{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T12:08:15Z","timestamp":1747915695713,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930336"},{"type":"electronic","value":"9783319930343"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93034-3_49","type":"book-chapter","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T07:30:29Z","timestamp":1529307029000},"page":"615-627","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Social Spammer Detection: A Multi-Relational Embedding Approach"],"prefix":"10.1007","author":[{"given":"Jun","family":"Yin","sequence":"first","affiliation":[]},{"given":"Zili","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Shaowu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"key":"49_CR1","unstructured":"Alvarez-Hamelin, J.I., Dall\u2019Asta, L., Barrat, A., Vespignani, A.: Large scale networks fingerprinting and visualization using the k-core decomposition. In: Advances in Neural Information Processing Systems, pp. 41\u201350 (2006)"},{"key":"49_CR2","unstructured":"Bordes, A., Usunier, N., Garcia-Duran, A., Weston, J., Yakhnenko, O.: Translating embeddings for modeling multi-relational data. In: International Conference on Neural Information Processing Systems, pp. 2787\u20132795 (2013)"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Bordes, A., Weston, J., Collobert, R., Bengio, Y., et al.: Learning structured embeddings of knowledge bases. In: AAAI, vol. 6, p. 6 (2011)","DOI":"10.1609\/aaai.v25i1.7917"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Gao, B., Sun, C., Jiang, Y., Liu, T.Y.: Let web spammers expose themselves. In: ACM International Conference on Web Search and Data Mining, pp. 525\u2013534 (2011)","DOI":"10.1145\/1935826.1935902"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Fakhraei, S., Foulds, J., Shashanka, M., Getoor, L.: Collective spammer detection in evolving multi-relational social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1769\u20131778. ACM (2015)","DOI":"10.1145\/2783258.2788606"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 233\u2013242 (2015)","DOI":"10.1145\/2766462.2767742"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: ICWSM, pp. 175\u2013184 (2013)","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Hu, X., Tang, J., Liu, H.: Online social spammer detection. In: AAAI, pp. 59\u201365 (2014)","DOI":"10.1609\/aaai.v28i1.8728"},{"key":"49_CR9","volume-title":"Graph Coloring Problems","author":"TR Jensen","year":"1995","unstructured":"Jensen, T.R., Toft, B.: Graph Coloring Problems. Wiley, Hoboken (1995)"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Analyzing and detecting review spam. In: International Conference on Data Mining (ICDM), pp. 547\u2013552. IEEE (2007)","DOI":"10.1109\/ICDM.2007.68"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: International Conference on World Wide Web, pp. 1189\u20131190. ACM (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"49_CR12","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. Comput. Sci (2014)"},{"key":"49_CR13","unstructured":"Li, F., Huang, M., Yang, Y., Zhu, X.: Learning to identify review spam. In: International Joint Conference on Artificial Intelligence (IJCAI), vol. 22, pp. 2488\u20132493 (2011)"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhang, Y., Lin, H., Wu, J., Wu, Z., Zhang, X.: How many zombies around you?. In: International Conference on Data Mining (ICDM), pp. 1133\u20131138. IEEE (2013)","DOI":"10.1109\/ICDM.2013.166"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., Ghosh, R.: Spotting opinion spammers using behavioral footprints. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632\u2013640 (2013)","DOI":"10.1145\/2487575.2487580"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: International Conference on World Wide Web, pp. 191\u2013200. ACM (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"49_CR17","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.S.: What yelp fake review filter might be doing?. In: ICWSM (2013)"},{"key":"49_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_40","volume-title":"Tensor Factorization for Relational Learning","author":"M Nickel","year":"2013","unstructured":"Nickel, M.: Tensor Factorization for Relational Learning. Ludwig-Maximilians-Universitt Mnchen, Munich (2013)"},{"key":"49_CR19","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. Stanford Digital Libraries Working Paper, pp. 1\u201314 (1998)"},{"key":"49_CR20","volume-title":"Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica","author":"SV Pemmaraju","year":"2009","unstructured":"Pemmaraju, S.V., Skiena, S.S.: Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Cambridge University Press, New York (2009)"},{"issue":"3\u20134","key":"49_CR21","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1023\/B:INRT.0000011209.19643.e2","volume":"7","author":"F Peng","year":"2004","unstructured":"Peng, F., Schuurmans, D., Wang, S.: Augmenting Naive Bayes classifiers with statistical language models. Inf. Retrieval 7(3\u20134), 317\u2013345 (2004)","journal-title":"Inf. Retrieval"},{"key":"49_CR22","unstructured":"Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: fighting spam with itself. In: Network and Distributed System Security Symposium (2010)"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985\u2013994. ACM (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"49_CR24","unstructured":"Schank, T.: Algorithmic aspects of triangle-based network analysis. Ph.D. in Computer Science, University Karlsruhe (2007)"},{"key":"49_CR25","unstructured":"Socher, R., Chen, D., Manning, C.D., Ng, A.: Reasoning with neural tensor networks for knowledge base completion. In: International Conference on Neural Information Processing Systems, pp. 926\u2013934 (2013)"},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Computer Security Applications Conference, pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"issue":"1","key":"49_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1108\/OIR-03-2015-0073","volume":"40","author":"Youquan Wang","year":"2016","unstructured":"Wang, Y., Wu, Z., Bu, Z., Cao, J., Yang, D.: Discovering shilling groups in a real e-commerce platform. Online Inf. Rev. 62\u201378 (2016)","journal-title":"Online Information Review"},{"key":"49_CR28","doi-asserted-by":"crossref","unstructured":"Wu, L., Hu, X., Morstatter, F., Liu, H.: Adaptive spammer detection with sparse group modeling. In: The International AAAI Conference on Web and Social Media, pp. 319\u2013326 (2017)","DOI":"10.1609\/icwsm.v11i1.14887"},{"key":"49_CR29","doi-asserted-by":"crossref","unstructured":"Wu, Z., Wang, Y., Wang, Y., Wu, J., Cao, J., Zhang, L.: Spammers detection from product reviews: a hybrid model. In: IEEE International Conference on Data Mining, pp. 1039\u20131044. IEEE (2016)","DOI":"10.1109\/ICDM.2015.73"},{"key":"49_CR30","doi-asserted-by":"crossref","unstructured":"Yu, R., He, X., Liu, Y.: GLAD: group anomaly detection in social media analysis. In: International Conference on Knowledge Discovery and Data Mining, pp. 372\u2013381. ACM (2014)","DOI":"10.1145\/2623330.2623719"},{"key":"49_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1552303.1552306","volume":"3","author":"B Zhou","year":"2009","unstructured":"Zhou, B., Pei, J.: Link spam target detection using page farms. ACM Trans. Knowl. Discov. Data (TKDD) 3, 1\u201338 (2009)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93034-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:30:46Z","timestamp":1710232246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93034-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930336","9783319930343"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93034-3_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}