Fake Accounts Identification in Mobile Communication Networks Based on Machine Learning
نویسندگان
چکیده
Fake accounts on online social networks are increasing today with an increase in the number of active network users. Social media websites allow users to share thoughts, facts, views and re-sharing these into various networks. platforms provide enormous valuable information but this great amount media, many issues like fake profile, hacking have also grown. The profiles sites create news unwanted material which contains spam links that affect natural massive issue communication is it necessary identify stop spam. In paper, a supervised machine learning algorithm called support vector (SVM) used effectively. order automatically profiles, Random Forest classifier SVM. With concept, can be applied easily millions cannot examined manually. result model compared other identification techniques results show proposed performs better high precision recall. This method efficiently safeguards from threats attacks.
منابع مشابه
Detection of Fake Accounts in Social Networks Based on One Class Classification
Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...
متن کاملIdentification Psychological Disorders Based on Data in Virtual Environments Using Machine Learning
Introduction: Psychological disorders is one of the most problematic and important issue in today's society. Early prognosis of these disorders matters because receiving professional help at the appropriate time could improve the quality of life of these patients. Recently, researches use social media as a form of new tools in identifying psychological disorder. It seems that through the use of...
متن کاملCombating QR-Code-Based Compromised Accounts in Mobile Social Networks
Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential t...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of interactive mobile technologies
سال: 2023
ISSN: ['1865-7923']
DOI: https://doi.org/10.3991/ijim.v17i04.37645