{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:41:56Z","timestamp":1759941716183,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331664"},{"type":"electronic","value":"9783642331671"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33167-1_18","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T06:07:05Z","timestamp":1345270025000},"page":"307-324","source":"Crossref","is-referenced-by-count":43,"title":["Exploring Linkability of User Reviews"],"prefix":"10.1007","author":[{"given":"Mishari","family":"Almishari","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Yelp By The Numbers, \n                    \n                      http:\/\/officialblog.yelp.com\/2010\/12\/2010-yelp-by-the-numbers.html"},{"key":"18_CR2","unstructured":"Yelp Elite Squad, \n                    \n                      http:\/\/www.yelp.com\/faq#what_is_elite_squad"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Chen, H.: Writeprints: A Stylometric Approach to Identity-Level Identification and Similarity Detection in Cyberspace. ACM Transactions on Information Systems (2008)","DOI":"10.1145\/1344411.1344413"},{"key":"18_CR4","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer (2006)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Dave, K., Lawrence, S., Pennock, D.M.: Mining the Peanut Gallery: Opinion Extraction and Semantic Classification of Product Reviews. In: International Conference on World Wide Web (2003)","DOI":"10.1145\/775224.775226"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Hu, M., Liu, B.: Mining and Summarizing Customer Reviews. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014073"},{"key":"18_CR7","unstructured":"Iqbal, F., Binsalleeh, H., Fung, B., Debbabi, M.: A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences (INS): Special Issue on Data Mining for Information Security (2011)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion Spam and Analysis. In: ACM International Conference on Web Search and Data Mining (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B., Lim, E.-P.: Finding Unusual Review Patterns Using Unexpected Rules. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management (2010)","DOI":"10.1145\/1871437.1871669"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Lewis, D.: Naive(bayes) at forty:the independence assumption in information retrieval. In: Proceedings of the 10th European Conference on Machine Learning (1998)","DOI":"10.1007\/BFb0026666"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Lim, E.-P., Nguyen, V.-A., Jindal, N., Liu, B., Lauw, H.: Detecting Product Review Spammers using Rating Behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management (2010)","DOI":"10.1145\/1871437.1871557"},{"key":"18_CR12","unstructured":"Mitchell, T.: Machine Learning. McGraw Hill (1997)"},{"key":"18_CR13","unstructured":"Nanavati, M., Taylor, N., Aiello, W., Warfield, A.: Herbert West \u2013 Deanonymizer. In: 6th USENIX Workshop on Hot Topics in Security (2011)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Paskov, H., Gong, N.Z., Bethencourt, J., Stefanov, E., Shin, E.C.R., Song, D.: On the Feasibility of Internet-Scale Author Identification. In: IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.46"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., Vaithyanathan, S.: Thumbs up? Sentiment Classification using Machine Learning Techniques. In: Empirical Methods on Natural Language Processing Conference (2002)","DOI":"10.3115\/1118693.1118704"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Stamatatos, E.: A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology (2009)","DOI":"10.1002\/asi.21001"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Yadav, S., Reddy, A.K., Reddy, A.N., Ranjan, S.: Detecting Algorithmically Generated Malicious Domain Names. In: Internet Measurement Conference (2010)","DOI":"10.1145\/1879141.1879148"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A Framework for Authorship Identification of Online Messages: Writing Style Features and Classification Techniques. Journal of the American Society for Information Science and Technology (2006)","DOI":"10.1002\/asi.20316"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33167-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:42:30Z","timestamp":1559508150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33167-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331664","9783642331671"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33167-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}