{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:35:08Z","timestamp":1725867308020},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319476490"},{"type":"electronic","value":"9783319476506"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47650-6_35","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T17:32:26Z","timestamp":1475602346000},"page":"439-450","source":"Crossref","is-referenced-by-count":9,"title":["LSSL-SSD: Social Spammer Detection with Laplacian Score and Semi-supervised Learning"],"prefix":"10.1007","author":[{"given":"Wentao","family":"Li","sequence":"first","affiliation":[]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wenge","family":"Rong","sequence":"additional","affiliation":[]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"issue":"6","key":"35_CR1","doi-asserted-by":"crossref","first-page":"066123","DOI":"10.1103\/PhysRevE.85.066123","volume":"85","author":"J Borge-Holthoefer","year":"2012","unstructured":"Borge-Holthoefer, J., Rivero, A., Moreno, Y.: Locating privileged spreaders on an online social network. Phys. Rev. E 85(6), 066123 (2012)","journal-title":"Phys. Rev. E"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Hu, X., Tang, X., Liu, H.: Online social spammer detection. In: AAAI, pp. 59\u201365 (2014)","DOI":"10.1609\/aaai.v28i1.8728"},{"issue":"2","key":"35_CR3","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/2503792.2503797","volume":"42","author":"A Guille","year":"2013","unstructured":"Guille, A., Hacid, H., Favre, C., Zighed, D.A.: Information diffusion in online social networks: a survey. ACM SIGMOD Rec. 42(2), 17\u201328 (2013)","journal-title":"ACM SIGMOD Rec."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Wu, F., Shu, J., Huang, Y., Yuan, Z.: Social spammer and spam message co-detection in microblogging with social context regularization. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 1601\u20131610. ACM (2015)","DOI":"10.1145\/2806416.2806560"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Hu, X., Tang, J., Gao, H., Liu, H.: Social spammer detection with sentiment information. In: 2014 IEEE International Conference on Data Mining, pp. 180\u2013189. IEEE (2014)","DOI":"10.1109\/ICDM.2014.141"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-23531-8_3","volume-title":"Web-Age Information Management","author":"X Zhu","year":"2015","unstructured":"Zhu, X., Nie, Y., Jin, S., Li, A., Jia, Y.: Spammer detection on online social networks based on logistic regression. In: Xiao, X., Zhang, Z. (eds.) WAIM 2015. LNCS, vol. 9391, pp. 29\u201340. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23531-8_3"},{"issue":"6","key":"35_CR7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"issue":"1","key":"35_CR9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/cje.2015.01.009","volume":"24","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Ji, D., Yin, L., Zhang, H.: Finding deceptive opinion spam by correcting the mislabeled instances. Chin. J. Electron. 24(1), 52\u201357 (2015)","journal-title":"Chin. J. Electron."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Almeida, J., Kumaraguru, P.: Detection of spam tipping behaviour on foursquare. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 641\u2013648. ACM (2013)","DOI":"10.1145\/2487788.2488015"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-18032-8_14","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z Li","year":"2015","unstructured":"Li, Z., Zhang, X., Shen, H., Liang, W., He, Z.: A semi-supervised framework for social spammer detection. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9078, pp. 177\u2013188. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-18032-8_14"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435\u2013442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"35_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in twitter using sender-receiver relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 301\u2013317. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23644-0_16"},{"issue":"1","key":"35_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-016-0324-2","volume":"6","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Jianguo, L.: Discover millions of fake followers in Weibo. Soc. Netw. Anal. Min. 6(1), 1\u201315 (2016)","journal-title":"Soc. Netw. Anal. Min."},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: UNIK: unsupervised social network spam detection. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, pp. 479\u2013488. ACM (2013)","DOI":"10.1145\/2505515.2505581"},{"key":"35_CR17","unstructured":"He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: Advances in Neural Information Processing Systems, pp. 507\u2013514 (2005)"},{"key":"35_CR18","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable, feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"6","key":"35_CR19","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/TSMCA.2007.904745","volume":"37","author":"M Li","year":"2007","unstructured":"Li, M., Zhou, Z.-H.: Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 37(6), 1088\u20131098 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"35_CR20","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47650-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T15:18:01Z","timestamp":1657379881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47650-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319476490","9783319476506"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47650-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}