{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:29:31Z","timestamp":1742992171009,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030202415"},{"type":"electronic","value":"9783030202422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20242-2_15","type":"book-chapter","created":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T14:34:37Z","timestamp":1558362877000},"page":"171-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Illicit Drug Ads in Google+ Using Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1355-1330","authenticated-orcid":false,"given":"Fengpan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Skums","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Zelikovsky","sequence":"additional","affiliation":[]},{"given":"Eric L.","family":"Sevigny","sequence":"additional","affiliation":[]},{"given":"Monica Haavisto","family":"Swahn","sequence":"additional","affiliation":[]},{"given":"Sheryl M.","family":"Strasser","sequence":"additional","affiliation":[]},{"given":"Yubao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,9]]},"reference":[{"key":"15_CR1","unstructured":"Centers for Disease Control and Prevention: Provisional Drug Overdose Death Counts. https:\/\/www.cdc.gov\/nchs\/nvss\/vsrr\/drug-overdose-data.htm. Accessed 3 Feb 2019"},{"key":"15_CR2","unstructured":"Stevens, J.: Internet Stats & Facts for 2019. https:\/\/hostingfacts.com\/internet-facts-stats\/. Accessed 17 Dec 2018"},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu, H.C., Luk, R.W.P., Wong, K.F., Kwok, K.L.: Interpreting TF-IDF term weights as making relevance decisions. ACM Trans. Inf. Syst. (TOIS) 26(3), 13 (2008)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JA Suykens","year":"1999","unstructured":"Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural Process. Lett. 9(3), 293\u2013300 (1999)","journal-title":"Neural Process. Lett."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"e105","DOI":"10.2196\/jmir.2610","volume":"15","author":"TK Mackey","year":"2013","unstructured":"Mackey, T.K., Liang, B.A.: Global reach of direct-to-consumer advertising using social media for illicitonline drug sales. J. Med. Internet Res. 15(5), e105 (2013)","journal-title":"J. Med. Internet Res."},{"key":"15_CR7","unstructured":"Stroppa, A., di Stefano, D., Parrella, B.: Social media and luxury goods counterfeit: a growing concern for government, industry and consumers worldwide. The Washington Post (2016)"},{"key":"15_CR8","unstructured":"Hu, X., Tang, J., Zhang, Y., Liu, H.: Social spammer detection in microblogging. In: Twenty-Third International Joint Conference on Artificial Intelligence (2013)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.neucom.2015.02.047","volume":"159","author":"X Zheng","year":"2015","unstructured":"Zheng, X., Zeng, Z., Chen, Z., Yu, Y., Rong, C.: Detecting spammers on social networks. Neurocomputing 159, 27\u201334 (2015)","journal-title":"Neurocomputing"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, M., Velusamy, R.L.: R-SALSA: a spam filtering technique for social networking sites. In: 2016 IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/SCEECS.2016.7509326"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10472-018-9612-z","volume":"85","author":"G Jain","year":"2019","unstructured":"Jain, G., Sharma, M., Agarwal, B.: Spam detection in social media using convolutional and long short term memory neural network. Ann. Math. Artif. Intell. 85(1), 21\u201344 (2019)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1002\/(SICI)1097-4571(199601)47:1<70::AID-ASI7>3.0.CO;2-#","volume":"47","author":"DA Hull","year":"1996","unstructured":"Hull, D.A.: Stemming algorithms: a case study for detailed evaluation. J. Am. Soc. Inf. Sci. 47(1), 70\u201384 (1996)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"15_CR13","unstructured":"Salton, G., McGill, M.J.: Introduction to modern information retrieval (1986)"},{"key":"15_CR14","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"15_CR15","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111\u20133119 (2013)"},{"key":"15_CR16","unstructured":"Zhang, Y., Wallace, B.: A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:1510.03820 (2015)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-319-94968-0_30","volume-title":"Bioinformatics Research and Applications","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Skums, P., Zelikovsky, A., Rendon, D.C., Liao, X.: Predicting opioid epidemic by using Twitter data. In: Zhang, F., Cai, Z., Skums, P., Zhang, S. (eds.) ISBRA 2018. LNCS, vol. 10847, pp. 314\u2013318. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94968-0_30"},{"key":"15_CR18","unstructured":"Powers, D.M.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation (2011)"}],"container-title":["Lecture Notes in Computer Science","Bioinformatics Research and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20242-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T13:18:11Z","timestamp":1710335891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-20242-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030202415","9783030202422"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20242-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISBRA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Bioinformatics Research and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isbra2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/alan.cs.gsu.edu\/isbra19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}