{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:50:16Z","timestamp":1725835816477},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261867"},{"type":"electronic","value":"9783319261874"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26187-4_8","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T13:05:24Z","timestamp":1445864724000},"page":"109-123","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Internet Hidden Paid Posters Based on Group and Individual Characteristics"],"prefix":"10.1007","author":[{"given":"Xiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"8_CR1","unstructured":"Sina weibo. \n                    http:\/\/en.wikipedia.org\/wiki\/sina_weibo\n                    \n                  , June 2014"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Spyropoulos, C.D.: An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 160\u2013167. ACM (2000)","DOI":"10.1145\/345508.345569"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Duarte, F., Rodrigues, T., Almeida, V.A., Almeida, J.M., Ross, K.W.: Understanding video interactions in youtube. In: Proceedings of the 16th ACM international conference on Multimedia, pp. 761\u2013764. ACM (2008)","DOI":"10.1145\/1459359.1459480"},{"key":"8_CR4","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, pp. 45\u201352. ACM (2008)","DOI":"10.1145\/1451983.1451996"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63\u201392 (2008)","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 116\u2013120. ACM (2013)","DOI":"10.1145\/2492517.2492637"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 21\u201330. ACM (2010)","DOI":"10.1145\/1920261.1920265"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/CC.2013.6457533","volume":"10","author":"Z Ding","year":"2013","unstructured":"Ding, Z., Jia, Y., Zhou, B., Han, Y.: Mining topical influencers based on the multi-relational network in micro-blogging sites. China Commun. 10(1), 93\u2013104 (2013)","journal-title":"China Commun."},{"issue":"5","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker, H., Wu, S., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048\u20131054 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Fetterly, D., Manasse, M., Najork, M.: Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. In: Proceedings of the 7th International Workshop on the Web and Databases: Colocated with ACM SIGMOD\/PODS 2004, pp. 1\u20136. ACM (2004)","DOI":"10.1145\/1017074.1017077"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27\u201337. ACM (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB Endowment, vol. 30, pp. 576\u2013587 (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"8_CR17","unstructured":"Kolari, P., Java, A., Finin, T., Oates, T., Joshi, A.: Detecting spam blogs: a machine learning approach. In: Proceedings of the National Conference on Artificial Intelligence, vol. 21, pp. 1351. AAAI Press, Menlo Park, CA (1999), MIT Press, Cambridge, London, MA (2006)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435\u2013442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Alcaraz Calero, J.M., Yang, L.T., M\u00e1rmol, F.G., Villalba, L.J.G., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175\u2013186. Springer, Heidelberg (2011)"},{"key":"8_CR20","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 309\u2013319. Association for Computational Linguistics (2011)"},{"issue":"11","key":"8_CR21","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, C.-S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613\u2013620 (1975)","journal-title":"Commun. ACM"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 243\u2013258. ACM (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"8_CR24","unstructured":"Thomason, A.: Blog spam: a review. In: CEAS (2007)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Wang, K., Xiao, Y., Xiao, Z.: Detection of internet water army in social network. In: 2014 International Conference on Computer, Communications and Information Technology (CCIT 2014). Atlantis Press (2014)","DOI":"10.2991\/ccit-14.2014.50"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ruan, X., Wang, H., Wang, H.: What scale of audience a campaign can reach in what price. In: 2014 IEEE International Conference on Computer Communications (InfoCOM 2014) (2014)","DOI":"10.1109\/INFOCOM.2014.6848048"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu,G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, pp. 71\u201380. ACM (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"8_CR28","first-page":"9858","volume":"19","author":"K Zeng","year":"2014","unstructured":"Zeng, K., Wang, X., Zhang, Q., Zhang, X., Wang, F.-Y.: Behavior modeling of internet water army in online forums. World Congr. 19, 9858\u20139863 (2014)","journal-title":"World Congr."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26187-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:32:27Z","timestamp":1559295147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26187-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261867","9783319261874"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26187-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}