SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 1, February 2019, pp. 562~569
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i1.pp562-569  562
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Integrated approach to detect spam in social media networks
using hybrid features
K. Subba Reddy, E. Srinivasa Reddy
Department of Computer Science and Engineering, Acharya Nagarjuna University, India
Article Info ABSTRACT
Article history:
Received Jan 30, 2018
Revised Aug 27, 2018
Accepted Sep 11, 2018
Online social networking sites are becoming more popular amongst Internet
users. The Internet users spend some amount of time on popular social
networking sites like Facebook, Twitter and LinkedIn etc. Online social
networks are considered to be much useful tool to the society used by
Internet lovers to communicate and transmit information. These social
networking platforms are useful to share information, opinions and ideas,
make new friends, and create new friend groups. Social networking sites
provide large amount of technical information to the users. This large amount
of information in social networking sites attracts cyber criminals to misuse
these sites information. These users create their own accounts and spread
vulnerable information to the genuine users. This information may be
advertising some product, send some malicious links etc to disturb the
natural users on social sites. Spammer detection is a major problem now days
in social networking sites. Previous spam detection techniques use different
set of features to classify spam and non spam users. In this paper we
proposed a hybrid approach which uses content based and user based features
for identification of spam on Twitter network. In this hybrid approach we
used decision tree induction algorithm and Bayesian network algorithm to
construct a classification model. We have analysed the proposed technique
on twitter dataset. Our analysis shows that our proposed methodology is
better than some other existing techniques.
Keywords:
Classification
Malicious links
Online social network
Spammer
Twitter
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
K. Subba Reddy,
Department of Computer Science and Engineering,
Acharya Nagarjuna University,
Guntur, India.
Email: kurapatisr80@gmail.com
1. INTRODUCTION
Social networks are growing rapidly, with networks like Facebook and Twitter. These networks
attract million users a month and they are becoming an important medium of communication [1]. Social
media are primarily internet based tools for sharing and discussing information. In social media people can
share comments, personal details, photos, videos and establish relationships with other users [2]. Increase in
popularity of internet and social network sites, it is very easy to gather large amount of information. Due to
this large amount of data present in social network sites it attracts malicious users [3]. The spammers use
their own strategies to attract genuine users, spread misinformation and propaganda. Large scale of spam
messages are produced by spammers and spread these messages into social networks. Spam messages
mislead the users and occupy the band width. To detect these spam messages various spam detection
classification algorithms are used like decision tree induction algorithm, KNN algorithm, Naive bayes
algorithm, Neural network algorithm and SVM algorithms [4]. Spam detection methodologies are analyzed
by various researchers. Various techniques and frameworks are developed for spam detection [5]. Various
Int J Elec & Comp Eng ISSN: 2088-8708 
Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy)
563
spam detection methodologies used KNN and decision tree induction algorithms, but KNN algorithm is
better than Decision tree induction algorithm for finding spam messages in social networks [6].
In this paper we proposed an integrated methodology to detect spam messages. In this work, the
twitter dataset is used. Thereafter the dataset is pre-processed to obtain normalized set of features depending
on which the activities of spammers were studied. The key features extracted were content based and user
based features. After obtaining these features, features are combined to improve the spam detection accuracy.
In order to improve detection of spam messages, a integrated proposed approach was devised which
combines the advantages of the two classification algorithms ie Decision tree algorithm, Naive bayes
algorithm. The improvement in spam detection is measured on the basis of accuracy parameters. The results
obtained shows that integrated approach that combine algorithms outperforms other classification approaches
in terms of overall accuracy. In section 2, several research works are described as related work. Proposed
method is presented in section 3. Experimental analysis is presented in section 4. The paper is concluded in
section 5 with future enhancements.
2. RELATED WORK
The issue of spam detection in social networking sites is very critical task. The researchers are
interested to do their research work on these areas. Many researchers have concentrated to find efficient
methods to identify spam. This section summarizes the major contribution of various researchers on spam
detection in social networks. Benjamin Markines et. al [7] proposed a spam detection methodology with
various supervised learning algorithms. These algorithms are evaluated on six different features such as
TagSpam, TagBlur, DomFp, Numads, Plagiarism, ValidLinks. Kyumin Lee et. al [8] describes spam
detection approach with honeypots and SVM machine learning algorithm. Xin Jin et. al [9] used GAD
clustering algorithm to detect spammers in social networks. This approach deal with scalability and real time
spam detection challenges. Xueying et. al [10] classify the social dataset messages into spam messages with
using ELM algorithm.
This classification model is developed with various features such as proportion spammer messages
with original messages, messages containing URL’s and life time of account. Hongyu et. al [11] filter the
spam messages over social network sites. Faraz Ahmed et. al [12] classify the spam profiles in online social
networks with Markov clustering. In this approach a weighted graph is used. From this weighted graph find
active friends, page likes and shared URLs features. Cheng Cao et. al [13] classify the spam with behavioural
analysis of the users. To analyse the behaviour of network users use click based features and post based
features. Saini Jacob Soman et. al [14] describes detecting malicious tweets in social network with user based
features, location based features, content based features and text based features.
With these features a classification model is proposed by SVM classifier and ELM classifier
algorithm. Proposed ELM based spam detection approach performs better spam detection rate compare to
SVM. Kaiyu Wang et. al [5] proposed a methodology to detect spam with combining of network features and
textual features. With these features a spam detection model is constructed by SVM machine learning
algorithm. They measured overall accuracy of model is increased up to 29%. Fabricio Benevenuto et. al [15]
classify user profiles into spammers or non spammers based on content based features and user based
features. To classify the users they have used support vector machine algorithm. Sajid Yousuf Bhat et. al [16]
describes a methodology to detect spam users in social networks by ensemble learning methods. To train
these learning algorithms facebook data is used. In this methodology network structure based features are
used. Hailu Xu et. al [17] analyzed different features to detect spam in various social network sites such as
facebook, twitter.
Arushi Gupta et. al [18] propose a mechanism to detect spammers in twitter network. In their work
used tweet level features, user level features, URL’s, spam word features. They have used integrated
approach to develop a model with Naive Bayes classifier, clustering and decision trees. Xianghan Zheng et.
al [19] studies a methodology to detect spammers in social network. They have used content based features
and user based features along with SVM machine learning algorithm to construct a spammer detection
model. Zahra Mashayekhi et. al [20] analyzed content based features and non content based features to detect
spam in E-mail messages. They have combined decision tree algorithm and Neural Network algorithm to
develop a model. They have implemented this model on Lingaspam data. Anjali Sharma et. al [4] analysed
various spam detection techniques.
They have studied various origin based spam detection techniques such as Blacklists filters, white
lists filters, Realtime Blackhole list filters and content based spam detection techniques such as Rule based
filters, Bayesian filters, Support vector machines and Artificial Neural Network algorithms. Saumya Goyal
et. al [6] classify the spam messages in twitter network. They have used decision tree and KNN algorithm to
construct a classification model. Chen Lin et. al [21] describes a spam detection procedure with Extreme
Machine Learning (ELM) algorithm. They have analysed content based features, user based features and
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569
564
social interactivity features. Prabhjot Kaur et. al [22] did the survey on various spam detection techniques.
They have done the survey on various user based spam detection techniques, content based spam detection
techniques, hybrid based techniques and relation based techniques. Bhagyashri Toke et. al [23] describes a
spam detection methodology to detect spam in facebook dataset.
They have used combined approach of Naive bayes algorithm and Rule based algorithm. Bhagyasri
Toke et. al [24] analyse the integrated approach to detect spam in social network sites. Ala M et. al [25]
describes a spam detection approach to detect spam in social networks. In this approach they have used
various features like content features, user based features. They have used various feature selection methods
such information gain, relief methods. Malik Mateen et. al [26] describes spam detection approach to detect
spam messages in twitter data. Aziah khamis et. al[27] analysed various data mining algorithms to extract for
islanding detection in power distribution. Alhamza et. al [28] studied various unsupervised classifiers to
classify network flow. Sachin Kamley et. al [29] analysed various machine learning techniques such as
Decision tree, Neural Network, Support Vector Machines, Genetic algorithms and Bayesian Networks for
performance forecasting of Share Market. Sharvil Shah et. al. [30] studied various classifier algorithms for
sentimental analysis in Twitter data. Our proposed approach used hybrid features i.e., combining of content
based features, user based features and graph based features.
3. PROPOSED METHOD
Most of the previous research has been done in detecting spam messages and identifying spammer
profiles. The previous research papers use different spam message detection and spammer profile detection
methodologies. Every methodology uses its own dataset and features for data classification. Spam detection
approaches used various kinds of features such as user based features, content based features and graph based
features [19], [26]. Each feature set has its own advantages and disadvantages. Based on these features we
proposed a methodology that uses combination of user based features and content based features. We use
these features to construct a classification model that classify the messages into non spam and spam
messages. In our approach we proposed an integrated classification model that uses decision tree algorithm
and Naive bayes classifier. An overview of the complete process of spam detection is shown in diagram in
Figure 1, each of process steps are explained in this section
Figure 1. Proposed spam detection approach
A. Dataset description: To evaluate our proposed classification methodology use twitter dataset. There is no
publicly available dataset due to twitter policy. So we had to build one such labelled dataset or use the
dataset that are used in previous spam detection approaches. Most of the previous researchers have used
their own dataset. The researchers extract their required dataset from twitter by using API. Here we used
Int J Elec & Comp Eng ISSN: 2088-8708 
Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy)
565
manually collected dataset from twitter for our experimental purpose. The dataset consist of 100 users and
900 tweets.
B. Pre-processing: In this step, all continuous features were converted into discrete features.
C. Feature Selection: From all the dataset features, process relevant features are selected. In this proposed
methodology content based features and user based features are selected. These features are integrated to
improve the spam detection accuracy.
1. User Based Features: User based features are used to describe the behaviour of users in twitter [16].
These features are based on user relationships and properties of user accounts in twitter dataset. Generally
in social media networks users can develop their own social networks with other users. In social network
one user follows other users and allows other users to follow him. Spammers want to follow many
profiles to spread misinformation to them, so they try to follow large number of users to spread
misinformation. Generally we consider, the number of users following is more than number of users
following him, such user account is considered as spam account. Here we are using different user based
features to construct a model. User features are related to user accounts and the features are extracted
from user accounts. The various user based features used in our approach are:
a) Number of Followers: This feature specifies the number of other users in network follow your account
tweets. Generally followers define the popularity of someone profile. Generally spammers have less
popularity and have less number of followers.
b) Number of Following: This feature specifies the number of other user accounts you follow. In twitter
if you follow someone means you will see their tweets in your timeline. Twitter network knows to
whom you follow and who is following you.
c) Age of Account: This feature specifies when the account has been created.
d) Follower to Following Ratio: This is the ratio of followers to following ratio in network for any user
account. Generally ff ratio is less for normal users and this ratio is high for spammers.
𝐹𝐹 𝑟𝑎𝑡𝑖𝑜 =
Number of following
Number of followers
e) Reputation: This is the ratio between number of followers to sum of following and followers
𝑅𝑒𝑝𝑢𝑡𝑎𝑡𝑖𝑜𝑛 =
Followers
F𝑜𝑙𝑙𝑜𝑤𝑒𝑟𝑠 + 𝐹𝑜𝑙𝑙𝑜𝑤𝑖𝑛𝑔
2. Content Based Features: These features are related to tweets posted by user. Generally normal users can’t
post duplicate content but spammers post lot of duplicate tweets. Content based features are based on
messages that users write. The content based features are important to detect spam messages. Spammers
are malicious users, who spread large amount of misinformation to the network users [16], [17]. The
misinformation contains advertisements about their product and malicious links. The various content
based features are used in our approach are:
a) Number of Tweets: Total number of tweets posted by user after creating his account.
b) Hashtag Ratio: This is the ratio between the tweets containing hashtags to total tweets posted and
those tweets containing unique hashtag.
𝑇𝑜𝑡𝑎𝑙 𝐻𝑎𝑠ℎ𝑡𝑎𝑔𝑠 =
Duplicate HashTags
Unique Hashtags × Tweet Count
c) URL’s Ratio: This is the ratio between duplicate URL’s to number of distinct URL’s in tweets and
sum of tweets.
𝑇𝑜𝑡𝑎𝑙 𝑈𝑅𝐿𝑠 =
Hash duplicate URLs
Hash Unique URLs × Tweet Count
d) Mentions Ratio: Twitter account users are identified by @username. @username can be written
anywhere in the tweet. Spammers misuse this feature to send spam messages to the genuine users in
network. Generally the user messages contain large number of mention and reply tags then user is
consider as spam user.
@𝑇𝑤𝑒𝑒𝑡𝑠 =
Tweets Containing@
Total Number of Tweets
e) Tweet Frequency: Generally the tweet frequency of spammers is greater than genuine twitter user.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569
566
f) Spam words: we use specific spam words and count their occurrence in tweets of users. The
spammers use this spam words and spread misinformation to the users.
D. Integrated approach: In our proposed approach we use supervised machine learning algorithms. These
algorithms are first trained on the labelled data set to develop classification models. These models are
applied on unlabelled data to predict which data as spam data and which data as non spam data. In our
proposed approach we integrate decision tree induction algorithm and Naive Bayes classification
algorithm to improve spam detection accuracy. In our methodology first decision tree algorithm classifies
the dataset as spam or non spam. To improve the classification accuracy of spam detection, categorized
spam records of decision tree is given as input to the Naive bayes algorithm. Naive bayes algorithm
further classifies any misclassified messages into spam or non spam. In this way categorized non spam
messages of decision tree are also given as input to the Naive bayes algorithm to classify the any
misclassified messages.
1. Decision Tree Induction: The decision tree is one of the known classification algo rithms used in machine
learning to guide the decision making process [28]. Many researchers used [6], [20] this classification
algorithm to detect spam messages. The decision tree has three types of nodes. The root node has no
incoming edges and zero or more outgoing edges. An internal node has exactly one incoming edge and
two or more outgoing edges. The leaf or terminal node has exactly one incoming edge and no outgoing
edges. Decision tree induction algorithms must provide a method for expressing an attribute test condition
for different types of attributes like binary, nominal, ordinal and continuous attributes. There are many
measures that can be used to determine the best way to split the records. These measures are defined in
terms of the class distribution the records before and after splitting. The measures developed for selecting
the best split are often based on the degree of impurity of the child nodes. Different impurity measures are
Entropy (t) = -∑ 𝑝(𝑖|𝑡)log2p(i|t)
Gini (t) = 1-∑ [𝑝(𝑖|𝑡)]2
Classification error (t) = 1- max[𝑝(𝑖|𝑡)]
P (i|t) denote the fraction of records belonging to class i at a given node t.
Different decision tree induction algorithms ID3, C4.5, CART, J48
2. Naive Bayes Classifier- This is one of the best machine learning algorithm for spam
classification [17], [26]. To classify the message as a spam or non spam can be generalized by probability
theory. The spam messages contain the specific words. The relationship between the attribute set and
class variable within dataset is non-deterministic. To resolve this problem Bayes theorem introduces a
statistical principle for combining prior knowledge of the classes with new evidence gathered from given
data. Let X and Y be a pair of random variables. The joint probability, P (X=x, Y=y), gives the
probability that variable X will take on the value x and variable Y will take on the value y. The
conditional probability is the probability that a random variable will take on a particular value given that
the outcome of another random variable is known. The conditional probability p (X=x| Y=y), gives
the probability that the variable Y will take on value y, given that the variable X is observed to have the
value x. Based on joint and conditional probabilities.
Bayes theorem, 𝑃(𝑌|𝑋) =
X Y ( )
( )
Y is the event that a given tweet belongs to a given class. X is the d dimensional feature vector
corresponding to the tweet. The Naive bayes model makes the independence assumption that the
attributes are all independent.
𝑃(𝑌|𝑋) =
𝑃(𝑌) ∏ (𝑋𝑖|𝑌)
𝑃(𝑋)
The demonstrator is same P(X) for spam and non spam classes. So we can discard for classification.
P(Spam) ∏ (𝑋𝑖|𝑆𝑝𝑎𝑚), and P(Non Spam)∏ (𝑋𝑖|𝑁𝑜𝑛𝑆𝑝𝑎𝑚)
Int J Elec & Comp Eng ISSN: 2088-8708 
Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy)
567
Classify the given messages with higher probability. The given training dataset was used to determine the
conditional probabilities.
4. EXPERIMENTS AND EVALUATION
For classification task, we trained and tested integrated approach and compared with other machine
learning algorithms. In order to evaluate the model, evaluation metrics (precision, recall and F measure) are
used. The evaluation metrics are, Precision is the ratio of number of instances correctly classified to the total
number of instances and is expressed as
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
TP
TP + FP
Recall is the ratio of number of instances correctly classified to the total number of predicted instances and is
expressed as
𝑅𝑒𝑐𝑎𝑙𝑙 =
F measure is the harmonic mean between precision and recall and is expressed as
𝐹 𝑚𝑒𝑎𝑠𝑢𝑟 = 2 ∗
Precision ∗ Recall
Precision + Recall
Accuracy is the total number of correctly classified instances of both classes over the total number of all
instances in the dataset.
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
We have evaluated the results using two most classifiers, i.e., Decision tree induction and Naive
bayes classifiers. Figure 2 shows that results of decision tree and Naive bayes classifiers based on user based
features. Naive bayes classifier has closer recall, precision and F-measure as compared to decision tree
induction classifier. Figure 3 shows the results of classifiers based on content based features. Decision tree
has the highest recall, precision and F-measure compare to Naive bayes algorithm. But Naive bayes
algorithm has almost same precision value compared to decision tree. Figure 4 shows the precision, recall
and F-measure of classifiers based on combining of user based features and content based features. Compare
to individual performance of classifiers based on user based features and content based features hybrid based
feature classifiers are outperformed. To improve the further performance of classification model we integrate
the decision tree induction classifier and Naive bayes classifier. Figure 5 shows that performance of
integrated model based on hybrid features.
We have analysed our results with the earlier works [15], [17], [18], [26], [31]. The earlier works
used user based features, content based features and hybrid features. We observe an amount of improvement
in the results of our approach from the features used in [15]. The top 20 word features are used [17] for spam
detection. Compared to earlier classifications, our approach has highest recall, precision and F measure.
Figure 2. Classification results using user based
features
Figure 3. Classification results using content based
features
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569
568
Figure 4. Classification results using hybrid features Figure 5. Classification results of proposed approach
In Table 1 we describe the comparison of our integrated approach with other classification models.
Compare to other classifications our hybrid features integrated model out performs with high recall, precision
and F measure.
Table 1. Comparison between Integrated Approach and Other Classifiers
5. CONCLUSION
In this paper we used the hybrid set of features for detecting spam messages on social networking
sites. We proposed an integrated spam detection technique to detect spam messages in twitter dataset. In this
integrated approach we used decision tree induction classifier, Naive bayes classifier and hybrid features,
such as combining of user based features and content based features. Our approach shows performance with
high recall, precision and F-measure. In future we will extend our approach to other new set of features and
also do our experiments on other social media networks with large amount of dataset.
REFERENCES
[1] “Facebook” https://en.wikipedia.org/wiki/Facebook#Impact
[2] “Twitter” https://en.wikipedia.org/wiki/Twitter#Statistics
[3] “Spam Types” https://en.wikipedia.org/wiki/Social_spam#Types
[4] Anjali Sharma, Manisha, Dr.Manisha, Dr.Rekha Jain, “A Survey on Spam Detection Techniques,” International
Journal of Advanced Research in Computer and Communication Engineering, vol. 3, issue 12, December 2014.
[5] Kaiyu Wang, Yumei Wang, Hongqiao Li, Yilin Xiong and Xinyu Zhang, “A New Approach for Detecting Spam
Microblogs Based on Text and Users Social Network Features,” National college Innovation program, Beijing
University, china
[6] Saumya Goyal, R.K.sharma, Shabnam Parveen, “Spam Detection using KNN and Decision Tree Mechanism in
Social Network,” Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC), IEEE,
2016.
[7] Benjamin Markines, Ciro Cattuto and Filippo Menczer, “Social Spam Detection,” Airweb’09 spain, ACM 978-1-
60558-438-6
[8] Kyumin Lee, James Caverlee and Steve Webb, “Uncovering Social Spammers: Social honeypots + Machine
learning, SIGIR, july-10, Switzerland, ACM 978-1-60558-896-4/10/07
[9] Xin Jin, Cindy Xide Lin, Jiebo Luo and Jiawei Han, “SocialSpamGuard: A Data mining based Spam Detection
System for Social Media Networks,” 37th international conference on very large data bases, Washington, 215
8097/11/08, 2011.
[10] Xueying Zhang and Xianghan Zheng, “A Novel Method for Spammer Detection in Social Networks,” IEEE, 2015.
[11] Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary, “Towards Online Spam Filtering in
Social Networks,” cucis.ece.northwestern.edu/publications/pdf/GaoChe12.pdf
Classifier Features Recall Precision F measure
Decision Tree User based 0.96 0.95 0.9560
Naive bayes User based 0.96 0.95 0.9560
Decision Tree Content based 0.92 0.91 0.9149
Naive bayes Content based 0.62 0.88 0.7274
Decision Tree Integrated features (user based, content based features) 0.96 0.95 0.9549
Naive bayes Integrated features (user based, content based features) 0.75 0.90 0.8181
Integrated Classifier
( Decision Tree and Naive bayes )
Integrated features (user based, content based features) 0.97 0.96 0.9649
Int J Elec & Comp Eng ISSN: 2088-8708 
Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy)
569
[12] Faraz Ahmed and Muhammad Abulaish, “An MCL-Based Approach for Spam Profile Detection in Online Social
Networks,” IEEE, DOI 10.1109/Trustcom.2012.83, 2015.
[13] Cheng Cao and James Caverlee, “Detecting Spam URLs in Social Media via Behavioral Analysis,”springer, ECIR
2015, LNCS 9022, pp. 703-714, 2015.
[14] Saini Jacob Soman and Dr. S. Murugappan, “Detecting Malicious Tweets in Trending Topics using Clustering and
Classification,” International Conference on Recent Trends in Information Technology, IEEE, 2014.
[15] Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues and Virgilio Almedia, “Detecting Spammers on Twitter,”
CEAS 2010-seventh annual collaboration, electronic messaging, anti-abuse and spam conference july-2010.
[16] Sajid Yousuf Bhat, Muhammad Abulaish, Abdulrahman A. Mirza, “Spammer Classification using Ensemble
Methods over Structural Social Network Features,” IEEE/WIC/ACM International Joint Conference on Web
Intelligence and Intelligent agent Technologies, 2014, DOI 10.1109/WI_IAT.2014.133
[17] Hailu Xu, Weiqinh Sun, ahmad Javid, “Efficient Spam Detection across Online Social Networks,” IEEE-2015
[18] Arushi Gupta, Rishabh Kaushal, “Improving Spam Detection in Online Social Networks,” IEEE-2015
[19] Xianghan zheng, Zhipeng Zeng, Zheyi Chen, Yuanlong Yu,Chunming Rong, “Detecting Spammers on Social
Networks,” Elsevier, NeuroComputing 159 ,27-34, 2015.
[20] Zahra Mashayekhi, Ali HarounAbadi, “A Hybrid Approach for Detection Based on Decision tree Algorithm and
Neural Network,” International Journal of Mechatronics, Electrical and Computer Technology, 2017
[21] Chen Liu, Genying Wang, “Analysis and Detection of Spam accounts in Social Networks,” 2nd IEEE International
Conference on Computer and Communications, IEEE, 2016.
[22] Prabhjot Kaur, Anubha Singhal, Jasleen Kaur, “Spam Detection on Twitter: A Survey,” IEEE, 2016.
[23] Bhagyashri Toke, Dinesh Puri, “Spam Detection in Online Social Networks using Integrated Approach,’’
International Journal of Innovating Research in computer nd communication Engineering, vol. 4, issue 12,
[24] Bhagyashri Toke, Dinesh Puri, “Review on Spam Detection in OSN using Integrated Approach,” International
Research Journal of Engineering and Technology, Volume:3, Issue:5,May-2016.
[25] Ala M. AI-Zoubi, Ja far Alqatawna, Hossam Faris, “Spam Profile Detection in Social Networks Based on Public
Features,” 8th International Conference on Information and Communication Systems, IEEE, 2017.
[26] Malik Mateen, Mahammad Aleem, Mihammad Azhar Iqbal, Muhammad Arshad Islam, “A Hybrid Approach for
Spam Detection for Twitter,” proceedings of 2017 14th International Bhurban Conference on Applied Sciences &
Technology, IEEE, 2017.
[27] Aziah Khamis, Yan Xu, and Azah Mohamed, “Comparative Study in Determining Features Extraction for
Islanding Detection using Data Mining Technique: Correlation and Coefficient Analysis,” International Journal of
Electrical and Computer Engineering (IJECE) Vol. 7, No. 3, pp. 1112 – 1124 ISSN: 2088-8708, June 2017
[28] Alhamza Munther, Rozmie Razif, Mosleh AbuAlhaj, Mohammed Anbar, Shahrul Nizam, “A Preliminary
Performance Evaluation of K-means, KNN and EM Unsupervised Machine Learning Methods for Network Flow
Classification”, International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 2, pp. 778~784
ISSN: 2088-8708, April 2016.
[29] Sachin Kamley, Shailesh Jaloree, R. S. Thakur, “Performance Forecasting of Share Market using Machine
Learning Techniques: A Review,” International Journal of Electrical and Computer Engineering (IJECE) Vol. 6,
No. 6, pp. 3196~3204 ISSN: 2088-8708, December 2016, DOI: 10.11591/ijece.v6i6.13323
[30] Sharvil Shah*, K Kumar**, Ra. K. Saravanaguru**, “Sentimental Analysis of Twitter Data Using Classifier
Algorithms,” International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 1, pp. 357~366
ISSN: 2088-8708, February 2016, DOI: 10.11591/ijece.v6i1.8982
[31] K Subba Reddy, E Srinivasa Reddy, “An Efficient Methodology to Detect Spam In Social Networking Sites,”
International Journal of Computer Science and Information Security (IJCSIS), Vol 15 No. 7, July 2017
BIOGRAPHIES OF AUTHORS
Mr K Subba Reddy is PhD student in Department of Computer Science and Engineering,
Acharya Nagarjuna University, Guntur, India. He has published papers in international
conferences and journals. His area of interest is Big Data, Data mining and machine learning.
Dr E Srinivasa Reddy, PhD., is currently serving as principal in University College of
Engineering and Technology and also serving as Head of Department in Computer Science and
Engineering, Acharya Nagarjuna University, Guntur, India. He has more than 24 years teaching
experience. He is guiding PhD to 8 scholars and 15 has completed his PhD. Dissertations and
contributed 45 articles in conferences and 120 papers in Research Journals. His area of interest is
Image Processing and Data mining. He may be contacted at: esreddy67@gmail.com

More Related Content

What's hot

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...IJMTST Journal
 
762019109
762019109762019109
762019109IJRAT
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social mediai4box Anon
 
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...ijtsrd
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET Journal
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News SummarizationIRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
 
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social NetworksFriendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks1crore projects
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...IJECEIAES
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningParvathi Sanil Nair
 

What's hot (19)

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
 
762019109
762019109762019109
762019109
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
Data collection thru social media
Data collection thru social mediaData collection thru social media
Data collection thru social media
 
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social NetworksFriendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
 

Similar to Integrated approach to detect spam in social media networks using hybrid features

A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...ijaia
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxRivikaJain
 
Fake accounts detection system based on bidirectional gated recurrent unit n...
Fake accounts detection system based on bidirectional gated  recurrent unit n...Fake accounts detection system based on bidirectional gated  recurrent unit n...
Fake accounts detection system based on bidirectional gated recurrent unit n...IJECEIAES
 
20574-38941-1-PB.pdf
20574-38941-1-PB.pdf20574-38941-1-PB.pdf
20574-38941-1-PB.pdfIjictTeam
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET Journal
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
 
An Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionAn Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionJoshua Gorinson
 
Fake accounts detection on social media using stack ensemble system
Fake accounts detection on social media using stack ensemble  systemFake accounts detection on social media using stack ensemble  system
Fake accounts detection on social media using stack ensemble systemIJECEIAES
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET Journal
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkIRJET Journal
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 

Similar to Integrated approach to detect spam in social media networks using hybrid features (20)

A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptx
 
Fake accounts detection system based on bidirectional gated recurrent unit n...
Fake accounts detection system based on bidirectional gated  recurrent unit n...Fake accounts detection system based on bidirectional gated  recurrent unit n...
Fake accounts detection system based on bidirectional gated recurrent unit n...
 
20574-38941-1-PB.pdf
20574-38941-1-PB.pdf20574-38941-1-PB.pdf
20574-38941-1-PB.pdf
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
An Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionAn Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites Detection
 
Fake accounts detection on social media using stack ensemble system
Fake accounts detection on social media using stack ensemble  systemFake accounts detection on social media using stack ensemble  system
Fake accounts detection on social media using stack ensemble system
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

Integrated approach to detect spam in social media networks using hybrid features

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 1, February 2019, pp. 562~569 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i1.pp562-569  562 Journal homepage: http://iaescore.com/journals/index.php/IJECE Integrated approach to detect spam in social media networks using hybrid features K. Subba Reddy, E. Srinivasa Reddy Department of Computer Science and Engineering, Acharya Nagarjuna University, India Article Info ABSTRACT Article history: Received Jan 30, 2018 Revised Aug 27, 2018 Accepted Sep 11, 2018 Online social networking sites are becoming more popular amongst Internet users. The Internet users spend some amount of time on popular social networking sites like Facebook, Twitter and LinkedIn etc. Online social networks are considered to be much useful tool to the society used by Internet lovers to communicate and transmit information. These social networking platforms are useful to share information, opinions and ideas, make new friends, and create new friend groups. Social networking sites provide large amount of technical information to the users. This large amount of information in social networking sites attracts cyber criminals to misuse these sites information. These users create their own accounts and spread vulnerable information to the genuine users. This information may be advertising some product, send some malicious links etc to disturb the natural users on social sites. Spammer detection is a major problem now days in social networking sites. Previous spam detection techniques use different set of features to classify spam and non spam users. In this paper we proposed a hybrid approach which uses content based and user based features for identification of spam on Twitter network. In this hybrid approach we used decision tree induction algorithm and Bayesian network algorithm to construct a classification model. We have analysed the proposed technique on twitter dataset. Our analysis shows that our proposed methodology is better than some other existing techniques. Keywords: Classification Malicious links Online social network Spammer Twitter Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: K. Subba Reddy, Department of Computer Science and Engineering, Acharya Nagarjuna University, Guntur, India. Email: kurapatisr80@gmail.com 1. INTRODUCTION Social networks are growing rapidly, with networks like Facebook and Twitter. These networks attract million users a month and they are becoming an important medium of communication [1]. Social media are primarily internet based tools for sharing and discussing information. In social media people can share comments, personal details, photos, videos and establish relationships with other users [2]. Increase in popularity of internet and social network sites, it is very easy to gather large amount of information. Due to this large amount of data present in social network sites it attracts malicious users [3]. The spammers use their own strategies to attract genuine users, spread misinformation and propaganda. Large scale of spam messages are produced by spammers and spread these messages into social networks. Spam messages mislead the users and occupy the band width. To detect these spam messages various spam detection classification algorithms are used like decision tree induction algorithm, KNN algorithm, Naive bayes algorithm, Neural network algorithm and SVM algorithms [4]. Spam detection methodologies are analyzed by various researchers. Various techniques and frameworks are developed for spam detection [5]. Various
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy) 563 spam detection methodologies used KNN and decision tree induction algorithms, but KNN algorithm is better than Decision tree induction algorithm for finding spam messages in social networks [6]. In this paper we proposed an integrated methodology to detect spam messages. In this work, the twitter dataset is used. Thereafter the dataset is pre-processed to obtain normalized set of features depending on which the activities of spammers were studied. The key features extracted were content based and user based features. After obtaining these features, features are combined to improve the spam detection accuracy. In order to improve detection of spam messages, a integrated proposed approach was devised which combines the advantages of the two classification algorithms ie Decision tree algorithm, Naive bayes algorithm. The improvement in spam detection is measured on the basis of accuracy parameters. The results obtained shows that integrated approach that combine algorithms outperforms other classification approaches in terms of overall accuracy. In section 2, several research works are described as related work. Proposed method is presented in section 3. Experimental analysis is presented in section 4. The paper is concluded in section 5 with future enhancements. 2. RELATED WORK The issue of spam detection in social networking sites is very critical task. The researchers are interested to do their research work on these areas. Many researchers have concentrated to find efficient methods to identify spam. This section summarizes the major contribution of various researchers on spam detection in social networks. Benjamin Markines et. al [7] proposed a spam detection methodology with various supervised learning algorithms. These algorithms are evaluated on six different features such as TagSpam, TagBlur, DomFp, Numads, Plagiarism, ValidLinks. Kyumin Lee et. al [8] describes spam detection approach with honeypots and SVM machine learning algorithm. Xin Jin et. al [9] used GAD clustering algorithm to detect spammers in social networks. This approach deal with scalability and real time spam detection challenges. Xueying et. al [10] classify the social dataset messages into spam messages with using ELM algorithm. This classification model is developed with various features such as proportion spammer messages with original messages, messages containing URL’s and life time of account. Hongyu et. al [11] filter the spam messages over social network sites. Faraz Ahmed et. al [12] classify the spam profiles in online social networks with Markov clustering. In this approach a weighted graph is used. From this weighted graph find active friends, page likes and shared URLs features. Cheng Cao et. al [13] classify the spam with behavioural analysis of the users. To analyse the behaviour of network users use click based features and post based features. Saini Jacob Soman et. al [14] describes detecting malicious tweets in social network with user based features, location based features, content based features and text based features. With these features a classification model is proposed by SVM classifier and ELM classifier algorithm. Proposed ELM based spam detection approach performs better spam detection rate compare to SVM. Kaiyu Wang et. al [5] proposed a methodology to detect spam with combining of network features and textual features. With these features a spam detection model is constructed by SVM machine learning algorithm. They measured overall accuracy of model is increased up to 29%. Fabricio Benevenuto et. al [15] classify user profiles into spammers or non spammers based on content based features and user based features. To classify the users they have used support vector machine algorithm. Sajid Yousuf Bhat et. al [16] describes a methodology to detect spam users in social networks by ensemble learning methods. To train these learning algorithms facebook data is used. In this methodology network structure based features are used. Hailu Xu et. al [17] analyzed different features to detect spam in various social network sites such as facebook, twitter. Arushi Gupta et. al [18] propose a mechanism to detect spammers in twitter network. In their work used tweet level features, user level features, URL’s, spam word features. They have used integrated approach to develop a model with Naive Bayes classifier, clustering and decision trees. Xianghan Zheng et. al [19] studies a methodology to detect spammers in social network. They have used content based features and user based features along with SVM machine learning algorithm to construct a spammer detection model. Zahra Mashayekhi et. al [20] analyzed content based features and non content based features to detect spam in E-mail messages. They have combined decision tree algorithm and Neural Network algorithm to develop a model. They have implemented this model on Lingaspam data. Anjali Sharma et. al [4] analysed various spam detection techniques. They have studied various origin based spam detection techniques such as Blacklists filters, white lists filters, Realtime Blackhole list filters and content based spam detection techniques such as Rule based filters, Bayesian filters, Support vector machines and Artificial Neural Network algorithms. Saumya Goyal et. al [6] classify the spam messages in twitter network. They have used decision tree and KNN algorithm to construct a classification model. Chen Lin et. al [21] describes a spam detection procedure with Extreme Machine Learning (ELM) algorithm. They have analysed content based features, user based features and
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569 564 social interactivity features. Prabhjot Kaur et. al [22] did the survey on various spam detection techniques. They have done the survey on various user based spam detection techniques, content based spam detection techniques, hybrid based techniques and relation based techniques. Bhagyashri Toke et. al [23] describes a spam detection methodology to detect spam in facebook dataset. They have used combined approach of Naive bayes algorithm and Rule based algorithm. Bhagyasri Toke et. al [24] analyse the integrated approach to detect spam in social network sites. Ala M et. al [25] describes a spam detection approach to detect spam in social networks. In this approach they have used various features like content features, user based features. They have used various feature selection methods such information gain, relief methods. Malik Mateen et. al [26] describes spam detection approach to detect spam messages in twitter data. Aziah khamis et. al[27] analysed various data mining algorithms to extract for islanding detection in power distribution. Alhamza et. al [28] studied various unsupervised classifiers to classify network flow. Sachin Kamley et. al [29] analysed various machine learning techniques such as Decision tree, Neural Network, Support Vector Machines, Genetic algorithms and Bayesian Networks for performance forecasting of Share Market. Sharvil Shah et. al. [30] studied various classifier algorithms for sentimental analysis in Twitter data. Our proposed approach used hybrid features i.e., combining of content based features, user based features and graph based features. 3. PROPOSED METHOD Most of the previous research has been done in detecting spam messages and identifying spammer profiles. The previous research papers use different spam message detection and spammer profile detection methodologies. Every methodology uses its own dataset and features for data classification. Spam detection approaches used various kinds of features such as user based features, content based features and graph based features [19], [26]. Each feature set has its own advantages and disadvantages. Based on these features we proposed a methodology that uses combination of user based features and content based features. We use these features to construct a classification model that classify the messages into non spam and spam messages. In our approach we proposed an integrated classification model that uses decision tree algorithm and Naive bayes classifier. An overview of the complete process of spam detection is shown in diagram in Figure 1, each of process steps are explained in this section Figure 1. Proposed spam detection approach A. Dataset description: To evaluate our proposed classification methodology use twitter dataset. There is no publicly available dataset due to twitter policy. So we had to build one such labelled dataset or use the dataset that are used in previous spam detection approaches. Most of the previous researchers have used their own dataset. The researchers extract their required dataset from twitter by using API. Here we used
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy) 565 manually collected dataset from twitter for our experimental purpose. The dataset consist of 100 users and 900 tweets. B. Pre-processing: In this step, all continuous features were converted into discrete features. C. Feature Selection: From all the dataset features, process relevant features are selected. In this proposed methodology content based features and user based features are selected. These features are integrated to improve the spam detection accuracy. 1. User Based Features: User based features are used to describe the behaviour of users in twitter [16]. These features are based on user relationships and properties of user accounts in twitter dataset. Generally in social media networks users can develop their own social networks with other users. In social network one user follows other users and allows other users to follow him. Spammers want to follow many profiles to spread misinformation to them, so they try to follow large number of users to spread misinformation. Generally we consider, the number of users following is more than number of users following him, such user account is considered as spam account. Here we are using different user based features to construct a model. User features are related to user accounts and the features are extracted from user accounts. The various user based features used in our approach are: a) Number of Followers: This feature specifies the number of other users in network follow your account tweets. Generally followers define the popularity of someone profile. Generally spammers have less popularity and have less number of followers. b) Number of Following: This feature specifies the number of other user accounts you follow. In twitter if you follow someone means you will see their tweets in your timeline. Twitter network knows to whom you follow and who is following you. c) Age of Account: This feature specifies when the account has been created. d) Follower to Following Ratio: This is the ratio of followers to following ratio in network for any user account. Generally ff ratio is less for normal users and this ratio is high for spammers. 𝐹𝐹 𝑟𝑎𝑡𝑖𝑜 = Number of following Number of followers e) Reputation: This is the ratio between number of followers to sum of following and followers 𝑅𝑒𝑝𝑢𝑡𝑎𝑡𝑖𝑜𝑛 = Followers F𝑜𝑙𝑙𝑜𝑤𝑒𝑟𝑠 + 𝐹𝑜𝑙𝑙𝑜𝑤𝑖𝑛𝑔 2. Content Based Features: These features are related to tweets posted by user. Generally normal users can’t post duplicate content but spammers post lot of duplicate tweets. Content based features are based on messages that users write. The content based features are important to detect spam messages. Spammers are malicious users, who spread large amount of misinformation to the network users [16], [17]. The misinformation contains advertisements about their product and malicious links. The various content based features are used in our approach are: a) Number of Tweets: Total number of tweets posted by user after creating his account. b) Hashtag Ratio: This is the ratio between the tweets containing hashtags to total tweets posted and those tweets containing unique hashtag. 𝑇𝑜𝑡𝑎𝑙 𝐻𝑎𝑠ℎ𝑡𝑎𝑔𝑠 = Duplicate HashTags Unique Hashtags × Tweet Count c) URL’s Ratio: This is the ratio between duplicate URL’s to number of distinct URL’s in tweets and sum of tweets. 𝑇𝑜𝑡𝑎𝑙 𝑈𝑅𝐿𝑠 = Hash duplicate URLs Hash Unique URLs × Tweet Count d) Mentions Ratio: Twitter account users are identified by @username. @username can be written anywhere in the tweet. Spammers misuse this feature to send spam messages to the genuine users in network. Generally the user messages contain large number of mention and reply tags then user is consider as spam user. @𝑇𝑤𝑒𝑒𝑡𝑠 = Tweets Containing@ Total Number of Tweets e) Tweet Frequency: Generally the tweet frequency of spammers is greater than genuine twitter user.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569 566 f) Spam words: we use specific spam words and count their occurrence in tweets of users. The spammers use this spam words and spread misinformation to the users. D. Integrated approach: In our proposed approach we use supervised machine learning algorithms. These algorithms are first trained on the labelled data set to develop classification models. These models are applied on unlabelled data to predict which data as spam data and which data as non spam data. In our proposed approach we integrate decision tree induction algorithm and Naive Bayes classification algorithm to improve spam detection accuracy. In our methodology first decision tree algorithm classifies the dataset as spam or non spam. To improve the classification accuracy of spam detection, categorized spam records of decision tree is given as input to the Naive bayes algorithm. Naive bayes algorithm further classifies any misclassified messages into spam or non spam. In this way categorized non spam messages of decision tree are also given as input to the Naive bayes algorithm to classify the any misclassified messages. 1. Decision Tree Induction: The decision tree is one of the known classification algo rithms used in machine learning to guide the decision making process [28]. Many researchers used [6], [20] this classification algorithm to detect spam messages. The decision tree has three types of nodes. The root node has no incoming edges and zero or more outgoing edges. An internal node has exactly one incoming edge and two or more outgoing edges. The leaf or terminal node has exactly one incoming edge and no outgoing edges. Decision tree induction algorithms must provide a method for expressing an attribute test condition for different types of attributes like binary, nominal, ordinal and continuous attributes. There are many measures that can be used to determine the best way to split the records. These measures are defined in terms of the class distribution the records before and after splitting. The measures developed for selecting the best split are often based on the degree of impurity of the child nodes. Different impurity measures are Entropy (t) = -∑ 𝑝(𝑖|𝑡)log2p(i|t) Gini (t) = 1-∑ [𝑝(𝑖|𝑡)]2 Classification error (t) = 1- max[𝑝(𝑖|𝑡)] P (i|t) denote the fraction of records belonging to class i at a given node t. Different decision tree induction algorithms ID3, C4.5, CART, J48 2. Naive Bayes Classifier- This is one of the best machine learning algorithm for spam classification [17], [26]. To classify the message as a spam or non spam can be generalized by probability theory. The spam messages contain the specific words. The relationship between the attribute set and class variable within dataset is non-deterministic. To resolve this problem Bayes theorem introduces a statistical principle for combining prior knowledge of the classes with new evidence gathered from given data. Let X and Y be a pair of random variables. The joint probability, P (X=x, Y=y), gives the probability that variable X will take on the value x and variable Y will take on the value y. The conditional probability is the probability that a random variable will take on a particular value given that the outcome of another random variable is known. The conditional probability p (X=x| Y=y), gives the probability that the variable Y will take on value y, given that the variable X is observed to have the value x. Based on joint and conditional probabilities. Bayes theorem, 𝑃(𝑌|𝑋) = X Y ( ) ( ) Y is the event that a given tweet belongs to a given class. X is the d dimensional feature vector corresponding to the tweet. The Naive bayes model makes the independence assumption that the attributes are all independent. 𝑃(𝑌|𝑋) = 𝑃(𝑌) ∏ (𝑋𝑖|𝑌) 𝑃(𝑋) The demonstrator is same P(X) for spam and non spam classes. So we can discard for classification. P(Spam) ∏ (𝑋𝑖|𝑆𝑝𝑎𝑚), and P(Non Spam)∏ (𝑋𝑖|𝑁𝑜𝑛𝑆𝑝𝑎𝑚)
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy) 567 Classify the given messages with higher probability. The given training dataset was used to determine the conditional probabilities. 4. EXPERIMENTS AND EVALUATION For classification task, we trained and tested integrated approach and compared with other machine learning algorithms. In order to evaluate the model, evaluation metrics (precision, recall and F measure) are used. The evaluation metrics are, Precision is the ratio of number of instances correctly classified to the total number of instances and is expressed as 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = TP TP + FP Recall is the ratio of number of instances correctly classified to the total number of predicted instances and is expressed as 𝑅𝑒𝑐𝑎𝑙𝑙 = F measure is the harmonic mean between precision and recall and is expressed as 𝐹 𝑚𝑒𝑎𝑠𝑢𝑟 = 2 ∗ Precision ∗ Recall Precision + Recall Accuracy is the total number of correctly classified instances of both classes over the total number of all instances in the dataset. 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = We have evaluated the results using two most classifiers, i.e., Decision tree induction and Naive bayes classifiers. Figure 2 shows that results of decision tree and Naive bayes classifiers based on user based features. Naive bayes classifier has closer recall, precision and F-measure as compared to decision tree induction classifier. Figure 3 shows the results of classifiers based on content based features. Decision tree has the highest recall, precision and F-measure compare to Naive bayes algorithm. But Naive bayes algorithm has almost same precision value compared to decision tree. Figure 4 shows the precision, recall and F-measure of classifiers based on combining of user based features and content based features. Compare to individual performance of classifiers based on user based features and content based features hybrid based feature classifiers are outperformed. To improve the further performance of classification model we integrate the decision tree induction classifier and Naive bayes classifier. Figure 5 shows that performance of integrated model based on hybrid features. We have analysed our results with the earlier works [15], [17], [18], [26], [31]. The earlier works used user based features, content based features and hybrid features. We observe an amount of improvement in the results of our approach from the features used in [15]. The top 20 word features are used [17] for spam detection. Compared to earlier classifications, our approach has highest recall, precision and F measure. Figure 2. Classification results using user based features Figure 3. Classification results using content based features
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 562 - 569 568 Figure 4. Classification results using hybrid features Figure 5. Classification results of proposed approach In Table 1 we describe the comparison of our integrated approach with other classification models. Compare to other classifications our hybrid features integrated model out performs with high recall, precision and F measure. Table 1. Comparison between Integrated Approach and Other Classifiers 5. CONCLUSION In this paper we used the hybrid set of features for detecting spam messages on social networking sites. We proposed an integrated spam detection technique to detect spam messages in twitter dataset. In this integrated approach we used decision tree induction classifier, Naive bayes classifier and hybrid features, such as combining of user based features and content based features. Our approach shows performance with high recall, precision and F-measure. In future we will extend our approach to other new set of features and also do our experiments on other social media networks with large amount of dataset. REFERENCES [1] “Facebook” https://en.wikipedia.org/wiki/Facebook#Impact [2] “Twitter” https://en.wikipedia.org/wiki/Twitter#Statistics [3] “Spam Types” https://en.wikipedia.org/wiki/Social_spam#Types [4] Anjali Sharma, Manisha, Dr.Manisha, Dr.Rekha Jain, “A Survey on Spam Detection Techniques,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, issue 12, December 2014. [5] Kaiyu Wang, Yumei Wang, Hongqiao Li, Yilin Xiong and Xinyu Zhang, “A New Approach for Detecting Spam Microblogs Based on Text and Users Social Network Features,” National college Innovation program, Beijing University, china [6] Saumya Goyal, R.K.sharma, Shabnam Parveen, “Spam Detection using KNN and Decision Tree Mechanism in Social Network,” Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC), IEEE, 2016. [7] Benjamin Markines, Ciro Cattuto and Filippo Menczer, “Social Spam Detection,” Airweb’09 spain, ACM 978-1- 60558-438-6 [8] Kyumin Lee, James Caverlee and Steve Webb, “Uncovering Social Spammers: Social honeypots + Machine learning, SIGIR, july-10, Switzerland, ACM 978-1-60558-896-4/10/07 [9] Xin Jin, Cindy Xide Lin, Jiebo Luo and Jiawei Han, “SocialSpamGuard: A Data mining based Spam Detection System for Social Media Networks,” 37th international conference on very large data bases, Washington, 215 8097/11/08, 2011. [10] Xueying Zhang and Xianghan Zheng, “A Novel Method for Spammer Detection in Social Networks,” IEEE, 2015. [11] Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary, “Towards Online Spam Filtering in Social Networks,” cucis.ece.northwestern.edu/publications/pdf/GaoChe12.pdf Classifier Features Recall Precision F measure Decision Tree User based 0.96 0.95 0.9560 Naive bayes User based 0.96 0.95 0.9560 Decision Tree Content based 0.92 0.91 0.9149 Naive bayes Content based 0.62 0.88 0.7274 Decision Tree Integrated features (user based, content based features) 0.96 0.95 0.9549 Naive bayes Integrated features (user based, content based features) 0.75 0.90 0.8181 Integrated Classifier ( Decision Tree and Naive bayes ) Integrated features (user based, content based features) 0.97 0.96 0.9649
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Integrated approach to detect spam in social media networks using hybrid features (K. Subba Reddy) 569 [12] Faraz Ahmed and Muhammad Abulaish, “An MCL-Based Approach for Spam Profile Detection in Online Social Networks,” IEEE, DOI 10.1109/Trustcom.2012.83, 2015. [13] Cheng Cao and James Caverlee, “Detecting Spam URLs in Social Media via Behavioral Analysis,”springer, ECIR 2015, LNCS 9022, pp. 703-714, 2015. [14] Saini Jacob Soman and Dr. S. Murugappan, “Detecting Malicious Tweets in Trending Topics using Clustering and Classification,” International Conference on Recent Trends in Information Technology, IEEE, 2014. [15] Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues and Virgilio Almedia, “Detecting Spammers on Twitter,” CEAS 2010-seventh annual collaboration, electronic messaging, anti-abuse and spam conference july-2010. [16] Sajid Yousuf Bhat, Muhammad Abulaish, Abdulrahman A. Mirza, “Spammer Classification using Ensemble Methods over Structural Social Network Features,” IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent agent Technologies, 2014, DOI 10.1109/WI_IAT.2014.133 [17] Hailu Xu, Weiqinh Sun, ahmad Javid, “Efficient Spam Detection across Online Social Networks,” IEEE-2015 [18] Arushi Gupta, Rishabh Kaushal, “Improving Spam Detection in Online Social Networks,” IEEE-2015 [19] Xianghan zheng, Zhipeng Zeng, Zheyi Chen, Yuanlong Yu,Chunming Rong, “Detecting Spammers on Social Networks,” Elsevier, NeuroComputing 159 ,27-34, 2015. [20] Zahra Mashayekhi, Ali HarounAbadi, “A Hybrid Approach for Detection Based on Decision tree Algorithm and Neural Network,” International Journal of Mechatronics, Electrical and Computer Technology, 2017 [21] Chen Liu, Genying Wang, “Analysis and Detection of Spam accounts in Social Networks,” 2nd IEEE International Conference on Computer and Communications, IEEE, 2016. [22] Prabhjot Kaur, Anubha Singhal, Jasleen Kaur, “Spam Detection on Twitter: A Survey,” IEEE, 2016. [23] Bhagyashri Toke, Dinesh Puri, “Spam Detection in Online Social Networks using Integrated Approach,’’ International Journal of Innovating Research in computer nd communication Engineering, vol. 4, issue 12, [24] Bhagyashri Toke, Dinesh Puri, “Review on Spam Detection in OSN using Integrated Approach,” International Research Journal of Engineering and Technology, Volume:3, Issue:5,May-2016. [25] Ala M. AI-Zoubi, Ja far Alqatawna, Hossam Faris, “Spam Profile Detection in Social Networks Based on Public Features,” 8th International Conference on Information and Communication Systems, IEEE, 2017. [26] Malik Mateen, Mahammad Aleem, Mihammad Azhar Iqbal, Muhammad Arshad Islam, “A Hybrid Approach for Spam Detection for Twitter,” proceedings of 2017 14th International Bhurban Conference on Applied Sciences & Technology, IEEE, 2017. [27] Aziah Khamis, Yan Xu, and Azah Mohamed, “Comparative Study in Determining Features Extraction for Islanding Detection using Data Mining Technique: Correlation and Coefficient Analysis,” International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 3, pp. 1112 – 1124 ISSN: 2088-8708, June 2017 [28] Alhamza Munther, Rozmie Razif, Mosleh AbuAlhaj, Mohammed Anbar, Shahrul Nizam, “A Preliminary Performance Evaluation of K-means, KNN and EM Unsupervised Machine Learning Methods for Network Flow Classification”, International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 2, pp. 778~784 ISSN: 2088-8708, April 2016. [29] Sachin Kamley, Shailesh Jaloree, R. S. Thakur, “Performance Forecasting of Share Market using Machine Learning Techniques: A Review,” International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 6, pp. 3196~3204 ISSN: 2088-8708, December 2016, DOI: 10.11591/ijece.v6i6.13323 [30] Sharvil Shah*, K Kumar**, Ra. K. Saravanaguru**, “Sentimental Analysis of Twitter Data Using Classifier Algorithms,” International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 1, pp. 357~366 ISSN: 2088-8708, February 2016, DOI: 10.11591/ijece.v6i1.8982 [31] K Subba Reddy, E Srinivasa Reddy, “An Efficient Methodology to Detect Spam In Social Networking Sites,” International Journal of Computer Science and Information Security (IJCSIS), Vol 15 No. 7, July 2017 BIOGRAPHIES OF AUTHORS Mr K Subba Reddy is PhD student in Department of Computer Science and Engineering, Acharya Nagarjuna University, Guntur, India. He has published papers in international conferences and journals. His area of interest is Big Data, Data mining and machine learning. Dr E Srinivasa Reddy, PhD., is currently serving as principal in University College of Engineering and Technology and also serving as Head of Department in Computer Science and Engineering, Acharya Nagarjuna University, Guntur, India. He has more than 24 years teaching experience. He is guiding PhD to 8 scholars and 15 has completed his PhD. Dissertations and contributed 45 articles in conferences and 120 papers in Research Journals. His area of interest is Image Processing and Data mining. He may be contacted at: esreddy67@gmail.com