{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:36:37Z","timestamp":1758274597249,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_23","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"255-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evidential Spammers and Group Spammers Detection"],"prefix":"10.1007","author":[{"given":"Malika","family":"Ben Khalifa","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Lef\u00e8vre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ben Khalifa, M., Elouedi, Z., Lef\u00e8vre, E.: Fake reviews detection based on both the review and the reviewer features under belief function theory. In: Proceedings of the 16th International Conference Applied Computing (AC 2019), pp. 123\u2013130 (2019)","DOI":"10.33965\/ac2019_201912L015"},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Ben Khalifa, M., Elouedi, Z., Lef\u00e8vre, E.: Spammers detection based on reviewers\u2019 behaviors under belief function theory. In: Wotawa, F., Friedrich, G., Pill, I., Koitz-Hristov, R., Ali, M. (eds.) Proceedings of the 32nd International Conference on Industrial, Engineering Other Applications of Applied Intelligent Systems (IEA\/AIE 2019), pp. 642\u2013653. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22999-3_55","DOI":"10.1007\/978-3-030-22999-3_55"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Ben Khalifa, M., Elouedi, Z., Lef\u00e8vre, E.: An evidential spammer detection based on the suspicious behaviors\u2019 indicators. In: Proceedings of the International Multi-Conference on: \u201cOrganization of Knowledge and Advanced Technologies\u201d (OCTA), Tunis, Tunisia, pp. 1\u20138 (2020)","DOI":"10.1109\/OCTA49274.2020.9151805"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Ben Khalifa, M., Elouedi, Z., Lef\u00e8vre, E.: Evidential group spammers detection. In: Lesot, M.-J., et al. (eds.) IPMU 2020. CCIS, vol. 1238, pp. 341\u2013353. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50143-3_26","DOI":"10.1007\/978-3-030-50143-3_26"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"AP Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 325\u2013339 (1967)","journal-title":"Ann. Math. Stat."},{"issue":"5","key":"23_CR6","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/21.376493","volume":"25","author":"T Denoeux","year":"1995","unstructured":"Denoeux, T.: A K-nearest neighbor classification rule based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(5), 804\u2013813 (1995)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"1","key":"23_CR7","first-page":"601","volume":"12","author":"A Elmogy","year":"2021","unstructured":"Elmogy, A., Usman, T., Atef, I., Ammar, M.: Fake reviews detection using supervised machine learning. Int. J. Adv. Comput. Sci. Appl. 12(1), 601\u2013606 (2021)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"23_CR8","unstructured":"Fayazbakhsh, S., Sinha, J.: Review spam detection: a network-based approach. Final Project Report: CSE 590 (Data Mining and Networks) (2012)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM, vol. 13, pp. 175\u2013184 (2013)","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Fontanarava, J., Pasi, G., Viviani, M.: Feature analysis for fake review detection through supervised classification. In: Proceedings of the International Conference on Data Science and Advanced Analytics, pp. 658\u2013666 (2017)","DOI":"10.1109\/DSAA.2017.51"},{"issue":"1","key":"23_CR11","first-page":"117","volume":"10","author":"A Heydari","year":"2016","unstructured":"Heydari, A., Tavakoli, M., Ismail, Z., Salim, N.: Leveraging quality metrics in voting model based thread retrieval. Int. J. Comput. Electrical Autom. Control Inf. Eng. 10(1), 117\u2013123 (2016)","journal-title":"Int. J. Comput. Electrical Autom. Control Inf. Eng."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Wang, J., Glance, N., Jindal, N.: Detecting group review spam. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, ACM 978-1-4503-0637-9\/11\/03 (2011)","DOI":"10.1145\/1963192.1963240"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web, ACM, New York, pp. 191\u2013200 (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.: What yelp fake review filter might be doing. In: Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM, pp. 409\u2013418 (2013)","DOI":"10.1609\/icwsm.v7i1.14389"},{"issue":"22","key":"23_CR15","doi-asserted-by":"publisher","first-page":"8650","DOI":"10.1016\/j.eswa.2015.07.019","volume":"42","author":"D Savage","year":"2015","unstructured":"Savage, D., Zhang, X., Yu, X., Chou, P., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650\u20138657 (2015)","journal-title":"Expert Syst. Appl."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th International Conference on Knowledge Discovery and Data Mining, ACM SIGKDD, pp. 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"23_CR17","unstructured":"Shafer, G.: A Mathematical Theory of Evidence, vol. 1. Princeton University Press, Princeton (1976)"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/0951-8320(92)90105-T","volume":"38","author":"P Smets","year":"1992","unstructured":"Smets, P.: The transferable belief model for expert judgement and reliability problem. Reliabil. Eng. Syst. Saf. 38, 59\u201366 (1992)","journal-title":"Reliabil. Eng. Syst. Saf."},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Smets, P.: The transferable belief model for quantified belief representation. In: Smets, P. (ed.) Quantified Representation of Uncertainty and Imprecision, pp. 267\u2013301. Springer, Dordrecht (1998). https:\/\/doi.org\/10.1007\/978-94-017-1735-9_9","DOI":"10.1007\/978-94-017-1735-9_9"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P. S.: Review graph based online store review spammer detection. In Proceedings of the 11th International Conference on Data Mining, ICDM, pp. 1242-1247 (2011)","DOI":"10.1109\/ICDM.2011.124"},{"issue":"6","key":"23_CR21","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Hou, T., Song, D., Li, Z., Kong, T.: Detecting review spammer groups via bipartite graph projection. Comput. J. 59(6), 861\u2013874 (2016)","journal-title":"Comput. J."},{"issue":"9","key":"23_CR22","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1007\/s10489-018-1142-1","volume":"48","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Gu, S., Xu, X.: GSLDA: LDA-based group spamming detection in product reviews. Appl. Intell. 48(9), 3094\u20133107 (2018). https:\/\/doi.org\/10.1007\/s10489-018-1142-1","journal-title":"Appl. Intell."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:23:48Z","timestamp":1675059828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_23","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}