{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:25:45Z","timestamp":1742991945226,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026097"},{"type":"electronic","value":"9783030026103"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02610-3_30","type":"book-chapter","created":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T11:41:17Z","timestamp":1539776477000},"page":"534-551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Spam Detection Approach for Cloud Service Reviews Based on Probabilistic Ontology"],"prefix":"10.1007","author":[{"given":"Emna","family":"Ben-Abdallah","sequence":"first","affiliation":[]},{"given":"Khouloud","family":"Boukadi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hammami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"key":"30_CR1","unstructured":"Cloudharmony. cloudharmony.com"},{"key":"30_CR2","unstructured":"Cloudlook. www.cloudlook.com"},{"key":"30_CR3","unstructured":"Cloudreviews. cloudreviews.com"},{"key":"30_CR4","unstructured":"G2crowd. g2crowd.com"},{"key":"30_CR5","unstructured":"Hostadvice. hostadvice.com"},{"key":"30_CR6","unstructured":"Trustradius (2013). trustradius.com"},{"key":"30_CR7","unstructured":"Social media use in 2018 (2018). http:\/\/www.pewinternet.org\/2018\/03\/01\/social-media-use-in-2018\/"},{"key":"30_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-76348-4_66","volume-title":"Intelligent Systems Design and Applications","author":"E Ben-Abdallah","year":"2018","unstructured":"Ben-Abdallah, E., Boukadi, K., Hammami, M.: SMI-based opinion analysis of cloud services from online reviews. In: Abraham, A., Muhuri, P.K., Muda, A.K., Gandhi, N. (eds.) ISDA 2017. AISC, vol. 736, pp. 683\u2013692. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76348-4_66"},{"key":"30_CR9","unstructured":"Carvalho, R.: Probabilistic ontology: representation and modeling methodology, January 2011"},{"key":"30_CR10","unstructured":"Carvalho, R., Laskey, K.B., Costa, P., Ladeira, M., Santos, L.L., Matsumoto, S.: Unbbayes: modeling uncertainty for plausible reasoning in the semantic web (2012)"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ijar.2017.08.011","volume":"91","author":"Rommel N. Carvalho","year":"2017","unstructured":"Carvalho, R.N., Laskey, K.B., Costa, P.C.: PR-OWL: a language for defining probabilistic ontologies. Int. J. Approx. Reason. 91, 56\u201379 (2017). https:\/\/doi.org\/10.1016\/j.ijar.2017.08.011, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0888613X17301044","journal-title":"International Journal of Approximate Reasoning"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-540-33473-6_1","volume-title":"Soft Computing in Ontologies and Semantic Web","author":"Z Ding","year":"2006","unstructured":"Ding, Z., Peng, Y., Pan, R.: BayesOWL: uncertainty modeling in semantic web ontologies. In: Ma, Z. (ed.) Soft Computing in Ontologies and Semantic Web, pp. 3\u201329. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-3-540-33473-6_1"},{"key":"30_CR13","unstructured":"Esuli, A., Sebastiani, F.: Sentiwordnet: a publicly available lexical resource for opinion mining. In: Proceedings of the 5th Conference on Language Resources and Evaluation (LREC 2006), pp. 417\u2013422 (2006)"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection, pp. 175\u2013184, January 2013","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"30_CR15","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: ICWSM (2013)"},{"key":"30_CR16","doi-asserted-by":"publisher","unstructured":"Heydari, A., Tavakoli, M., Salim, N.: Detection of fake opinions using time series. Expert Syst. Appl. 58(C), 83\u201392 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2016.03.020, https:\/\/doi.org\/10.1016\/j.eswa.2016.03.020","DOI":"10.1016\/j.eswa.2016.03.020"},{"key":"30_CR17","doi-asserted-by":"publisher","unstructured":"Jiang, S.Y., Yang, A.M.: Framework of clustering-based outlier detection. In: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 1, pp. 475\u2013479, August 2009. https:\/\/doi.org\/10.1109\/FSKD.2009.94","DOI":"10.1109\/FSKD.2009.94"},{"issue":"4","key":"30_CR18","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/69.868902","volume":"12","author":"KB Laskey","year":"2000","unstructured":"Laskey, K.B., Mahoney, S.M.: Network engineering for agile belief network models. IEEE Trans. Knowl. Data Eng. 12(4), 487\u2013498 (2000). https:\/\/doi.org\/10.1109\/69.868902","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"30_CR19","doi-asserted-by":"publisher","unstructured":"Li, F., Huang, M., Yang, Y., Zhu, X.: Learning to identify review spam. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence, IJCAI 2011, vol. 3, pp. 2488\u20132493, AAAI Press (2011). https:\/\/doi.org\/10.5591\/978-1-57735-516-8\/IJCAI11-414","DOI":"10.5591\/978-1-57735-516-8\/IJCAI11-414"},{"key":"30_CR20","unstructured":"Matsumoto, S., et al.: UnBBayes: a Java framework for probabilistic models in AI (2011)"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.: What yelp fake review filter might be doing?, pp. 409\u2013418, January 2013","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"30_CR22","doi-asserted-by":"publisher","unstructured":"Mukherjee, A., et al.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, pp. 632\u2013640. ACM, New York (2013). https:\/\/doi.org\/10.1145\/2487575.2487580","DOI":"10.1145\/2487575.2487580"},{"key":"30_CR23","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.S.: What yelp fake review filter might be doing? In: ICWSM (2013)"},{"key":"30_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-46227-1_13","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"S Mukherjee","year":"2016","unstructured":"Mukherjee, S., Dutta, S., Weikum, G.: Credible review detection with limited information using consistency features. In: Frasconi, P., Landwehr, N., Manco, G., Vreeken, J. (eds.) ECML PKDD 2016. LNCS (LNAI), vol. 9852, pp. 195\u2013213. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46227-1_13"},{"key":"30_CR25","unstructured":"Park, C.Y., Laskey, K.B., Costa, P.C.G., Matsumoto, S.: Multi-entity Bayesian networks learning for hybrid variables in situation awareness. In: Proceedings of the 16th International Conference on Information Fusion, pp. 1894\u20131901, July 2013"},{"issue":"22","key":"30_CR26","doi-asserted-by":"publisher","first-page":"8650","DOI":"10.1016\/j.eswa.2015.07.019","volume":"42","author":"David Savage","year":"2015","unstructured":"Savage, D., Zhang, X., Yu, X., Chou, P., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650\u20138657 (2015). https:\/\/doi.org\/10.1016\/j.eswa.2015.07.019, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417415004790","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"30_CR27","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TIFS.2017.2675361","volume":"12","author":"S Shehnepoor","year":"2017","unstructured":"Shehnepoor, S., Salehi, M., Farahbakhsh, R., Crespi, N.: NetSpam: a network-based spam detection framework for reviews in online social media. IEEE Trans. Inf. Forensics Secur. 12(7), 1585\u20131595 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2675361","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR28","doi-asserted-by":"publisher","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 823\u2013831. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2339530.2339662","DOI":"10.1145\/2339530.2339662"},{"key":"30_CR29","doi-asserted-by":"publisher","unstructured":"Xue, H., Li, F., Seo, H., Pluretti, R.: Trust-aware review spam detection. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 726\u2013733, August 2015. https:\/\/doi.org\/10.1109\/Trustcom.2015.440","DOI":"10.1109\/Trustcom.2015.440"},{"key":"30_CR30","doi-asserted-by":"publisher","unstructured":"Yang, Y., Calmet, J.: OntoBayes: an ontology-driven uncertainty model. In: International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC 2006), vol. 1, pp. 457\u2013463, November 2005. https:\/\/doi.org\/10.1109\/CIMCA.2005.1631307","DOI":"10.1109\/CIMCA.2005.1631307"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems. OTM 2018 Conferences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02610-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:44:43Z","timestamp":1710233083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02610-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030026097","9783030026103"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02610-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"18 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom system developed for OTM","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"173","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}