scispace - formally typeset
Search or ask a question
Author

Luca Luceri

Bio: Luca Luceri is an academic researcher from SUPSI. The author has contributed to research in topics: Computer science & Social media. The author has an hindex of 10, co-authored 26 publications receiving 272 citations. Previous affiliations of Luca Luceri include University of Southern California & University of Bern.

Papers
More filters
Journal ArticleDOI
22 Nov 2020
TL;DR: Contributions investigating issues such as the emergence of infodemics, misinformation, conspiracy theories, automation, and online harassment on the onset of the coronavirus outbreak are collected.
Abstract: The COVID-19 pandemic represented an unprecedented setting for the spread of online misinformation, manipulation, and abuse, with the potential to cause dramatic real-world consequences. The aim of this special issue was to collect contributions investigating issues such as the emergence of infodemics, misinformation, conspiracy theories, automation, and online harassment on the onset of the coronavirus outbreak. Articles in this collection adopt a diverse range of methods and techniques, and focus on the study of the narratives that fueled conspiracy theories, on the diffusion patterns of COVID-19 misinformation, on the global news sentiment, on hate speech and social bot interference, and on multimodal Chinese propaganda. The diversity of the methodological and scientific approaches undertaken in the aforementioned articles demonstrates the interdisciplinarity of these issues. In turn, these crucial endeavors might anticipate a growing trend of studies where diverse theories, models, and techniques will be combined to tackle the different aspects of online misinformation, manipulation, and abuse.

95 citations

Proceedings ArticleDOI
13 May 2019
TL;DR: It is shown that social bots can be accurately classified according to their political leaning and behave accordingly, and that conservative bots are more deeply embedded in the social network and more effective than liberal bots at exerting influence on humans.
Abstract: Recent research brought awareness of the issue of bots on social media and the significant risks of mass manipulation of public opinion in the context of political discussion. In this work, we leverage Twitter to study the discourse during the 2018 US midterm elections and analyze social bot activity and interactions with humans. We collected 2.6 million tweets for 42 days around the election day from nearly 1 million users. We use the collected tweets to answer three research questions: (i) Do social bots lean and behave according to a political ideology? (ii) Can we observe different strategies among liberal and conservative bots? (iii) How effective are bot strategies in engaging humans? We show that social bots can be accurately classified according to their political leaning and behave accordingly. Conservative bots share most of the topics of discussion with their human counterparts, while liberal bots show less overlap and a more inflammatory attitude. We studied bot interactions with humans and observed different strategies. Finally, we measured bots embeddedness in the social network and the extent of human engagement with each group of bots. Results show that conservative bots are more deeply embedded in the social network and more effective than liberal bots at exerting influence on humans.

58 citations

Posted Content
TL;DR: In this paper, the authors collected 2.6 million tweets for 42 days around the election day from nearly 1 million users and used the collected tweets to answer three research questions: (i) Do social bots lean and behave according to a political ideology? (ii) Can we observe different strategies among liberal and conservative bots? (iii) How effective are bot strategies?
Abstract: Recent research brought awareness of the issue of bots on social media and the significant risks of mass manipulation of public opinion in the context of political discussion. In this work, we leverage Twitter to study the discourse during the 2018 US midterm elections and analyze social bot activity and interactions with humans. We collected 2.6 million tweets for 42 days around the election day from nearly 1 million users. We use the collected tweets to answer three research questions: (i) Do social bots lean and behave according to a political ideology? (ii) Can we observe different strategies among liberal and conservative bots? (iii) How effective are bot strategies? We show that social bots can be accurately classified according to their political leaning and behave accordingly. Conservative bots share most of the topics of discussion with their human counterparts, while liberal bots show less overlap and a more inflammatory attitude. We studied bot interactions with humans and observed different strategies. Finally, we measured bots embeddedness in the social network and the effectiveness of their activities. Results show that conservative bots are more deeply embedded in the social network and more effective than liberal bots at exerting influence on humans.

55 citations

Journal ArticleDOI
TL;DR: It is shown that, in the 2018 midterms, bots changed the volume and the temporal dynamics of their online activity to better mimic humans and avoid detection.
Abstract: Online social media have become one of the main communication platforms for political discussion. The online ecosystem, however, does not only include human users but has given a space to an increasing number of automated accounts, referred to as bots, extensively used to spread messages and manipulate the narratives others are exposed to. Although social media service providers put increasing efforts to protect their platforms, malicious bot accounts continuously evolve to escape detection. In this work, we monitored the activity of almost 245K accounts engaged in the Twitter political discussion during the last two U.S. voting events. We identified approximately 31K bots and characterized their activity in contrast with humans. We show that, in the 2018 midterms, bots changed the volume and the temporal dynamics of their online activity to better mimic humans and avoid detection. Our findings highlight the mutable nature of bots and illustrate the challenges to forecast their evolution.

43 citations

Proceedings ArticleDOI
13 May 2019
TL;DR: An in-depth analysis of the 2018 US Midterm elections looking specifically for voter fraud or suppression and some confounding factors, such as population bias, or bot and political ideology inference, that can lead to false conclusions are identified.
Abstract: One of the hallmarks of a free and fair society is the ability to conduct a peaceful and seamless transfer of power from one leader to another. Democratically, this is measured in a citizen population’s trust in the electoral system of choosing a representative government. In view of the well documented issues of the 2016 US Presidential election, we conducted an in-depth analysis of the 2018 US Midterm elections looking specifically for voter fraud or suppression. The Midterm election occurs in the middle of a 4 year presidential term. For the 2018 midterms, 35 Senators and all the 435 seats in the House of Representatives were up for re-election, thus, every congressional district and practically every state had a federal election. In order to collect election related tweets, we analyzed Twitter during the month prior to, and the two weeks following, the November 6, 2018 election day. In a targeted analysis to detect statistical anomalies or election interference, we identified several biases that can lead to wrong conclusions. Specifically, we looked for divergence between actual voting outcomes and instances of the #ivoted hashtag on the election day. This analysis highlighted three states of concern: New York, California, and Texas. We repeated our analysis discarding malicious accounts, such as social bots. Upon further inspection and against a backdrop of collected general election-related tweets, we identified some confounding factors, such as population bias, or bot and political ideology inference, that can lead to false conclusions. We conclude by providing an in-depth discussion of the perils and challenges of using social media data to explore questions about election manipulation.

38 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Methods for step counting, step length and direction estimation, orientation tracking, motion classification, transit mode detection, and floor change detection in multi-storey buildings are discussed.
Abstract: This paper provides an overview of the most significant existing methods for indoor positioning on a contemporary smartphone. The approaches include Wi-Fi and Bluetooth based positioning, magnetic field fingerprinting, map aided navigation using building floor plans, and aiding from self-contained sensors. Wi-Fi and Bluetooth based positioning methods considered in this survey are fingerprint approaches that determine a user's position using a database of radio signal strength measurements that were collected earlier at known locations. Magnetic field fingerprinting can be used in an information fusion algorithm to improve positioning. The map-matching algorithms include application of wall constraints, topological indoor maps, and building geometry for heading correction. Finally, methods for step counting, step length and direction estimation, orientation tracking, motion classification, transit mode detection, and floor change detection in multi-storey buildings are discussed.

420 citations

Journal ArticleDOI
TL;DR: This paper compares some of the representative localization schemes in a single real environment and assess their localization accuracy, positioning error statistics, and complexity and depicts illustrative evaluation of the approaches in the literature and guide to future improvement opportunities.
Abstract: Wireless local area networks (WLANs) have become a promising choice for indoor positioning as the only existing and established infrastructure, to localize the mobile and stationary users indoors. However, since WLANs have been initially designed for wireless networking and not positioning, the localization task based on WLAN signals has several challenges. Amongst the WLAN positioning methods, WLAN fingerprinting localization has recently garnered great attention due to its promising performance. Notwithstanding, WLAN fingerprinting faces several challenges and hence, in this paper, our goal is to overview these challenges and corresponding state-of-the-art solutions. This paper consists of three main parts: 1) conventional localization schemes; 2) state-of-the-art approaches; and 3) practical deployment challenges. Since all proposed methods in the WLAN literature have been conducted and tested in different settings, the reported results are not readily comparable. So, we compare some of the representative localization schemes in a single real environment and assess their localization accuracy, positioning error statistics, and complexity. Our results depict illustrative evaluation of the approaches in the literature and guide to future improvement opportunities.

242 citations

Journal ArticleDOI
TL;DR: The authors studied 43.3M English tweets about COVID-19 and provided early evidence of the use of bots to promote political conspiracies in the United States, in stark contrast with humans who focus on public health concerns.
Abstract: With people moving out of physical public spaces due to containment measures to tackle the novel coronavirus (COVID-19) pandemic, online platforms become even more prominent tools to understand social discussion. Studying social media can be informative to assess how we are collectively coping with this unprecedented global crisis. However, social media platforms are also populated by bots, automated accounts that can amplify certain topics of discussion at the expense of others. In this paper, we study 43.3M English tweets about COVID-19 and provide early evidence of the use of bots to promote political conspiracies in the United States, in stark contrast with humans who focus on public health concerns.

175 citations

Journal ArticleDOI
TL;DR: This paper proposes a framework that uses minimal account metadata, enabling efficient analysis that scales up to handle the full stream of public tweets of Twitter in real time, and finds that strategically selecting a subset of training data yields better model accuracy and generalization than exhaustively training on all available data.
Abstract: Efficient and reliable social bot classification is crucial for detecting information manipulation on social media. Despite rapid development, state-of-the-art bot detection models still face generalization and scalability challenges, which greatly limit their applications. In this paper we propose a framework that uses minimal account metadata, enabling efficient analysis that scales up to handle the full stream of public tweets of Twitter in real time. To ensure model accuracy, we build a rich collection of labeled datasets for training and validation. We deploy a strict validation system so that model performance on unseen datasets is also optimized, in addition to traditional cross-validation. We find that strategically selecting a subset of training data yields better model accuracy and generalization than exhaustively training on all available data. Thanks to the simplicity of the proposed model, its logic can be interpreted to provide insights into social bot characteristics.

144 citations

Journal ArticleDOI
TL;DR: This survey summarizes and analyzes the existing fusion-based positioning systems and techniques from three characteristics, which consists of three fusion characteristics: source, algorithm, and weight spaces, and discusses their lessons, challenges, and countermeasures.
Abstract: Demands for indoor positioning based services (IPS) in commercial and military fields have spurred many positioning systems and techniques. Complex electromagnetic environments (CEEs) may, however, degenerate the accuracy and robustness of some existing single systems and techniques. To overcome this drawback, fusion-based positioning of multiple systems and/or techniques have been proposed to revamp the positioning performance in CEEs. In this paper, we survey the fusion-based indoor positioning techniques and systems from seminal works to elicit the state of the art within our proposed unified fusion-based positioning framework, which consists of three fusion characteristics: source, algorithm, and weight spaces. Different from other surveys, this survey summarizes and analyzes the existing fusion-based positioning systems and techniques from three characteristics. Meanwhile, discussions in terms of lessons, challenges, and countermeasures are also presented. This survey is invaluable for researchers to acquire a clear concept of indoor fusion-based positioning systems and techniques and also to gain insights from this survey to further develop other advanced fusion-based positioning systems and techniques in the future.

133 citations