{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:27:34Z","timestamp":1743049654745,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281209"},{"type":"electronic","value":"9783319281216"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28121-6_15","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T08:57:57Z","timestamp":1451379477000},"page":"161-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-dimensional User Credibility Analysis on Review Content"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Balog, K., Azzopardi, L., De Rijke, M.: Formal models for expert finding in enterprise corpora. In: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 43\u201350. ACM (2006)","DOI":"10.1145\/1148170.1148181"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ipm.2008.06.003","volume":"45","author":"K Balog","year":"2009","unstructured":"Balog, K., Azzopardi, L., de Rijke, M.: A language modeling framework for expert finding. Inf. Process. Manage. 45(1), 1\u201319 (2009)","journal-title":"Inf. Process. Manage."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Becchetti, L., Boldi, P., Leonardi, S., Santini, M., Vigna, S.: A reference collection for web spam. In: ACM Sigir Forum. vol. 40, pp. 11\u201324. ACM (2006)","DOI":"10.1145\/1189702.1189703"},{"key":"15_CR4","unstructured":"Ceolin, D., Groth, P.T., Van Hage, W.R., Nottamkandath, A., Fokkink, W.: Trust evaluation through user reputation and provenance analysis. In: URSW, vol. 900, pp. 15\u201326 (2012)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chen, B.C., Guo, J., Tseng, B., Yang, J.: User reputation in a comment rating environment. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 159\u2013167. ACM (2011)","DOI":"10.1145\/2020408.2020439"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chirita, P.A., Diederich, J., Nejdl, W.: Mailrank: using ranking for spam detection. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 373\u2013380. ACM (2005)","DOI":"10.1145\/1099554.1099671"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, pp. 61\u201370. ACM (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"15_CR9","unstructured":"Kolari, P., Java, A., Finin, T., Oates, T., Joshi, A.: Detecting spam blogs: A machine learning approach. In: Proceedings of the National Conference on Artificial Intelligence. vol. 21, p. 1351. AAAI Press, MIT Press, London, Cambridge (2006)"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s10115-014-0780-9","volume":"44","author":"B Li","year":"2014","unstructured":"Li, B., Li, R.H., King, I., Lyu, M.R., Yu, J.X.: A topic-biased user reputation model in rating systems. Knowl. Inf. Syst. 44, 581\u2013607 (2014)","journal-title":"Knowl. Inf. Syst."},{"key":"15_CR11","unstructured":"Li, F., Hsieh, M.H.: An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In: CEAS (2006)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., Ghosh, R.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632\u2013640. ACM (2013)","DOI":"10.1145\/2487575.2487580"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting spam web pages through content analysis. In: Proceedings of the 15th International Conference on World Wide Web, pp. 83\u201392. ACM (2006)","DOI":"10.1145\/1135777.1135794"},{"issue":"4","key":"15_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/1151659.1159947","volume":"36","author":"A Ramachandran","year":"2006","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. ACM SIGCOMM Comput. Commun. Rev. 36(4), 291\u2013302 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"15_CR15","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-78646-7_29","volume-title":"Advances in Information Retrieval","author":"P Serdyukov","year":"2008","unstructured":"Serdyukov, P., Hiemstra, D.: Modeling documents as mixtures of persons for expert finding. In: Macdonald, C., Ounis, I., Plachouras, V., Ruthven, I., White, R.W. (eds.) ECIR 2008. LNCS, vol. 4956, pp. 309\u2013320. Springer, Heidelberg (2008)"},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2207243.2207252","volume":"13","author":"N Spirin","year":"2012","unstructured":"Spirin, N., Han, J.: Survey on web spam detection: principles and algorithms. ACM SIGKDD Explor. Newsl. 13(2), 50\u201364 (2012)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P.S.: Review graph based online store review spammer detection. In: IEEE 11th International Conference on Data Mining (ICDM), pp. 1242\u20131247. IEEE (2011)","DOI":"10.1109\/ICDM.2011.124"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H., Lu, Y., Zhai, C.: Latent aspect rating analysis on review text data: a rating regression approach. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 783\u2013792. ACM (2010)","DOI":"10.1145\/1835804.1835903"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Wu, B., Goel, V., Davison, B.D.: Topical trustrank: using topicality to combat web spam. In: Proceedings of the 15th International Conference on World Wide Web, pp. 63\u201372. ACM (2006)","DOI":"10.1145\/1135777.1135792"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1016\/j.eswa.2008.03.002","volume":"36","author":"CH Wu","year":"2009","unstructured":"Wu, C.H.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Sys. Appl. 36(3), 4321\u20134330 (2009)","journal-title":"Expert Sys. Appl."},{"key":"15_CR21","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: ICML, vol. 97, pp. 412\u2013420 (1997)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ackerman, M.S., Adamic, L.: Expertise networks in online communities: structure and algorithms. In: Proceedings of the 16th International Conference on World Wide Web, pp. 221\u2013230. ACM (2007)","DOI":"10.1145\/1242572.1242603"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, R., Gao, M., He, X., Zhou, A.: Learning user credibility for product ranking. Knowl. Inf. Sys. (2014)","DOI":"10.1007\/s10115-015-0880-1"},{"issue":"5","key":"15_CR24","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11280-013-0217-5","volume":"17","author":"H Zhu","year":"2014","unstructured":"Zhu, H., Chen, E., Xiong, H., Cao, H., Tian, J.: Ranking user authority with relevant knowledge categories for expert finding. World Wide Web 17(5), 1081\u20131107 (2014)","journal-title":"World Wide Web"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28121-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:30:46Z","timestamp":1559356246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28121-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281209","9783319281216"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28121-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}