{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T18:53:35Z","timestamp":1725648815397},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729082"},{"type":"electronic","value":"9783540729099"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72909-9_34","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T00:34:14Z","timestamp":1187656454000},"page":"299-307","source":"Crossref","is-referenced-by-count":1,"title":["EviRank: An Evidence Based Content Trust Model for Web Spam Detection"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guosun","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Mingjun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Huanan","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Fetterly, D., Manasse, M., Najork, M.: Spam, Damn Spam, and Statistics: Using statistical analysis to locate spam web pages. In: 7th International Workshop on the Web and Databases (2004)","key":"34_CR1","DOI":"10.1145\/1017074.1017077"},{"doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., et al.: Detecting Spam Web Pages through Content Analysis. In: proceedings of WWW 2006, May 23\u201326, Edinburgh, Scotland (2006)","key":"34_CR2","DOI":"10.1145\/1135777.1135794"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Zeng, G. S., Liu, T.: An Autonomous Trust Construction System Based on Bayesian Method, In: Proceedings of the IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology (IAT 2006), Hong Kong, China, pp. 357\u2013362 (December18-22 2006)","key":"34_CR3","DOI":"10.1109\/IAT.2006.35"},{"unstructured":"Gyongyi, Z., Garcia-Molina, H.: Web Spam Taxonomy. In: 1st International Workshop on Adversarial Information Retrieval on the Web (May 2005)","key":"34_CR4"},{"unstructured":"Davison, B.: Recognizing Nepotistic Links on the Web. In AAAI-2000 Workshop on Artificial Intelligence for Web Search (July 2000)","key":"34_CR5"},{"unstructured":"Baeza-Yates, R., Castillo, C., Liopez, V.: PageRank Increase under Different Collusion Topologies. In: 1st International Workshop on Adversarial Information Retrieval on the Web (May 2005)","key":"34_CR6"},{"unstructured":"Page, L., Brin, S., et al.: The PageRank Citation Ranking: Bringing Order to the Web. Stanford Digital Library Technologies Project (1998)","key":"34_CR7"},{"unstructured":"Adali, S., Liu, T., Magdon-Ismail, M.: Optimal Link Bombs are Uncoordinated. In: 1st International Workshop on Adversarial Information Retrieval on the Web (May 2005)","key":"34_CR8"},{"doi-asserted-by":"crossref","unstructured":"Gyiongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web Spam with TrustRank. In: 30th International Conference on Very Large Data Bases (August 2004)","key":"34_CR9","DOI":"10.1016\/B978-012088469-8.50052-8"},{"unstructured":"Mishne, G., Carmel, D., Lempel, R.: Blocking Blog Spam with Language Model Disagreement. In: 1st International Workshop on Adversarial Information Retrieval on the Web (May 2005)","key":"34_CR10"},{"doi-asserted-by":"crossref","unstructured":"Cao, Y. B., Xu, J., Liu, T. Y., et al.: Adapting Ranking SVM to Document Retrieval. In: Proceedings of the 29th Annual International ACM SIGIR Conference On Research and Development in Information Retrieval, pp. 186\u2013193 (2006)","key":"34_CR11","DOI":"10.1145\/1148170.1148205"},{"unstructured":"Herbrich, R., Graepel, T., Obermayer, K.: Large Margin Rank Boundaries for Ordinal Regression. Advances in Large Margin Classifiers, pp. 115\u2013132 (2000)","key":"34_CR12"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/11836025_66","volume-title":"The Semantic Web \u2013 ASWC 2006","author":"W. Wang","year":"2006","unstructured":"Wang, W., Zeng, G.S., Yuan, L.L.: A Semantic Reputation Mechanism in P2P Semantic Web. In: Mizoguchi, R., Shi, Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol.\u00a04185, pp. 682\u2013688. Springer, Heidelberg (2006)"},{"key":"34_CR14","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Machine Learning: ECML 2004","author":"H. Zhang","year":"2004","unstructured":"Zhang, H., Su, J.: Naive Bayesian classifiers for ranking. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol.\u00a03201, Springer, Heidelberg (2004)"},{"issue":"3","key":"34_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/A:1024099825458","volume":"52","author":"F.J. Provost","year":"2003","unstructured":"Provost, F.J., Domingos, P.: Tree Induction for Probability-Based Ranking. Ma.-chine Learning\u00a052(3), 199\u2013215 (2003)","journal-title":"Ma-chine Learning"},{"key":"34_CR16","first-page":"43","volume-title":"Proceedings of the Third International Conference on Knowledge Discovery and Data Mining","author":"F. Provost","year":"1997","unstructured":"Provost, F., Fawcett, T.: Analysis and visualization of classifier performance: comparison under imprecise class and cost distribution. In: Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, pp. 43\u201348. AAAI Press, California (1997)"},{"key":"34_CR17","volume-title":"Data Mining\u2013Practical Machine Learning Tools and Techniques with Java Implementation","author":"I.H. Witten","year":"2000","unstructured":"Witten, I.H., Frank, E.: Data Mining\u2013Practical Machine Learning Tools and Techniques with Java Implementation. Morgan Kaufmann, Washington (2000)"},{"doi-asserted-by":"crossref","unstructured":"Gil, Y., Artz, D.: Towards content trust of web resources. In: Proceedings of the 15th International World Wide Web Conference (2006)","key":"34_CR18","DOI":"10.1145\/1135777.1135861"}],"container-title":["Lecture Notes in Computer Science","Advances in Web and Network Technologies, and Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72909-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T20:58:36Z","timestamp":1558472316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72909-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540729082","9783540729099"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72909-9_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}