{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:44:05Z","timestamp":1743086645078,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129804"},{"type":"electronic","value":"9783030129811"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12981-1_9","type":"book-chapter","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T16:59:55Z","timestamp":1549472395000},"page":"138-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Location Spoofing Detection Method for Social Networks (Short Paper)"],"prefix":"10.1007","author":[{"given":"Chaoping","family":"Ding","sequence":"first","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,7]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., Zimmerman, J.: I\u2019m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409\u20132418. ACM (2011)","DOI":"10.1145\/1978942.1979295"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Patil, S., Norcie, G., Kapadia, A., Lee, A.: Check out where i am!: location-sharing motivations, preferences, and practices. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1997\u20132002. ACM (2012)","DOI":"10.1145\/2212776.2223742"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Ren, M.: Location cheating: a security challenge to location-based social network services. In: 2011 31st International Conference on Distributed computing systems (ICDCS), pp. 740\u2013749. IEEE (2011)","DOI":"10.1109\/ICDCS.2011.42"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285\u20131292. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.198"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Polakis, I., Volanis, S., Athanasopoulos, E., Markatos, E.P.: The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 19\u201328. ACM (2013)","DOI":"10.1145\/2523649.2523653"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: On the validity of geosocial mobility traces. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 11. ACM (2013)","DOI":"10.1145\/2535771.2535786"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Wang, G., Schoenebeck, S.Y., Zheng, H., Zhao, B.Y.: \u201cWill check-in for badges\u201d: understanding bias and misbehavior on location-based social networks. In: ICWSM, pp. 417\u2013426 (2016)","DOI":"10.1609\/icwsm.v10i1.14718"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Papalexakis, E., Pelechrinis, K., Faloutsos, C.: Spotting misbehaviors in location-based social networks using tensors. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 551\u2013552. ACM (2014)","DOI":"10.1145\/2567948.2576950"},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19475683.2017.1280536","volume":"23","author":"B Zhao","year":"2017","unstructured":"Zhao, B., Sui, D.Z.: True lies in geospatial big data: detecting location spoofing in social media. Ann. GIS 23(1), 1\u201314 (2017)","journal-title":"Ann. GIS"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/18.61115","volume":"37","author":"J Lin","year":"1991","unstructured":"Lin, J.: Divergence measures based on the Shannon entropy. IEEE Trans. Inf. Theory 37, 145\u2013151 (1991)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"Jan","key":"9_CR11","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"suppl 1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"TL Griffiths","year":"2004","unstructured":"Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Nat. Acad. Sci. 101(suppl 1), 5228\u20135235 (2004)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"9_CR13","unstructured":"Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722 (2014)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12981-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T12:29:14Z","timestamp":1694608154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12981-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129804","9783030129811"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12981-1_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"http:\/\/confy.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"77","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"20","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}