{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T06:03:57Z","timestamp":1747202637374},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242732"},{"type":"electronic","value":"9783030242749"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24274-9_16","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"182-193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Research on Opinion Spam Detection by Time Series Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wanli","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: Proceedings of the 16th International Conference on World Wide Web, pp. 1189\u20131190. ACM (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Analyzing and detecting review spam. In: Seventh IEEE International Conference on Data Mining (ICDM 2007), pp. 547\u2013552. IEEE (2007)","DOI":"10.1109\/ICDM.2007.68"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"16_CR4","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., et al.: What yelp fake review filter might be doing? In: ICWSM (2013)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Kumar, A., Liu, B., et al.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632\u2013640. ACM (2013)","DOI":"10.1145\/2487575.2487580"},{"key":"16_CR6","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., et al.: Fake review detection: classification and analysis of real and pseudo reviews. UIC-CS-03-2013. Technical report (2013)"},{"key":"16_CR7","unstructured":"Ott, M., Yejin, Ch., Claire, C., Jeffrey, T.H.: Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL-2011) (2011)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Ott, M., Cardie, C., Hancock, J.: Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012. ACM New York (2012)","DOI":"10.1145\/2187836.2187864"},{"key":"16_CR9","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Syntactic Stylometry for Deception Detection. ACL (short paper) (2012)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B., Lim, E.P.: Finding unusual review patterns using unexpected rules. In: Proceedings of the 19th ACM International Conference on Information and knowledge Management, pp. 1549\u20131552. ACM (2010)","DOI":"10.1145\/1871437.1871669"},{"issue":"7","key":"16_CR11","first-page":"33","volume":"59","author":"MS Patil","year":"2013","unstructured":"Patil, M.S., Bagade, M.A.: Online review spam detection using language model and feature selection. Int. J. Comput. Appl. 59(7), 33\u201336 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-319-25207-0_43","volume-title":"Natural Language Processing and Chinese Computing","author":"C Chen","year":"2015","unstructured":"Chen, C., Zhao, H., Yang, Y.: Deceptive opinion spam detection using deep level linguistic features. In: Li, J., Ji, H., Zhao, D., Feng, Y. (eds.) NLPCC 2015. LNCS (LNAI), vol. 9362, pp. 465\u2013474. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-25207-0_43"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Bhalla, R., Jain, P.: A model based on effective and intelligent sentiment mining: a review. Indian J. Sci. Technol. 9(32) (2016)","DOI":"10.17485\/ijst\/2016\/v9i32\/100209"},{"key":"16_CR14","first-page":"285","volume":"56","author":"Z Yuhong","year":"2018","unstructured":"Yuhong, Z., et al.: Sentiment classification based on piecewise pooling convolutional neural network. Comput. Mater. Contin 56, 285\u2013297 (2018)","journal-title":"Comput. Mater. Contin"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"603","DOI":"10.32604\/cmc.2018.03884","volume":"57","author":"W Suzhen","year":"2018","unstructured":"Suzhen, W., et al.: Natural language semantic construction based on cloud database. Comput. Mater. Contin 57, 603\u2013619 (2018)","journal-title":"Comput. Mater. Contin"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Wang, J., et al.: Detecting group review spam. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 93\u201394. ACM (2011)","DOI":"10.1145\/1963192.1963240"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web, pp. 191\u2013200. ACM 2012","DOI":"10.1145\/2187836.2187863"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., et al.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 939\u2013948. ACM (2010)","DOI":"10.1145\/1871437.1871557"},{"key":"16_CR19","unstructured":"Li, F., Huang, M., Yang, Y., et al.: Learning to identify review spam. In: IJCAI Proceedings-International Joint Conference on Artificial Intelligence, vol. 22, no. 3, p. 2488 (2011)"},{"key":"16_CR20","first-page":"2","volume":"13","author":"L Akoglu","year":"2013","unstructured":"Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. ICWSM 13, 2\u201311 (2013)","journal-title":"ICWSM"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., et al.: Review spam detection via time series pattern discovery. In: International Conference on World Wide Web, pp. 635\u2013636. ACM (2012)","DOI":"10.1145\/2187980.2188164"},{"key":"16_CR22","unstructured":"Ye, J., Kumar, S., Akoglu, L.: Temporal opinion spam detection by multivariate indicative signals. arXiv preprint \n                      arXiv:1603.01929\n                      \n                     (2016)"},{"key":"16_CR23","unstructured":"Zhongan Online. The black interest chain of Taobo is the part-time college student [DB\/OL].\n                      http:\/\/news.ubetween.com\/2016\/hotnews_0319\/209152.html\n                      \n                    , 19 March 2016"},{"key":"16_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.specom.2016.02.006","volume":"79","author":"F Deng","year":"2016","unstructured":"Deng, F., Bao, C.: Speech enhancement based on AR model parameters estimation. Speech Commun. 79, 30\u201346 (2016)","journal-title":"Speech Commun."},{"key":"16_CR25","volume-title":"The Analysis of Time Series: An Introduction","author":"C Chatfield","year":"2016","unstructured":"Chatfield, C.: The Analysis of Time Series: An Introduction. CRC Press, New York (2016)"},{"issue":"7","key":"16_CR26","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1016\/j.enconman.2006.12.017","volume":"48","author":"A Alkan","year":"2007","unstructured":"Alkan, A., Yilmaz, A.S.: Frequency domain analysis of power system transients using Welch and Yule-Walker AR methods. Energy Convers. Manage. 48(7), 2129\u20132135 (2007)","journal-title":"Energy Convers. Manage."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24274-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:21:54Z","timestamp":1563405714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24274-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242732","9783030242749"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24274-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}