{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:30Z","timestamp":1742914110254,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319399362"},{"type":"electronic","value":"9783319399379"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39937-9_8","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T05:00:15Z","timestamp":1464325215000},"page":"95-106","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Chinese Text Mining Method for E-Commerce Review Spam Detection"],"prefix":"10.1007","author":[{"given":"Xiu","family":"Li","sequence":"first","affiliation":[]},{"given":"Xinwei","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,28]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1509\/jm.11.0011","volume":"77","author":"NN Ho-Dac","year":"2013","unstructured":"Ho-Dac, N.N., Carson, S.J., Moore, W.L.: The effects of positive and negative online customer reviews: do brand strength and category maturity matter? J. Mark. 77(6), 37\u201353 (2013)","journal-title":"J. Mark."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2012)","DOI":"10.1145\/2339530.2339662"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Ott, M., Cardie, C., Hancock, J.: Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st International Conference on World Wide Web. ACM (2012)","DOI":"10.1145\/2187836.2187864"},{"key":"8_CR4","unstructured":"Ravi, K., Srinivasan, H.S., Krishnan, K.: Comment spam detection by sequence mining. In: WSDM 2012. ACM (2012)"},{"key":"8_CR5","unstructured":"Nitin, J., Bing, L.: Opinion spam and analysis. In: WSDM 2008. ACM (2008)"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"H Atefeh","year":"2015","unstructured":"Atefeh, H., Mohammad, A.T., Naomie, S.: Detection of review spam: a survey. Expert Syst. Appl. 42, 3634\u20133642 (2015)","journal-title":"Expert Syst. Appl."},{"key":"8_CR7","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: using hard AI problems for security. In: TREC (2005)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Biro, I., Szabo, J., Benczur, A.A.: Latent Dirichlet allocation in web spam filtering. In: AIRWeb (2008)","DOI":"10.1145\/1451983.1451991"},{"key":"8_CR9","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian approach to filtering junk e-mails. In: AAAI Workshop on Learning for Text Categorization (1998)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Chen, F., Tan, P.N., Jain, A.K.: A co-classification framework for detecting web spam and spammers in social media Web sites. In: CIKM (2009)","DOI":"10.1145\/1645953.1646235"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hu, M., Liu, B.: Mining and summarizing customer reviews. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 168\u2013177 (2004)","DOI":"10.1145\/1014052.1014073"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Zhao, W., Zhou, Y.: A template-based approach to extract product features and sentiment words. In: Proceedings of the International Conference on Natural Language Processing and Knowledge Engineering, pp. 1\u20135 (2009)","DOI":"10.1109\/NLPKE.2009.5313744"},{"key":"8_CR13","unstructured":"Yohan, J., Alice, O.: Aspect and sentiment unification model for online review analyses. In: WSDM 2011. ACM (2011)"},{"key":"8_CR14","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I., Lafferty, J.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"8_CR15","first-page":"1","volume":"9","author":"J Audun","year":"2001","unstructured":"Audun, J.: A logic for uncertain probabilities. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 9(3), 1\u201331 (2001)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Yu, P.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2012)","DOI":"10.1145\/2339530.2339662"},{"key":"8_CR17","unstructured":"Christopher, G.H.: Detecting deceptive opinion spam using human computation. In: Association for the Advancement of Artificial Intelligence. AAAI (2012)"},{"issue":"4","key":"8_CR18","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/944012.944013","volume":"21","author":"P Turney","year":"2003","unstructured":"Turney, P., Littman, M.: Measuring praise and criticism: inference of semantic orientation from association. ACM Trans. Inf. Syst. 21(4), 315\u2013346 (2003)","journal-title":"ACM Trans. Inf. Syst."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Gamon, M., Aue. A.: Automatic identification of sentiment vocabulary exploiting low association with known sentiment terms. In: Proceedings of ACL (2005)","DOI":"10.3115\/1610230.1610241"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Kanayama, H., Nasukawa, T.: Fully automatic lexicon expansion for domain-oriented sentiment analysis. In: Proceedings of EMNLP (2006)","DOI":"10.3115\/1610075.1610125"}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39937-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:38:12Z","timestamp":1567971492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39937-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319399362","9783319399379"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39937-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}