{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:44:21Z","timestamp":1743144261058,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346538"},{"type":"electronic","value":"9783642346545"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34654-5_21","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T10:33:06Z","timestamp":1352975586000},"page":"199-209","source":"Crossref","is-referenced-by-count":3,"title":["Towards Web Spam Filtering with Neural-Based Approaches"],"prefix":"10.1007","author":[{"given":"Renato Moraes","family":"Silva","sequence":"first","affiliation":[]},{"given":"Tiago A.","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Akebo","family":"Yamakami","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Shengen, L., Xiaofei, N., Peiqi, L., Lin, W.: Generating New Features Using Genetic Programming to Detect Link Spam. In: 2011 Intl. Conf. on Intelligent Computation Technology and Automation (ICICTA 2011), pp. 135\u2013138. IEEE (2011)","DOI":"10.1109\/ICICTA.2011.41"},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TIFS.2010.2050767","volume":"5","author":"L. Araujo","year":"2010","unstructured":"Araujo, L., Martinez-Romo, J.: Web Spam Detection \u2013 New Classification Features Based on Qualified Link Analysis and Language Models. IEEE Transactions on Information Forensics and Security\u00a05(3), 581\u2013590 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11416-009-0132-6","volume":"7","author":"M. Egele","year":"2011","unstructured":"Egele, M., Kolbitsch, C., Platzer, C.: Removing Web Spam Links from Search Engine Results. Journal in Computer Virology\u00a07(1), 51\u201362 (2011)","journal-title":"Journal in Computer Virology"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Shen, G., Gao, B., Liu, T., Feng, G., Song, S., Li, H.: Detecting Link Spam Using Temporal Information. In: 6th Intl. Conf. on Data Mining (ICDM 2006), pp. 1049\u20131053. IEEE (2006)","DOI":"10.1109\/ICDM.2006.51"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Gan, Q., Suel, T.: Improving Web Spam Classifiers Using Link Structure. In: 3rd Intl. Work. on Adversarial Information Retrieval on the Web (AIRWeb 2007), pp. 17\u201320. ACM (2007)","DOI":"10.1145\/1244408.1244412"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting Spam Web Pages Through Content Analysis. In: 15th Intl. Conf. on World Wide Web (WWW 2006), pp. 83\u201392. ACM (2006)","DOI":"10.1145\/1135777.1135794"},{"key":"21_CR7","unstructured":"Silva, R.M., Almeida, T.A., Yamakami, A.: Artificial Neural Networks for Content-based Web Spam Detection. In: 14th Intl. Conf. on Artificial Intelligence (ICAI 2012), pp. 1\u20137 (2012)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"B\u00edr\u00f3, I., Sikl\u00f3si, D., Szab\u00f3, J., Bencz\u00far, A.A.: Linked Latent Dirichlet Allocation in Web Spam Filtering. In: 5th Intl. Work. on Adversarial Information Retrieval on the Web (AIRWeb 2009), pp. 37\u201340. ACM (2009)","DOI":"10.1145\/1531914.1531922"},{"issue":"2","key":"21_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s10994-010-5171-1","volume":"81","author":"J. Abernethy","year":"2010","unstructured":"Abernethy, J., Chapelle, O., Castillo, C.: Graph Regularization Methods for Web Spam Detection. Machine Learning\u00a081(2), 207\u2013225 (2010)","journal-title":"Machine Learning"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A.: Know Your Neighbors \u2013 Web Spam Detection Using the Web Topology. In: 30th Annual Intl. ACM SIGIR Conf. on Research and Development in Information Retrieval (SIGIR 2007), pp. 423\u2013430. ACM (2007)","DOI":"10.1145\/1277741.1277814"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Svore, K.M., Wu, Q., Burges, C.J.: Improving Web Spam Classification Using Rank-Time Features. In: 3rd Intl. Work. on Adversarial Information Retrieval on the Web (AIRWeb 2007), pp. 9\u201316. ACM (2007)","DOI":"10.1145\/1244408.1244411"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-15822-3_45","volume-title":"Artificial Neural Networks \u2013 ICANN 2010","author":"L.D. Noi","year":"2010","unstructured":"Noi, L.D., Hagenbuchner, M., Scarselli, F., Tsoi, A.: Web Spam Detection by Probability Mapping Graphsoms and Graph Neural Networks. In: Diamantaras, K., Duch, W., Iliadis, L.S. (eds.) ICANN 2010, Part II. LNCS, vol.\u00a06353, pp. 372\u2013381. Springer, Heidelberg (2010)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-24396-7_19","volume-title":"Web Information Systems Engineering \u2013 WISE 2010 Workshops","author":"T. Largillier","year":"2011","unstructured":"Largillier, T., Peyronnet, S.: Using Patterns in the Behavior of the Random Surfer to Detect Webspam Beneficiaries. In: Chiu, D.K.W., Bellatreche, L., Sasaki, H., Leung, H.-f., Cheung, S.-C., Hu, H., Shao, J. (eds.) WISE Workshops 2010. LNCS, vol.\u00a06724, pp. 241\u2013253. Springer, Heidelberg (2011)"},{"key":"21_CR14","volume-title":"Neural Networks \u2013 A Comprehensive Foundation","author":"S. Haykin","year":"1998","unstructured":"Haykin, S.: Neural Networks \u2013 A Comprehensive Foundation, 2nd edn. Prentice Hall, New York (1998)","edition":"2"},{"key":"21_CR15","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"C.M. Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford Press, Oxford (1995)"},{"issue":"6","key":"21_CR16","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/72.329697","volume":"5","author":"M.T. Hagan","year":"1994","unstructured":"Hagan, M.T., Menhaj, M.B.: Training Feedforward Networks with the Marquardt Algorithm. IEEE Transactions on Neural Networks\u00a05(6), 989\u2013993 (1994)","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"9","key":"21_CR17","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T. Kohonen","year":"1990","unstructured":"Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE\u00a078(9), 1464\u20131480 (1990)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR18","volume-title":"Introduction to Radial Basis Function Networks","author":"M.J.L. Orr","year":"1996","unstructured":"Orr, M.J.L.: Introduction to Radial Basis Function Networks. Center for Cognitive Science, UK (1996)"},{"key":"21_CR19","unstructured":"Becchetti, L., Castillo, C., Donato, D., Leonardi, S., Baeza-Yates, R.: Using Rank Propagation and Probabilistic Counting for Link-Based Spam Detection. In: Workshop on Web Mining and Web Usage Analysis (WebKDD 2006), pp. 1\u201310. ACM (2006)"},{"issue":"422","key":"21_CR20","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1080\/01621459.1993.10476299","volume":"88","author":"J. Shao","year":"1993","unstructured":"Shao, J.: Linear Model Selection by Cross-Validation. Journal of the American Statistical Association\u00a088(422), 486\u2013494 (1993)","journal-title":"Journal of the American Statistical Association"},{"key":"21_CR21","volume-title":"Data Mining \u2013 Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining \u2013 Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence \u2013 IBERAMIA 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34654-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T16:09:57Z","timestamp":1700669397000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-34654-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346538","9783642346545"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34654-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}