{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:52:31Z","timestamp":1762375951947,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319181165"},{"type":"electronic","value":"9783319181172"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18117-2_21","type":"book-chapter","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T08:56:54Z","timestamp":1428569814000},"page":"285-294","source":"Crossref","is-referenced-by-count":35,"title":["Detection of Opinion Spam with Character n-grams"],"prefix":"10.1007","author":[{"given":"Donato Hern\u00e1ndez","family":"Fusilier","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Montes-y-G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Rosso","sequence":"additional","affiliation":[]},{"given":"Rafael Guzm\u00e1n","family":"Cabrera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Blamey, B., Crick, T., Oatley, G.: RU:-) or:-(? character-vs. word-gram feature selection for sentiment classification of OSN corpora. Research and Development in Intelligent Systems XXIX, 207\u2013212 (2012)","DOI":"10.1007\/978-1-4471-4739-8_16"},{"issue":"5","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H. Drucker","year":"2002","unstructured":"Drucker, H., Wu, D., Vapnik, V.N.: Support Vector Machines for Spam Categorization. IEEE Transactions on Neural Networks\u00a010(5), 1048\u20131054 (2002)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"21_CR3","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Syntactic Stylometry for Deception Detection. Association for Computational Linguistics, short paper. ACL (2012)"},{"key":"21_CR4","unstructured":"Feng, S., Xing, L., Gogar, A., Choi, Y.: Distributional Footprints of Deceptive Product Reviews. In: Proceedings of the 2012 International AAAI Conference on WebBlogs and Social Media (June 2012)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web Spam with Trust Rank. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 576\u2013587. VLDB Endowment (2004)","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Hall, M., Eibe, F., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.: The WEKA Data Mining Software: an Update. SIGKDD Explor. Newsl. 10\u201318 (2009)","DOI":"10.1145\/1656274.1656278"},{"key":"21_CR7","unstructured":"Hern\u00e1ndez-Fusilier, D., Guzm\u00e1n-Cabrera, R., Montes-y-G\u00f3mez, M., Rosso, P.: Using PU-learning to Detect Deceptive Opinion Spam. In: Proceedings of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis for Computational Linguistics: Human Language Technologies, Atlanta, Georgia, USA, pp. 38\u201345 (2013)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Fusilier, D., Montes-y-G\u00f3mez, M., Rosso, P., Guzm\u00e1n-Cabrera, R.: Detecting Positive and Negative Deceptive Opinions using PU-learning. Information Processing & Management (2014), doi:10.1016\/j.ipm.2014.11.001","DOI":"10.1016\/j.ipm.2014.11.001"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion Spam and Analysis. In: Proceedings of the International Conference on Web Search and Web Data Mining, pp. 219\u2013230 (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B., Lim, E.: Finding Unusual Review Patterns Using Unexpected Rules. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM 2010, pp. 210\u2013220(October 2010)","DOI":"10.1145\/1871437.1871669"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Kanaris, I., Kanaris, K., Houvardas, I., Stamatatos, E.: Word versus character n-grams for anti-spam filtering. International Journal on Artificial Intelligence Tools 16(6), 1047\u20131067 (2007)","DOI":"10.1142\/S0218213007003692"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting Product Review Spammers Using Rating Behaviours. In: CIKM, pp. 939\u2013948 (2010)","DOI":"10.1145\/1871437.1871557"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Liu, B.: Sentiment Analysis and Opinion Mining. Synthesis Lecture on Human Language Technologies. Morgan & Claypool Publishers (2012)","DOI":"10.1007\/978-3-031-02145-9"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Wang, J., Glance, N., Jindal, N.: Detecting Group Review Spam. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 93\u201394 (2011)","DOI":"10.1145\/1963192.1963240"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting Spam Web Pages through Content Analysis. Transactions on Management Information Systems (TMIS), 83\u201392 (2006)","DOI":"10.1145\/1135777.1135794"},{"key":"21_CR16","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding Deceptive Opinion Spam by any Stretch of the Imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Portland, Oregon, USA, pp. 309\u2013319 (2011)"},{"key":"21_CR17","unstructured":"Ott, M., Cardie, C., Hancock, J.T.: Negative Deceptive Opinion Spam. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Atlanta, Georgia, USA, pp. 309\u2013319 (2013)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Raymond, Y.K., Lau, S.Y., Liao, R., Chi-Wai, K., Kaiquan, X., Yunqing, X., Yuefeng, L.: Text Mining and Probabilistic Modeling for Online Review Spam Detection. ACM Transactions on Management Information Systems 2(4), Article: 25, 1\u201330 (2011)","DOI":"10.1145\/2070710.2070716"},{"key":"21_CR19","unstructured":"Stamatatos, E.: On the robustness of authorship attribution based on character n-gram features. Journal of Law & Policy 21(2) (2013)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Wu, G., Greene, D., Cunningham, P.: Merging Multiple Criteria to Identify Suspicious Reviews. In: RecSys 2010, pp. 241\u2013244 (2010)","DOI":"10.1145\/1864708.1864757"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review Spam Detection via Time Series Pattern Discovery. In: Proceedings of the 21st International Conference Companion on World Wide Web, pp. 635\u2013636 (2012)","DOI":"10.1145\/2187980.2188164"},{"issue":"8","key":"21_CR22","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1109\/TKDE.2007.190624","volume":"20","author":"L. Zhou","year":"2008","unstructured":"Zhou, L., Sh, Y., Zhang, D.: A Statistical Language Modeling Approach to Online Deception Detection. IEEE Transactions on Knowledge and Data Engineering\u00a020(8), 1077\u20131081 (2008)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18117-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T12:41:54Z","timestamp":1676637714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18117-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319181165","9783319181172"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18117-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}