{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:35:22Z","timestamp":1743028522621,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":27,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493971305"},{"type":"electronic","value":"9781493971312"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4939-7131-2_110199","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:07:47Z","timestamp":1528744067000},"page":"2851-2859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spam Detection on Social Networks"],"prefix":"10.1007","author":[{"given":"Ninghao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xia","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"110199_CR192147","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), vol 6, pp 12"},{"key":"110199_CR192148","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1145\/1963405.1963500","volume-title":"Proceedings of the 20th international conference on world wide web","author":"C Castillo","year":"2011","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web. ACM, New York, pp 675\u2013684"},{"key":"110199_CR192149","first-page":"175","volume":"13","author":"G Fei","year":"2013","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. ICWSM 13:175\u2013184","journal-title":"ICWSM"},{"key":"110199_CR192150","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/2187836.2187846","volume-title":"Proceedings of the 21st international conference on world wide web","author":"S Ghosh","year":"2012","unstructured":"Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on world wide web. ACM, New York, pp 61\u201370"},{"key":"110199_CR192151","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1866307.1866311","volume-title":"Proceedings of the 17th ACM conference on computer and communications security","author":"C Grier","year":"2010","unstructured":"Grier C, Thomas K, Paxson V, Zhang M (2010) @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, New York, pp 27\u201337"},{"key":"110199_CR192152","first-page":"153","volume-title":"SDM","author":"M Gupta","year":"2012","unstructured":"Gupta M, Zhao P, Han J (2012) Evaluating event credibility on twitter. In: SDM. SIAM, Anaheim, pp 153\u2013164"},{"key":"110199_CR192153","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/ICDM.2014.141","volume-title":"2014 I.E. international conference on data mining (ICDM)","author":"X Hu","year":"2014","unstructured":"Hu X, Tang J, Gao H, Liu H (2014a) Social spammer detection with sentiment information. In: 2014 I.E. international conference on data mining (ICDM). IEEE, Washington, DC, pp 180\u2013189"},{"key":"110199_CR192154","first-page":"547","volume-title":"Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval","author":"X Hu","year":"2014","unstructured":"Hu X, Tang J, Liu H (2014b) Leveraging knowledge across media for spammer detection in microblogging. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval. ACM, New York, pp 547\u2013556"},{"key":"110199_CR192155","first-page":"59","volume-title":"Online social spammer detection","author":"X Hu","year":"2014","unstructured":"Hu X, Tang J, Liu H (2014c) Online social spammer detection. AAAI, In, pp 59\u201365"},{"key":"110199_CR192156","unstructured":"Hu X, Tang J, Zhang Y, Liu H (2013) Social spammer detection in microblogging. In: IJCAI, vol 13. Citeseer, pp 2633\u20132639"},{"key":"110199_CR192157","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/ICDM.2015.61","volume-title":"2015 I.E. international conference on data mining (ICDM)","author":"M Jiang","year":"2015","unstructured":"Jiang M, Beutel A, Cui P, Hooi B, Yang S, Faloutsos C (2015) A general suspiciousness metric for dense blocks in multimodal data. In: 2015 I.E. international conference on data mining (ICDM). IEEE, Washington, DC, pp 781\u2013786"},{"key":"110199_CR192158","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1145\/2623330.2623632","volume-title":"Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","author":"M Jiang","year":"2014","unstructured":"Jiang M, Cui P, Beutel A, Faloutsos C, Yang S (2014) Catchsync: catching synchronized behavior in large directed graphs. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 941\u2013950"},{"key":"110199_CR192159","first-page":"219","volume-title":"Proceedings of the 2008 international conference on web search and data mining","author":"N Jindal","year":"2008","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the 2008 international conference on web search and data mining. ACM, New York, pp 219\u2013230"},{"key":"110199_CR192160","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1455770.1455774","volume-title":"Proceedings of the 15th ACM conference on Computer and communications security","author":"C Kanich","year":"2008","unstructured":"Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S (2008) Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM conference on Computer and communications security. ACM, New York, pp 3\u201314"},{"key":"110199_CR192161","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/2184305.2184316","volume-title":"Proceedings of the 2nd joint WICOW\/AIRWeb workshop on web quality","author":"K Lee","year":"2012","unstructured":"Lee K, Caverlee J, Kamath KY, Cheng Z (2012) Detecting collective attention spam. In: Proceedings of the 2nd joint WICOW\/AIRWeb workshop on web quality. ACM, New York, pp 48\u201355"},{"key":"110199_CR192162","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/1835449.1835522","volume-title":"Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval","author":"K Lee","year":"2010","unstructured":"Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 435\u2013442"},{"key":"110199_CR192163","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1964858.1964869","volume-title":"Proceedings of the first workshop on social media analytics","author":"M Mendoza","year":"2010","unstructured":"Mendoza M, Poblete B, Castillo C (2010) Twitter under crisis: can we trust what we rt? In: Proceedings of the first workshop on social media analytics. ACM, New York, pp 71\u201379"},{"key":"110199_CR192164","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2623330.2623714","volume-title":"Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","author":"S Mukherjee","year":"2014","unstructured":"Mukherjee S, Weikum G, Danescu-Niculescu-Mizil C (2014) People on drugs: credibility of user statements in health communities. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 65\u201374"},{"key":"110199_CR192165","first-page":"297","volume":"11","author":"J Ratkiewicz","year":"2011","unstructured":"Ratkiewicz J, Conover M, Meiss M, Gon\u00e7alves B, Flammini A, Menczer F (2011) Detecting and tracking political abuse in social media. ICWSM 11:297\u2013304","journal-title":"ICWSM"},{"key":"110199_CR192166","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1145\/2783258.2783370","volume-title":"Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining","author":"S Rayana","year":"2015","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 985\u2013994"},{"key":"110199_CR192167","unstructured":"Rubin K (2012) The ultimate list of email SPAM trigger words"},{"key":"110199_CR192168","unstructured":"Starbird K, Muzny G, Palen L (2012) Learning from the crowd: collaborative filtering techniques for identifying on-the-ground twitterers during mass disruptions. In: Proceedings of 9th international conference on information systems for crisis response and management (ISCRAM)"},{"key":"110199_CR192169","first-page":"1","volume-title":"Proceedings of the 26th annual computer security applications conference","author":"G Stringhini","year":"2010","unstructured":"Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, New York, pp 1\u20139"},{"key":"110199_CR192170","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/2068816.2068840","volume-title":"Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference","author":"K Thomas","year":"2011","unstructured":"Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, New York, pp 243\u2013258"},{"key":"110199_CR192171","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/2187836.2187847","volume-title":"Proceedings of the 21st international conference on world wide web","author":"C Yang","year":"2012","unstructured":"Yang C, Harkreader R, Zhang J, Shin S, Gu G (2012) Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on world wide web. ACM, New York, pp 71\u201380"},{"key":"110199_CR192172","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/ICDE.2011.5767910","volume-title":"2011 I.E. 27th international conference on data engineering (ICDE)","author":"X Ying","year":"2011","unstructured":"Ying X, Wu X, Barbar\u00e1 D (2011) Spectrum based fraud detection in social networks. In: 2011 I.E. 27th international conference on data engineering (ICDE). IEEE, Washington, DC, pp 912\u2013923"},{"issue":"4","key":"110199_CR192173","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"H Yu","year":"2006","unstructured":"Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267\u2013278","journal-title":"ACM SIGCOMM Comput Commun Rev"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-7131-2_110199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T13:37:56Z","timestamp":1661434676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4939-7131-2_110199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781493971305","9781493971312"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-7131-2_110199","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}