{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:46Z","timestamp":1742914006905,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611754"},{"type":"electronic","value":"9783319611761"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61176-1_27","type":"book-chapter","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:54:25Z","timestamp":1498010065000},"page":"489-508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Content-Aware Trust Index for Online Review Spam Detection"],"prefix":"10.1007","author":[{"given":"Hao","family":"Xue","sequence":"first","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"unstructured":"Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: ICWSM (2013)","key":"27_CR1"},{"unstructured":"Baccianella, S., Esuli, A., Sebastiani, F.: Sentiwordnet 3.0: an enhanced lexical resource for sentiment analysis and opinion mining. In: LREC, vol. 10, pp. 2200\u20132204 (2010)","key":"27_CR2"},{"unstructured":"Brody, S., Elhadad, N.: An unsupervised aspect-sentiment model for online reviews. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp. 804\u2013812. Association for Computational Linguistics (2010)","key":"27_CR3"},{"doi-asserted-by":"crossref","unstructured":"Chen, Z., Mukherjee, A., Liu, B.: Aspect extraction with automated prior knowledge learning. In: ACL, vol. 1, pp. 347\u2013358 (2014)","key":"27_CR4","DOI":"10.3115\/v1\/P14-1033"},{"unstructured":"Fahrni, A., Klenner, M.: Old wine or warm beer: target-specific sentiment analysis of adjectives. In: Proceedings of the Symposium on Affective Language in Human and Machine, AISB, pp. 60\u201363 (2008)","key":"27_CR5"},{"unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: ICWSM (2013)","key":"27_CR6"},{"key":"27_CR7","first-page":"1","volume":"9","author":"G Ganu","year":"2009","unstructured":"Ganu, G., Elhadad, N., Marian, A.: Beyond the stars: improving rating predictions using review text content. WebDB 9, 1\u20136 (2009)","journal-title":"WebDB"},{"doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web, pp. 403\u2013412. ACM (2004)","key":"27_CR8","DOI":"10.1145\/988672.988727"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TKDE.2013.26","volume":"26","author":"Z Hai","year":"2014","unstructured":"Hai, Z., Chang, K., Kim, J.J., Yang, C.C.: Identifying features in opinion mining via intrinsic and extrinsic domain relevance. IEEE Trans. Knowl. Data Eng. 26(3), 623\u2013634 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Hu, M., Liu, B.: Mining and summarizing customer reviews. In: Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 168\u2013177. ACM (2004)","key":"27_CR10","DOI":"10.1145\/1014052.1014073"},{"doi-asserted-by":"crossref","unstructured":"Jijkoun, V., Hofmann, K.: Generating a non-English subjectivity lexicon: relations that matter. In: Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics, pp. 398\u2013405. Association for Computational Linguistics (2009)","key":"27_CR11","DOI":"10.3115\/1609067.1609111"},{"doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, WSDM 2008, pp. 219\u2013230. ACM, New York (2008)","key":"27_CR12","DOI":"10.1145\/1341531.1341560"},{"doi-asserted-by":"crossref","unstructured":"Jo, Y., Oh, A.H.: Aspect and sentiment unification model for online review analysis. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 815\u2013824. ACM (2011)","key":"27_CR13","DOI":"10.1145\/1935826.1935932"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11755593_14","volume-title":"Trust Management","author":"A J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179\u2013192. Springer, Heidelberg (2006). doi:10.1007\/11755593_14"},{"issue":"2","key":"27_CR15","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1111\/j.1467-8640.2006.00277.x","volume":"22","author":"A Kennedy","year":"2006","unstructured":"Kennedy, A., Inkpen, D.: Sentiment classification of movie reviews using contextual valence shifters. Comput. Intell. 22(2), 110\u2013125 (2006)","journal-title":"Comput. Intell."},{"issue":"5","key":"27_CR16","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM (JACM) 46(5), 604\u2013632 (1999)","journal-title":"J. ACM (JACM)"},{"unstructured":"Konishi, T., Tezuka, T., Kimura, F., Maeda, A.: Estimating aspects in online reviews using topic model with 2-level learning. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 120\u2013126 (2012)","key":"27_CR17"},{"doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM 2010, pp. 939\u2013948. ACM, New York (2010)","key":"27_CR18","DOI":"10.1145\/1871437.1871557"},{"doi-asserted-by":"crossref","unstructured":"Liu, Q., Gao, Z., Liu, B., Zhang, Y.: A logic programming approach to aspect extraction in opinion mining. In: 2013 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence","key":"#cr-split#-27_CR19.1","DOI":"10.1109\/WI-IAT.2013.40"},{"unstructured":"(WI) and Intelligent Agent Technologies (IAT), vol. 1, pp. 276-283. IEEE (2013)","key":"#cr-split#-27_CR19.2"},{"issue":"12","key":"27_CR20","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca, M., Zervas, G.: Fake it till you make it: reputation, competition, and yelp review fraud. Manag. Sci. 62(12), 3412\u20133427 (2016)","journal-title":"Manag. Sci."},{"doi-asserted-by":"crossref","unstructured":"Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on Recommender systems, pp. 17\u201324. ACM (2007)","key":"27_CR21","DOI":"10.1145\/1297231.1297235"},{"issue":"11","key":"27_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: Wordnet: a lexical database for english. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Wang, J., Glance, N., Jindal, N.: Detecting group review spam. In: Proceedings of the 20th International Conference Companion on World Wide Web, WWW 2011, pp. 93\u201394 (2011)","key":"27_CR23","DOI":"10.1145\/1963192.1963240"},{"unstructured":"Mukherjee, S., Dutta, S., Weikum, G.:","key":"27_CR24"},{"unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1 (2011)","key":"27_CR25"},{"unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web (1999)","key":"27_CR26"},{"doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L.: A sentimental education: sentiment analysis using subjectivity summarization based on minimum cuts. In: Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, p. 271. Association for Computational Linguistics (2004)","key":"27_CR27","DOI":"10.3115\/1218955.1218990"},{"doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., Vaithyanathan, S.: Thumbs up?: sentiment classification using machine learning techniques. In: Proceedings of the ACL 2002 Conference on Empirical Methods in Natural Language Processing, vol. 10, pp. 79\u201386. Association for Computational Linguistics (2002)","key":"27_CR28","DOI":"10.3115\/1118693.1118704"},{"key":"27_CR29","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Pontiki, M., Galanis, D., Pavlopoulos, J., Papageorgiou, H., Androutsopoulos, I., Manandhar, S.: Semeval-2014 task 4: aspect based sentiment analysis. In: Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), pp. 27\u201335 (2014)","key":"27_CR30","DOI":"10.3115\/v1\/S14-2004"},{"key":"27_CR31","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-1-84628-754-1_2","volume-title":"Natural Language Processing and Text Mining","author":"AM Popescu","year":"2007","unstructured":"Popescu, A.M., Etzioni, O.: Extracting product features and opinions from reviews. In: Kao, A., Poteet, S.R. (eds.) Natural Language Processing and Text Mining, pp. 9\u201328. Springer, London (2007)"},{"doi-asserted-by":"crossref","unstructured":"Poria, S., Cambria, E., Ku, L.W., Gui, C., Gelbukh, A.: A rule-based approach to aspect extraction from product reviews. In: Proceedings of the Second Workshop on Natural Language Processing for Social Media (SocialNLP), pp. 28\u201337 (2014)","key":"27_CR32","DOI":"10.3115\/v1\/W14-5905"},{"issue":"1","key":"27_CR33","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1162\/coli_a_00034","volume":"37","author":"G Qiu","year":"2011","unstructured":"Qiu, G., Liu, B., Bu, J., Chen, C.: Opinion word expansion and target extraction through double propagation. Comput. Linguist. 37(1), 9\u201327 (2011)","journal-title":"Comput. Linguist."},{"issue":"1","key":"27_CR34","first-page":"2","volume":"17","author":"F Salvetti","year":"2004","unstructured":"Salvetti, F., Lewis, S., Reichenbach, C.: Automatic opinion polarity classification of movie. Colo. Res. Linguist. 17(1), 2 (2004)","journal-title":"Colo. Res. Linguist."},{"issue":"1","key":"27_CR35","first-page":"64","volume":"4","author":"C Than","year":"2014","unstructured":"Than, C., Han, S.: Improving recommender systems by incorporating similarity, trust and reputation. J. Internet Serv. Inf. Secur. (JISIS) 4(1), 64\u201376 (2014)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"doi-asserted-by":"crossref","unstructured":"Titov, I., McDonald, R.: Modeling online reviews with multi-grain topic models. In: Proceedings of the 17th International Conference on World Wide Web, pp. 111\u2013120. ACM (2008)","key":"27_CR36","DOI":"10.1145\/1367497.1367513"},{"doi-asserted-by":"crossref","unstructured":"Turney, P.D.: Thumbs up or thumbs down?: semantic orientation applied to unsupervised classification of reviews. In: Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, pp. 417\u2013424. Association for Computational Linguistics (2002)","key":"27_CR37","DOI":"10.3115\/1073083.1073153"},{"doi-asserted-by":"crossref","unstructured":"Vydiswaran, V., Zhai, C., Roth, D.: Content-driven trust propagation framework. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 974\u2013982. ACM (2011)","key":"27_CR38","DOI":"10.1145\/2020408.2020567"},{"issue":"4","key":"27_CR39","first-page":"61:1","volume":"3","author":"G Wang","year":"2012","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P.S.: Identify online store review spammers via social review graph. ACM Trans. Intell. Syst. Technol. 3(4), 61:1\u201361:21 (2012)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"3","key":"27_CR40","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1162\/coli.08-012-R1-06-90","volume":"35","author":"T Wilson","year":"2009","unstructured":"Wilson, T., Wiebe, J., Hoffmann, P.: Recognizing contextual polarity: an exploration of features for phrase-level sentiment analysis. Comput. Linguist. 35(3), 399\u2013433 (2009)","journal-title":"Comput. Linguist."},{"doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 823\u2013831. ACM, New York (2012)","key":"27_CR41","DOI":"10.1145\/2339530.2339662"},{"doi-asserted-by":"crossref","unstructured":"Xue, H., Li, F., Seo, H., Pluretti, R.: Trust-aware review spam detection. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 726\u2013733. IEEE (2015)","key":"27_CR42","DOI":"10.1109\/Trustcom.2015.440"},{"issue":"6","key":"27_CR43","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TKDE.2007.190745","volume":"20","author":"X Yin","year":"2008","unstructured":"Yin, X., Han, J., Philip, S.Y.: Truth discovery with multiple conflicting information providers on the web. IEEE Trans. Knowl. Data Eng. 20(6), 796\u2013808 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61176-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:51:38Z","timestamp":1710345098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61176-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611754","9783319611761"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61176-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2017.ittc.ku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}