CFP last date
21 April 2025
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 21 April 2025

Submit your paper
Know more
Reseach Article

Fake Profile Detection and Stalking Prediction on Twitter (X) using Convolutional Neural Network (CNN)

by Christy Onoshokwue Isokpehi, P.O. Asagba
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 66
Year of Publication: 2025
Authors: Christy Onoshokwue Isokpehi, P.O. Asagba
10.5120/ijca2025923771

Christy Onoshokwue Isokpehi, P.O. Asagba . Fake Profile Detection and Stalking Prediction on Twitter (X) using Convolutional Neural Network (CNN). International Journal of Computer Applications. 186, 66 ( Feb 2025), 14-23. DOI=10.5120/ijca2025923771

@article{ 10.5120/ijca2025923771,
author = { Christy Onoshokwue Isokpehi, P.O. Asagba },
title = { Fake Profile Detection and Stalking Prediction on Twitter (X) using Convolutional Neural Network (CNN) },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2025 },
volume = { 186 },
number = { 66 },
month = { Feb },
year = { 2025 },
issn = { 0975-8887 },
pages = { 14-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number66/fake-profile-detection-and-stalking-prediction-on-twitter-x-using-convolutional-neural-network-cnn/ },
doi = { 10.5120/ijca2025923771 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-02-25T22:57:53.877097+05:30
%A Christy Onoshokwue Isokpehi
%A P.O. Asagba
%T Fake Profile Detection and Stalking Prediction on Twitter (X) using Convolutional Neural Network (CNN)
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 66
%P 14-23
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research is directly focused on fake profile detection and stalking prediction in twitter using convolution neural network. Twitter is a real-time social media application that has gained global popularity, and the use of twitter is also raising serious issues in the form of cyber-stalking. Stalking is a serious cyber-attack in which the attacker uses digital media to harass the victim or group through personal attacks and the disclosure of false or confidential information among other persons. Stalking is categorize as email-stalking, internet-stalking, and computer-stalking. The main challenging problems in twitter social network security is to recognize fake profiles and stalking activities by followers. These Fake profiles are a preferred means for malicious users to commit various cybercrimes such as cyber-stalking, disseminating misinformation and fake news, stigmatize someone's personality, capturing subscribers' credentials and generating malicious communications, misleading users towards counterfeit sites and impacting notoriety. This study detect fake profiles and predict stalking activities in twitter. Convolution neural network is used to train with the dataset of twitter profiles which gives the accuracy of the model. Predicted results are produced after training and evaluation of the models, which is able to distinguish between fake and real twitter profiles based on attributes like follower and friend counts, status updates, and more. The adopted methodology is Object Oriented Analysis and Design Method (OOADM). Python programming language is use for implementation. The application results show that the proposed convolution neural network model performs better prediction accuracy than other considered algorithms and correctly classified over 95% of the accounts with a low error rate.

References
  1. Gupta T., (2019), Fake Profile Identification Using Machine Learning. International Research Journal of Engineering and Technology (IRJET), 6, 1145-1150.
  2. Rahman (2019), Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices, International Journal of Security, Privacy and Trust Management (IJSPTM), 2(2), 1 – 17.
  3. Prathyusha (2021), Forecasting shear stress parameters in rectangular channels using new soft computing methods. Plos One, 15(4): e0229731.
  4. Nicholson H., (2020), Fake profile detection techniques in large-scale online social networks: A comprehensive review. Computers & Electrical Engineering, 65: 165-177.
  5. Saied (2020), Fake profile identification on Instagram using Machine Learning techniques. International Research Journal of Engineering and Technology (IRJET), 6(23): 211-323.
  6. Balakrishnan (2020), utilizing Machine Learning algorithms for automated detection of cyberbullying in Twitter tweets. Applications and Technology Conference (LISAT), Farmingdale, 23(13): 1-7.
  7. Supraja (2019), pattern detection approach to detect the fake accounts. In this paper, the crawler is used to collect the twitter dataset. Interna- tional Journal of Scientific Research and Publications, 6(41), 13 – 26.
  8. Mohammed and Asaad (2020), new approach with dual functions, namely to identify and classify the twitter bots based on ontological engineering and Semantic Web Rule Language (SWRL) rules. International Journal of Advanced Computer Science and Applications, 7(13): 621-732.
  9. Arun (2017), demonstration of the use of data hiding technique to hide information in profile picture or photo to detect fake profile and is associated with digital forms as cryptography, steganography and watermarking. Journal of Computer and Communications, 4(11): 79-99.
  10. Alhariri (2020), detection of similar fake accounts on twitter using the random forest algorithm analyze the early detection of similar fake accounts on Twitter using the following features based the confusion matrix: International Conference on Research and Innovation in Information Systems (ICRIIS), 2013 223 – 234.
  11. Priya G., (2020), Online Social Network: A Threat to Privacy and Security of Human Society, Interna- tional Journal of Scientific Research and Publications, 5(4), 1 – 6.
  12. Chibroma A. (2017), Structured Generative Models using the IoT, Proceedings of the 31st International Conference on Machine Learning, Beijing, China, JMLR: W & CP, V.32, arXiv:1401.0514v2[cs.PL], 1 – 14
Index Terms

Computer Science
Information Sciences

Keywords

Fake Profile; Stalking; Convolutional Neural Network; Twitter; Detection