{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“讯息”:{“索引”:{“日期部分”:[[2024,4,4]],“日期时间”:“2024-04-04T14:38:23Z”,“时间戳”:1712241503850},“参考计数”:38,“出版商”:“电气与电子工程师学会(IEEE)”,“许可证”:[{“开始”:{-“日期部分“:[2020,1,1]],“时间”:”2020-01-01T0T0 0:00:00Z“,“时间戳”:157783680000},“内容版本”:“vor”,“延迟天数”:0,“URL”:“https://creativecommons.org/licenses\/by\/4.0\/legalcode”}],“资助者”:[{“DOI”:“10.13039\/501100001809”,“name”:“国家自然科学基金会”,“DOI断言者”:“发布者”,“奖项”:[“61872254”]},{“DOI”:“10.13039\/501100012226”,“name”:“中央高校基本科研业务费”,“doi-asserted-by”:“publisher”,“adward”:[“YJ201727”]},{“doi”:“10.13039\/501100004829”,“name”:“四川省科技厅”,“doi-asserted-by”:“publishers”,“award”:[”2014JY0036“,”2018JY0913“]}”,{:“四川省学术和技术领导人培训与支持基金会”}],“内容域”:{“域”:[],“交叉标记-限制”:false},“短容器-标签”:[“IEEE访问”],“发布-打印”:{“日期-部件”:[[2020]]},”DOI“:”10.1109\/Access.2020.2975877“,”type“:”journal-article“,”created“:{”date-parts“:[2020,2,25]],“日期-时间”:“2020-02-25T04:08:05Z”,“时间戳”:1582603685000},“页面”:“38753-38766”,“源”:“Crossref”,“is-referenced-by-count”:14,“标题”:[“通过深度学习在在线社交网络中检测Sybil的基于内容的方法”],“前缀”:“10.1109”,”卷“:”8“作者”:[{“ORCID”:“http://ORCID.org\0000-0001-530-8373”,“authenticated-ORCID”:false,“given”:“Tianyu”,“family”:“Gao”,“sequence”:“first”,“affiliation”:[]},{“ORCID”:”http://\/ORCID.org\/00000-0002-5995-8550“,“authenticated-ORCID”:false“,”given“:”Jin“,”family“:”Yang“,”sequence“:”additional“,”affiliance“:[]{”ORCID“http://\ORCID.org\/000-0002-1171-3319”,“authoritated-org”:false,“gived”:“文君”,“家族”:“彭”,“序列”:“additional”,“affiliation”:[]},{“ORCID”:“http://\/ORCID.org\/00000-0003-1255-6236”,“authenticated-ORCID”:false,“given”::“Luyu”,“family”:“Jiang”,“sequence”:“additive”,“filiation“:[]{”ORCID:“http://\\ORCID.org\/000-0002-4401-924”,“authenticated-ORCID“:false”,“giving”:“Yihao”,“家族”:“Sun”,“序列”:“附加”,“从属关系“:[]},{“ORCID”:“http://\/orcid.org\/00000-0002-6467-5395”,“authenticated-orcid”:false,“given”:“Fangcuan”,“family”:“Li”,“sequence”:“additional”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”:”ref38“article-title”:“Adam:一种随机优化方法”,“作者”:“kingma”,“年份”:“2014”,“日志标题”:“arXiv1412 6980”},{“密钥”:“ref33”,“首页”:“971”,“article-title”:“自我规范化神经网络”,“author”:“klambauer”,“year”:“2017”,“journal-title“:”Proc-Adv neural Inf Process Syst“},{“key”:“ref32”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/IJCNN.2019.8852406”}“}”,{“key”:“ref30”,“doi-asserted-by”:“publisher”,“DOI”:“10.1186\/s40537-019-0197-0”},{“key”:“ref37”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1016\/j.dss.2015.09.003“},}”key“:”ref36“,”DOI-assert-by“:”publisher“,”DOI“:”10.116\/j.patrec.2018.09.006“}”,{《key》:“ref35”,“首页”:“1929”,“article-title”:“Dropout:防止神经网络过拟合的简单方法”,“volume”:“15”,“author”:“srivastava”,“year”:“2014”,“journal-title”:“J Mach Learn Res”},{“key”:“ref34”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/PHM.2008.4711423”}le-title“:“帮助检测大规模社交网络服务中的虚假帐户”,“author”:“cao”,“year”:“0”},{“key”:“ref12”,“article-title”:“SybilFence:通过用户负面反馈改进基于社交图的sybil防御”,“author”:“cao“,“year:”2013“,“journal-title“:”arXiv 1304 3819“},}“key”:“ref13”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/INFCOM.2012.6195572”},{“key”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/TDSC.2015.2410792”}.,{”key“:”ref15“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/TDSC.2015.2410782“},{”key“:”ref17“,”doi-asserted-by“:”publisher“,”doi“:“10.1109\/ICC.2016.7511603”},{“key”:“ref18”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/INFCOM.2013.6566893”}、{“密钥”:“ref19”,“doi-asserte-by”:“publisher”,“DII”:”10.1109\/AACC.2016.111“},}“keys”:“ref28”,“dio-asserted-by”:”publisher“,“doi:”10.1109\/PST.2018.8514162“}”,{“key”:“ref4”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2011.25”},{:“ref27”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SSCI.2017.8285447”},{“key”:“ref3”,“doi-assertd-by”:“publisher”,“DI:”10.1145\/2068816.2068840“},}“key:”ref6“,”doi-assert-by“:”publisher“,”doi“:”10.1145 \/1966913.1966939,“doi”:“10.1016\/j.future.2017.08.030”},{“key”:“ref5”,“doi-asserted-by”:“publisher”,“DOI”:“10.1145\/1526709.15267784”},{“key”:“ref8”,“DOI由”断言:“publisher”,“DOI”:“10.1109\/TNET。2009.2034047”},{“key”:“ref7”,“DOI由”断言:“publisher”,“DOI”:“10.1109\/TNET。2008.923723”},{“key”:“ref2”,“DOI由”断言:“publisher”,“DOI”:“10.1109\/TNET。2018.28133672”},{key”:“参考文献9”,“首页”:“1”,“文章标题”:“Sybilinfer:使用社交网络检测sybil节点”,“author”:“danezis”,“year”:“2009”,“journal-title”:“Proc NDSS”},{“key”:“ref1”,“author”:“clement”,“year”:”2019“,”journal-title“:”Twitter-Statistics&Facts“},”{“密钥”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/INFOCOM.2017.8057066”}“,{”key“:”ref 22“,”doi-asserted-by“:”publisher“,”doi“:“10.1109\/ICNP.2018.00015”},{“key”:“ref21”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/TIFS.2014.2316975”}.,{”key“:”ref24“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/CIMLA.2014.81“},”{“密钥”:“ref23”,“首页”:“241”,“文章标题”:“您是如何点击流分析进行sybil检测的”,“作者”:“王”,“年份”:“2013年”,“新闻标题”:“Proc 22nd USENIX Secur Symp”},{“key”:“ref26”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/DSC.2016.68”}访问“],”原始标题“:[],“链接”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09007376.pdf?arnumber=9007376”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“存放”:{“日期部分”:[2021,12,17]],“日期时间”:“2021-12-17T19:51:49Z”,“时间戳”:16397709000},“score”(分数):1,“resource”(资源):{“primary”(主资源):}“URL”(URL):“https:\/\/ieeexplore.iee.org\/document\/9007376\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2020]]},”引用计数“:38,”URL“:”http://\/dx.doi.org\/10.109\/access.2020.2975877“,”关系“:{},36“,”type“:”electronic“}],”subject“:[],”published“:{”date-parts“:[[2020]]}}}