experimentally evaluated using four different evaluation parameters over a real dataset containing socialbots' trapped user profiles. The evaluation of identified campaigns in the form of clusters reveals the traces of spammers, botnets, and other malicious users. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. A Survey of Figurative Language and Its Computational Detection in Online Social Networks.
- Author
-
ABULAISH, MUHAMMAD, KAMAL, ASHRAF, and ZAKI, MOHAMMED J.
- Subjects
ONLINE social networks ,FIGURES of speech ,RECOMMENDER systems ,SENTIMENT analysis - Abstract
The frequent usage of figurative language on online social networks, especially on Twitter, has the potential to mislead traditional sentiment analysis and recommender systems. Due to the extensive use of slangs, bashes, flames, and non-literal texts, tweets are a great source of figurative language, such as sarcasm, irony, metaphor, simile, hyperbole, humor, and satire. Starting with a brief introduction of figurative language and its various categories, this article presents an in-depth survey of the state-of-the-art techniques for computational detection of seven different figurative language categories, mainly on Twitter. For each figurative language category, we present details about the characterizing features, datasets, and state-of-the-art computational detection approaches. Finally, we discuss open challenges and future directions of research for each figurative language category. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. A Hybrid Approach for Detecting Automated Spammers in Twitter.
- Author
-
Fazil, Mohd and Abulaish, Muhammad
- Abstract
Twitter is one of the most popular microblogging services, which is generally used to share news and updates through short messages restricted to 280 characters. However, its open nature and large user base are frequently exploited by automated spammers, content polluters, and other ill-intended users to commit various cybercrimes, such as cyberbullying, trolling, rumor dissemination, and stalking. Accordingly, a number of approaches have been proposed by researchers to address these problems. However, most of these approaches are based on user characterization and completely disregarding mutual interactions. In this paper, we present a hybrid approach for detecting automated spammers by amalgamating community-based features with other feature categories, namely metadata-, content-, and interaction-based features. The novelty of the proposed approach lies in the characterization of users based on their interactions with their followers given that a user can evade features that are related to his/her own activities, but evading those based on the followers is difficult. Nineteen different features, including six newly defined features and two redefined features, are identified for learning three classifiers, namely, random forest, decision tree, and Bayesian network, on a real dataset that comprises benign users and spammers. The discrimination power of different feature categories is also analyzed, and interaction- and community-based features are determined to be the most effective for spam detection, whereas metadata-based features are proven to be the least effective. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
9. Overlapping Social Network Communities and Viral Marketing.
- Author
-
Bhat, Sajid Yousuf and Abulaish, Muhammad
- Abstract
Social networks have highly been used to understand the behavior and activities of individuals in nature and society. They are being used as a means to communicate, diffuse information, and to control the spread of diseases and computer viruses, in addition to many other tasks. Business organizations look upon social networks as an opportunity to spread the word-of-mouth for viral marketing and this task has gained significance with the popularity of Online Social Networks (OSNs). However, an important characteristic of social networks, including OSNs, which is the existence of overlapping communities of users, has not been exploited yet for the task of viral marketing even though it seems promising. This paper aims to present the importance of identifying overlapping communities for the task of viral marketing in social networks and also provides some experimental results on an email network to back the claims. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
10. An MCL-Based Approach for Spam Profile Detection in Online Social Networks.
- Author
-
Ahmed, Faraz and Abulaish, Muhammad
- Abstract
Over the past few years, Online Social Networks (OSNs) have emerged as cheap and popular communication and information sharing media. Huge amount of information is being shared through popular OSN sites. This aspect of sharing information to a large number of individuals with ease has attracted social spammers to exploit the network of trust for spreading spam messages to promote personal blogs, advertisements, phishing, scam and so on. In this paper, we present a Markov Clustering (MCL) based approach for the detection of spam profiles on OSNs. Our study is based on a real dataset of Facebook profiles, which includes both benign and spam profiles. We model social network using a weighted graph in which profiles are represented as nodes and their interactions as edges. The weight of an edge, connecting a pair of user profiles, is calculated as a function of their real social interactions in terms of active friends, page likes and shared URLs within the network. MCL is applied on the weighted graph to generate different clusters containing different categories of profiles. Majority voting is applied to handle the cases in which a cluster contains both spam and normal profiles. Our experimental results show that majority voting not only reduces the number of clusters to a minimum, but also increases the performance values in terms of F_P and F_B measures from F_P=0.85 and F_B=0.75 to F_P=0.88 and F_B=0.79, respectively. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
11. OCTracker: A Density-Based Framework for Tracking the Evolution of Overlapping Communities in OSNs.
- Author
-
Bhat, Sajid Yousuf and Abulaish, Muhammad
- Abstract
In this paper, we propose a unified framework OCTracker for tracking overlapping community evolution in online social networks. OCTracker adapts a preliminary community structure towards dynamic changes in social networks using a novel density-based approach for detecting overlapping community structures and automatically detects evolutionary events like birth, growth, contraction, merge, split, and death of communities with time. Unlike other density-based community detection methods, the proposed method does not require the neighborhood threshold parameter to be set by the users, rather it automatically determines the same for each node locally. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
12. HOCTracker: Tracking the Evolution of Hierarchical and Overlapping Communities in Dynamic Social Networks.
- Author
-
Bhat, Sajid Yousuf and Abulaish, Muhammad
- Subjects
- *
DATA mining , *SOCIAL networks , *DATABASE searching , *SOCIAL science research , *SOCIAL network analysis , *SOCIAL network theory - Abstract
In this paper, we propose a unified framework,
HOCTracker , for tracking the evolution of hierarchical and overlapping communities in online social networks. Unlike most of the dynamic community detection methods,HOCTracker adapts a preliminary community structure towards dynamic changes in social networks using a novel density-based approach for detecting overlapping community structures, and automatically tracks evolutionary events like birth, growth, contraction, merge, split, and death of communities. It uses a novel and efficient log-based approach to map evolutionary relations between communities identified at two consecutive time-steps of a dynamic network, which considerably reduces the number of community comparisons. Moreover, it does not require an ageing function to remove old interactions for identifying community evolutionary events.HOCTracker is applicable to diirected/undirected and weighted/unweighted networks. Experimental results have shown that community structures identified byHOCTracker on some well-known benchmark networks are significant and in general better that the community structures identified by the state-of-the-art methods. [ABSTRACT FROM PUBLISHER]- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.