{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:04:59Z","timestamp":1725847499978},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319291741"},{"type":"electronic","value":"9783319291758"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29175-8_27","type":"book-chapter","created":{"date-parts":[[2016,1,19]],"date-time":"2016-01-19T03:30:54Z","timestamp":1453174254000},"page":"284-295","source":"Crossref","is-referenced-by-count":0,"title":["Health-Related Spammer Detection on Chinese Social Media"],"prefix":"10.1007","author":[{"given":"Xinhuan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chunxiao","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,20]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Amleshwaram, A.A., Reddy, N., Yadav, S., Gu, G., Yang, C.: CATS: characterizing automation of twitter spammers. In: Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/COMSNETS.2013.6465541"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 116\u2013120. ACM (2013)","DOI":"10.1145\/2492517.2492637"},{"key":"27_CR3","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: ICWSM. Citeseer (2013)"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.chb.2014.11.071","volume":"45","author":"Q Gao","year":"2015","unstructured":"Gao, Q., Tian, Y., Tu, M.: Exploring factors influencing chinese user\u2019s perceived credibility of health and safety information on weibo. Comput. Hum. Behav. 45, 21\u201331 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Ge, L., Gao, J., Li, X., Zhang, A.: Multi-source deep learning for information trustworthiness estimation. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 766\u2013774. ACM (2013)","DOI":"10.1145\/2487575.2487612"},{"issue":"7","key":"27_CR6","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari, A., ali Tavakoli, M., Salim, N., Heydari, Z.: Detection of review spam: a survey. Expert Syst. Appl. 42(7), 3634\u20133642 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"27_CR7","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"G Hinton","year":"2006","unstructured":"Hinton, G., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527\u20131554 (2006)","journal-title":"Neural Comput."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Lin, Y., Zhu, T., Wang, X., Zhang, J., Zhou, A.: Towards online review spam detection. In: Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, pp. 341\u2013342. International World Wide Web Conferences Steering Committee (2014)","DOI":"10.1145\/2567948.2577293"},{"key":"27_CR10","unstructured":"Liu, Y., Wu, B., Wang, B., Li, G.: SDHM: a hybrid model for spammer detection on Weibo. In: IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2014, pp. 942\u2013947. IEEE (2014)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Mukherjee, S., Weikum, G., Danescu-Niculescu-Mizil, C.: People on drugs: credibility of user statements in health communities. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 65\u201374. ACM (2014)","DOI":"10.1145\/2623330.2623714"},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1214\/aoms\/1177728190","volume":"27","author":"M Rosenblatt","year":"1956","unstructured":"Rosenblatt, M., et al.: Remarks on some nonparametric estimates of a density function. Ann. Math. Stat. 27(3), 832\u2013837 (1956)","journal-title":"Ann. Math. Stat."},{"key":"27_CR13","volume-title":"Introduction to Modern Information Retrieval","author":"G Salton","year":"1986","unstructured":"Salton, G., McGill, M.J.: Introduction to Modern Information Retrieval. ACM Press, New York (1986)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Vydiswaran, V., Zhai, C., Roth, D.: Gauging the internet doctor: ranking medical claims based on community knowledge. In: Proceedings of the 2011 Workshop on Data Mining for Medicine and Healthcare, pp. 42\u201351. ACM (2011)","DOI":"10.1145\/2023582.2023589"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P.S.: Review graph based online store review spammer detection. In: IEEE 11th International Conference on Data Mining (ICDM), pp. 1242\u20131247. IEEE (2011)","DOI":"10.1109\/ICDM.2011.124"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 823\u2013831. ACM (2012)","DOI":"10.1145\/2339530.2339662"},{"issue":"8","key":"27_CR17","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Y.: Detect spammers in online social networks (2015)","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"27_CR19","unstructured":"A open source project for Chinese word segmentation. \n                      http:\/\/code.google.com\/p\/jcseg\/"}],"container-title":["Lecture Notes in Computer Science","Smart Health"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29175-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:28:27Z","timestamp":1559370507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29175-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319291741","9783319291758"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29175-8_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}