{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:55:54Z","timestamp":1776682554371,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642374005","type":"print"},{"value":"9783642374012","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_14","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T00:03:25Z","timestamp":1363910605000},"page":"120-131","source":"Crossref","is-referenced-by-count":72,"title":["Detecting Event Rumors on Sina Weibo Automatically"],"prefix":"10.1007","author":[{"given":"Shengyun","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiaoyong","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Yang, F., Liu, Y., Yu, X., Yang, M.: Automatic detection of rumor on Sina Weibo. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, Beijing, China, pp. 1\u20137. ACM (2012)","DOI":"10.1145\/2350190.2350203"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Gao, H.Y., Hu, J., Wilson, C., Li, Z.C., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, Melbourne, Australia, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"14_CR3","unstructured":"Wang, A.H.: Don\u2019t follow me: Spam detection in Twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) (2010)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-13739-6_25","volume-title":"Data and Applications Security and Privacy XXIV","author":"A.H. Wang","year":"2010","unstructured":"Wang, A.H.: Detecting spam bots in online social networking sites: A machine learning approach. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol.\u00a06166, pp. 335\u2013342. Springer, Heidelberg (2010)"},{"key":"14_CR5","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting Spammers on Twitter. In: Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, Redmond, Washington, US (2010)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, Geneva, Switzerland, pp. 435\u2013442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C. Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 318\u2013337. Springer, Heidelberg (2011)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Goncalves, M.: Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, Boston, MA, USA, pp. 620\u2013627. ACM (2009)","DOI":"10.1145\/1571941.1572047"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, Beijing, China, pp. 45\u201352. ACM (2008)","DOI":"10.1145\/1451983.1451996"},{"key":"14_CR11","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer near You. In: Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, Mountain View, California, US (2008)"},{"issue":"1\/2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1023\/A:1009982220290","volume":"1","author":"Y. Yang","year":"1999","unstructured":"Yang, Y.: An Evaluation of Statistical Approaches to Text Categorization. Journal of Information Retrieval\u00a01(1\/2), 67\u201388 (1999)","journal-title":"Journal of Information Retrieval"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:46:22Z","timestamp":1557600382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}