{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:09:36Z","timestamp":1743016176693,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644707"},{"type":"electronic","value":"9783319644714"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64471-4_19","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T10:37:25Z","timestamp":1501583845000},"page":"232-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cleaning Out Web Spam by Entropy-Based Cascade Outlier Detection"],"prefix":"10.1007","author":[{"given":"Sha","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"issue":"2","key":"19_CR1","first-page":"50","volume":"13","author":"N Spirin","year":"2012","unstructured":"Spirin, N., Han, J.: Survey on web spam detection: principles and algorithms. ACM 13(2), 50\u201364 (2012)","journal-title":"ACM"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Gao, B., Sun, C., Jiang, Y., Liu, T.: Let web spammers expose themselves. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining, New York, pp. 525\u2013534 (2011)","DOI":"10.1145\/1935826.1935902"},{"key":"19_CR3","first-page":"899","volume":"4","author":"X Wei","year":"2010","unstructured":"Wei, X., Li, C., Chen, H.: Content and link based web spam detection with co-training. J. Frontiers Comput. Sci. Technol. 4, 899\u2013908 (2010)","journal-title":"J. Frontiers Comput. Sci. Technol."},{"issue":"8","key":"19_CR4","doi-asserted-by":"publisher","first-page":"5599","DOI":"10.1016\/j.eswa.2010.02.053","volume":"37","author":"W Wang","year":"2010","unstructured":"Wang, W., Zeng, G., Tang, D.: Using evidence based content trust model for spam detection. Expert Syst. Appl. 37(8), 5599\u20135606 (2010)","journal-title":"Expert Syst. Appl."},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MIS.2002.1039832","volume":"17","author":"PY Lee","year":"2002","unstructured":"Lee, P.Y., Hui, S.C., Fong, A.C.M.: Neural Networks for Web Content Filter. IEEE Intell. Syst. 17, 48\u201357 (2002)","journal-title":"IEEE Intell. Syst."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Dong, C., Zhou, B.: Effectively detecting content spam on the web using topical diversity measures. In: IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 1115\u20131123 (2012)","DOI":"10.1109\/WI-IAT.2012.98"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Suhara, Y., Toda, H., Nishioka, S., Susaki, S.: Automatically generated spam detection based on sentence-level topic information. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 1157\u20131160 (2013)","DOI":"10.1145\/2487788.2488140"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Fang, X., Tan, Y., Zheng, X., Zhuang, H., Zhou, S.: Imbalanced web spam classification using self-labeled techniques and multi-classifier models. In: Proceedings of International Conference on Knowledge Science, Engineering and Management, pp. 663\u2013668 (2015)","DOI":"10.1007\/978-3-319-25159-2_60"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TSMCB.2011.2167144","volume":"42","author":"U Bhowan","year":"2012","unstructured":"Bhowan, U., Johnston, M., Zhang, M.: Developing new fitness functions in genetic programming for classification with unbalanced data. IEEE Trans. Syst. Man Cybern. 42, 406\u2013421 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Bhattacharya, G., Ghosh, K., Chowdhury, A.S.: Outlier detection using neighborhood rank difference. Pattern Recogn. Lett. 60(C), 24\u201331 (2015)","DOI":"10.1016\/j.patrec.2015.04.004"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.patrec.2014.06.012","volume":"49","author":"A Daneshpazhouh","year":"2014","unstructured":"Daneshpazhouh, A., Sami, A.: Entropy-based outlier detection using semi-supervised approach with few positive examples. Pattern Recogn. Lett. 49, 77\u201384 (2014)","journal-title":"Pattern Recogn. Lett."},{"key":"19_CR12","unstructured":"Fayyad, U.M., Irani, K.B.: Multi-interval discretization of continuous-valued attributes for classification learning. In: Proceedings of the 13th International Joint Conference on Artificial Intelligence, pp. 1022\u20131027 (2010)"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"3306","DOI":"10.1016\/j.eswa.2013.11.027","volume":"41","author":"B Zhao","year":"2014","unstructured":"Zhao, B., Zhu, Y.: Formalizing and validating the Web quality model for Web source quality evaluation. Expert Syst. Appl. 41, 3306\u20133312 (2014)","journal-title":"Expert Syst. Appl."},{"key":"19_CR14","unstructured":"Wei, S., Zhu, Y.: Combining topic similarity with link weight for Web spam ranking detection. J. Comput. Appl. 36(3), 735\u2013739 (2016). (in Chinese)"},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10844-014-0310-y","volume":"43","author":"KL Goh","year":"2014","unstructured":"Goh, K.L., Patchmuthu, R.K., Singh, A.K.: Link-based web spam detection using weight properties. J. Intell. Inf. Syst. 43(1), 129\u2013145 (2014)","journal-title":"J. Intell. Inf. Syst."},{"key":"19_CR16","unstructured":"Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. In: Proceedings of the Second International Workshop on Adversarial Information Retrieval on the Web, Seattle, Washington, USA, pp. 37\u201340 (2006)"},{"key":"19_CR17","unstructured":"McAfee Inc. TrustSource Web Database Reference Guide (category set 4). https:\/\/support.mcafee.com\/ServicePortal\/faces\/knowledgecenter. Accessed 29 Nov 2016"},{"key":"19_CR18","unstructured":"Standardization Administration of the People\u2019s Republic of China (SAC). Information security technology\u2014Guidelines for the category and classification of information security incidents. GB\/Z 20986-2007 (2013)"},{"key":"19_CR19","unstructured":"Web Spam Challenge: Results. http:\/\/webspam.lip6.fr\/wiki\/pmwiki.php?n=Main.PhaseIII. Accessed 29 Nov 2016 (2008)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"B\u00edr\u00f3, I., Sikl\u00f3si, D., Szab\u00f3, J, Bencz\u00far, A.: Linked latent Dirichlet allocation in web spam filtering. In: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, Madrid, Spain, pp. 37\u201340 (2009)","DOI":"10.1145\/1531914.1531922"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64471-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:12:19Z","timestamp":1710360739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64471-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644707","9783319644714"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64471-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"2 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lyon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}