{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:25:53Z","timestamp":1761060353675},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_41","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:26:44Z","timestamp":1495837604000},"page":"412-423","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Crowdsourcing Spammers in Community Question Answering Websites"],"prefix":"10.1007","author":[{"given":"Kaiqing","family":"Hao","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., Bharadwaj, K.: The best answers? think twice: online detection of commercial campaigns in the CQA forums. In: 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2013)","DOI":"10.1145\/2492517.2492553"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: detection of hidden paid posters. In: 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2013)","DOI":"10.1145\/2492517.2492637"},{"key":"41_CR4","unstructured":"Fxsjy: jieba chinese text segmentation (2016). https:\/\/github.com\/fxsjy\/jieba . Cited 4 May 2016"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Gao, R., Hao, B., Li, H., Gao, Y., Zhu, T.: Developing simplified chinese psychological linguistic analysis dictionary for microblog. In: International Conference on Brain and Health Informatics, pp. 359\u2013368. Springer (2013)","DOI":"10.1007\/978-3-319-02753-1_36"},{"issue":"1","key":"41_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newslett. 11(1), 10\u201318 (2009). doi: 10.1145\/1656274.1656278","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"41_CR7","unstructured":"IBISWorld: Crowdsourcing Service Providers in the US: Market Research Report. Technical report, IBISWorld (2016). http:\/\/www.ibisworld.com\/industry\/crowdsourcing-service-providers.html . Cited 4 May 2016"},{"issue":"1","key":"41_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542182.2542191","volume":"5","author":"K Lee","year":"2013","unstructured":"Lee, K., Caverlee, J., Cheng, Z., Sui, D.Z.: Campaign extraction from social media. ACM Trans. Intell. Syst. Technol. 5(1), 1\u201328 (2013). doi: 10.1145\/2542182.2542191","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"41_CR9","unstructured":"Lee, K., Tamilarasan, P., Caverlee, J.: Crowdturfers, campaigns, and social media: tracking and revealing crowdsourced manipulation of social media. In: Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM (2013)"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Lee, K., Webb, S., Ge, H.: The dark side of micro-task marketplaces: characterizing fiverr and automatically detecting crowdturfing. In: Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM (2014)","DOI":"10.1007\/s13278-014-0241-1"},{"key":"41_CR11","unstructured":"Li, X., Liu, Y., Zhang, M., Ma, S., Zhu, X., Sun, J.: Detecting promotion campaigns in community question answering. In: 24th International Joint Conference on Artificial Intelligence-IJCAI-15 (2014)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf. In: WWW 2012 (2012)","DOI":"10.1145\/2187836.2187928"},{"key":"41_CR13","unstructured":"Wang, G., Wang, T., Zheng, H., Zhao, B.Y.: Man vs. machine: Lractical adversarial detection of malicious crowdsourcing workers. In: 23rd USENIX Security Symposium, USENIX Association, CA (2014)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Xu, A.: Revealing, characterizing, and detecting crowdsourcing spammers: a case study in community Q & A. In: IEEE INFOCOM 2015 (2015)","DOI":"10.1109\/INFOCOM.2015.7218643"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW 2012 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"41_CR16","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: Proceedings of the Fourteenth International Conference on Machine Learning ICML (1997)"},{"key":"41_CR17","unstructured":"ZBJ: ZBJ.com. (2016). http:\/\/www.zbj.com\/ . Cited 15 Mar 2016"},{"key":"41_CR18","unstructured":"Zeng, J.: Lu Chuan respond to the \u201cShuijun\u201d event (2012). http:\/\/ent.qq.com\/a\/20121204\/000350.htm . Cited 5 May 2016"},{"key":"41_CR19","unstructured":"Zhidao: Baidu Zhidao (2016). http:\/\/zhidao.baidu.com\/ . Cited 1 Jan 2016"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T01:20:30Z","timestamp":1569374430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_41","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}