{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:57:04Z","timestamp":1775246224650,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319771151","type":"print"},{"value":"9783319771168","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77116-8_19","type":"book-chapter","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T23:56:00Z","timestamp":1539042960000},"page":"255-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Sockpuppets in Deceptive Opinion Spam"],"prefix":"10.1007","author":[{"given":"Marjan","family":"Hosseinia","sequence":"first","affiliation":[]},{"given":"Arjun","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,10]]},"reference":[{"key":"19_CR1","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 309\u2013319. Association for Computational Linguistics (2011)"},{"key":"19_CR2","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Syntactic stylometry for deception detection. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers, vol. 2, pp. 171\u2013175. Association for Computational Linguistics (2012)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., et al.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632\u2013640. ACM (2013)","DOI":"10.1145\/2487575.2487580"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 939\u2013948. ACM (2010)","DOI":"10.1145\/1871437.1871557"},{"key":"19_CR5","unstructured":"Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: Ninth International AAAI Conference on Web and Social Media (2015)"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web, pp. 191\u2013200. ACM (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60, 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Layton, R., Watters, P., Dazeley, R.: Authorship attribution for twitter in 140 characters or less. In: 2010 Second Cybercrime and Trustwor-thy Computing Workshop (CTC), pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/CTC.2010.17"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Luyckx, K., Daelemans, W.: Authorship attribution and verification with many authors and limited data. In: Proceedings of the 22nd International Conference on Computa-tional Linguistics, vol. 1, pp. 513\u2013520. Association for Compu-tational Linguistics (2008)","DOI":"10.3115\/1599081.1599146"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J.: Authorship verification as a one-class classification problem. In: Proceedings of the Twenty-first International Conference on Machine Learning, p. 62. ACM (2004)","DOI":"10.1145\/1015330.1015448"},{"key":"19_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1","volume-title":"The Nature of Statistical Learning Theory","author":"Vladimir N. Vapnik","year":"2000","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4757-3264-1"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Chapelle, O., Zien, A.: Semi-supervised classification by low density separation. In: AISTATS, pp. 57\u201364 (2005)","DOI":"10.7551\/mitpress\/9780262033589.001.0001"},{"key":"19_CR13","unstructured":"Joachims, T.: Transductive inference for text classification using support vector machines. In: ICML, vol. 99, pp. 200\u2013209 (1999)"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1017\/S1351324905003694","volume":"11","author":"N Graham","year":"2005","unstructured":"Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Nat. Lang. Eng. 11, 397\u2013415 (2005)","journal-title":"Nat. Lang. Eng."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Gamon, M.: Linguistic correlates of style: authorship classification with deep linguistic analysis features. In: Proceedings of the 20th International Conference on Computational Linguistics, p. 611. Association for Computational Linguistics (2004)","DOI":"10.3115\/1220355.1220443"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Sapkota, U., Bethard, S., Montes-y G\u00f3mez, M., Solorio, T.: Not all character n-grams are created equal: a study in authorship attribution. In: Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL, pp. 93\u2013102 (2015)","DOI":"10.3115\/v1\/N15-1010"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1016\/j.neucom.2015.07.064","volume":"171","author":"T Qian","year":"2016","unstructured":"Qian, T., et al.: Tri-training for authorship attribution with limited training data: a comprehensive study. Neurocomputing 171, 798\u2013806 (2016)","journal-title":"Neurocomputing"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Seroussi, Y., Bohnert, F., Zukerman, I.: Authorship attribution with author-aware topic models. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers, vol. 2, pp. 264\u2013269. Association for Computational Linguistics (2012)","DOI":"10.1162\/COLI_a_00173"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/asi.22954","volume":"65","author":"M Koppel","year":"2014","unstructured":"Koppel, M., Winter, Y.: Determining if two documents are written by the same author. J. Assoc. Inf. Sci. Technol. 65, 178\u2013187 (2014)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, Markov chains and author unmasking: an investigation. In: Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, pp. 482\u2013491. Association for Computational Linguistics (2006)","DOI":"10.3115\/1610075.1610142"},{"key":"19_CR21","unstructured":"Solorio, T., Hasan, R., Mizan, M.: A case study of sockpuppet detection in wikipedia. In: Workshop on Language Analysis in Social Media (LASM) at NAACL HLT. pp. 59\u201368 (2013)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Qian, T., Liu, B.: Identifying multiple userids of the same author. In: EMNLP, pp. 1124\u20131135 (2013)","DOI":"10.18653\/v1\/D13-1113"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-18117-2_21","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"DH Fusilier","year":"2015","unstructured":"Fusilier, D.H., Montes-y-G\u00f3mez, M., Rosso, P., Cabrera, R.G.: Detection of opinion spam with character n-grams. In: Gelbukh, A. (ed.) CICLing 2015. LNCS, vol. 9042, pp. 285\u2013294. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18117-2_21"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Xie, S., Wang, G., Lin, S., Yu, P.S.: Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 823\u2013831. ACM (2012)","DOI":"10.1145\/2339530.2339662"},{"key":"19_CR26","unstructured":"Gokhman, S., Hancock, J., Prabhu, P., Ott, M., Cardie, C.: In search of a gold standard in studies of deception. In: Proceedings of the Workshop on Computational Approaches to Deception Detection, pp. 23\u201330. Association for Computational Linguistics (2012)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Li, J., Ott, M., Cardie, C., Hovy, E.H.: Towards a general rule for identifying deceptive opinion spam. In: ACL (1), Citeseer, pp. 1566\u20131576 (2014)","DOI":"10.3115\/v1\/P14-1147"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Li, J., Ott, M., Cardie, C.: Identifying manipulated offerings on review portals. In: EMNLP, pp. 1933\u20131942 (2013)","DOI":"10.18653\/v1\/D13-1199"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Banerjee, R., Feng, S., Kang, J.S., Choi, Y.: Keystroke patterns as prosody in digital writings: a case study with deceptive reviews and essays. In: Empirical Methods on Natural Language Processing (EMNLP) (2014)","DOI":"10.3115\/v1\/D14-1155"},{"key":"19_CR30","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.S.: What yelp fake review filter might be doing? In: ICWSM (2013)"},{"issue":"3","key":"19_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"Chih-Chung Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1\u201327:27 (2011). http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"19_CR32","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008). http:\/\/www.csie.ntu.edu.tw\/cjlin\/liblinear\/"},{"key":"19_CR33","unstructured":"Klein, D., Manning, C.D.: Accurate unlexicalized parsing. In: Proceedings of the 41st Annual Meeting on Association for Computational Linguistics, vol. 1, pp. 423\u2013430. Association for Computational Linguistics (2003). http:\/\/nlp.stanford.edu\/software\/lex-parser.shtml"},{"key":"19_CR34","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Characterizing stylistic elements in syntactic structure. In: Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, pp. 1522\u20131533. Association for Computational Linguistics (2012)"},{"key":"19_CR35","unstructured":"Weinberger, K.Q., Blitzer, J., Saul, L.K.: Distance metric learning for large margin nearest neighbor classification. In: Advances in Neural Information Processing Systems, pp. 1473\u20131480 (2005)"},{"issue":"6","key":"19_CR36","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1109\/TPAMI.2015.2476813","volume":"38","author":"Xinxing Xu","year":"2016","unstructured":"Xu, X., Li, W., Xu, D., Tsang, I.: Co-labeling for multi-view weakly labeled learning. IEEE Trans. Pattern Anal. Mach. Intell. 38(6), 1113\u20131125 (2015)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"19_CR37","unstructured":"Solorio, T., Hasan, R., Mizan, M.: Sockpuppet detection in wikipedia: a corpus of real-world deceptive writing for linking identities. In: Proceedings of the Ninth International Conference on Language Resources and Evaluation (LREC 2014), Reykjavik, Iceland, European Language Resources Association (ELRA) (2014)"}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77116-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:03:12Z","timestamp":1775242992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77116-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319771151","9783319771168"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77116-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CICLing","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Linguistics and Intelligent Text Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budapest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hungary","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicling2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cicling.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}