{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:42:03Z","timestamp":1725853323125},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319317526"},{"type":"electronic","value":"9783319317533"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31753-3_4","type":"book-chapter","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T09:06:43Z","timestamp":1460365603000},"page":"40-51","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Heterogeneous Product Networks for Discovering Collective Marketing Hyping Behavior"],"prefix":"10.1007","author":[{"given":"Qinzhe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Long","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,12]]},"reference":[{"key":"4_CR1","first-page":"175","volume":"13","author":"G Fei","year":"2013","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. ICWSM 13, 175\u2013184 (2013)","journal-title":"ICWSM"},{"key":"4_CR2","unstructured":"Feng, S., Xing, L., Gogar, A., Choi, Y.: Distributional footprints of deceptive product reviews (2012)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Grabocka, J., Schilling, N., Wistuba, M., Schmidt-Thieme, L.: Learning time-series shapelets. In: KDD 2014, pp. 392\u2013401. ACM (2014)","DOI":"10.1145\/2623330.2623613"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: WWW 2007, pp. 1189\u20131190. ACM (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: WSDM 2008, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B., Lim, E.-P.: Finding unusual review patterns using unexpected rules, pp. 1549\u20131552. ACM (2010)","DOI":"10.1145\/1871437.1871669"},{"key":"4_CR7","unstructured":"Li, F., Huang, M., Yang, Y., Zhu, X.: Learning to identify review spam. In: IJCAI 2011, pp. 2488\u20132493. AAAI Press (2011)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Lines, J., Davis, L.M., Hills, J., Bagnall, A.: A shapelet transform for time series classification. In: KDD 2012, pp. 289\u2013297. ACM (2012)","DOI":"10.1145\/2339530.2339579"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"McAuley, J., Leskovec, J.: Hidden factors and hidden topics: understanding rating dimensions with review text. In: RecSys 2013, pp. 165\u2013172. ACM (2013)","DOI":"10.1145\/2507157.2507163"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"McAuley, J.J., Leskovec, J., Jurafsky, D.: Learning attitudes and attributes from multi-aspect reviews, abs\/1210.3926 (2012)","DOI":"10.1109\/ICDM.2012.110"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"McAuley, J.J., Leskovec, J.: From amateurs to connoisseurs: Modeling the evolution of user expertise through online reviews. In: WWW 2013, pp. 897\u2013908. International World Wide Web Conferences Steering Committee (2013)","DOI":"10.1145\/2488388.2488466"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery, pp. 823\u2013831. ACM (2012)","DOI":"10.1145\/2339530.2339662"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31753-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T20:12:04Z","timestamp":1559419924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31753-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319317526","9783319317533"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31753-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}