{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:03:38Z","timestamp":1761807818957},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40994-3_31","type":"book-chapter","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T13:07:10Z","timestamp":1377695230000},"page":"483-498","source":"Crossref","is-referenced-by-count":10,"title":["Detecting Marionette Microblog Users for Improved Information Credibility"],"prefix":"10.1007","author":[{"given":"Xian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ziming","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 851\u2013860 (2010)","DOI":"10.1145\/1772690.1772777"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Yu, L., Asur, S., Huberman, B.A.: Artificial inflation: The real story of trends in sina weibo (2012), \n                    \n                      http:\/\/www.hpl.hp.com\/research\/scl\/papers\/chinatrends\/weibospam.pdf","DOI":"10.1109\/SocialCom-PASSAT.2012.45"},{"key":"31_CR3","unstructured":"Bollen, J., Mao, H., Zeng, X.J.: Twitter mood predicts the stock market. CoRR abs\/1010.3003 (2010)"},{"issue":"1","key":"31_CR4","first-page":"321","volume":"16","author":"N.V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Int. Res.\u00a016(1), 321\u2013357 (2002)","journal-title":"J. Artif. Int. Res."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Kang, H., Wang, K., Soukal, D., Behr, F., Zheng, Z.: Large-scale bot detection for search engines. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 501\u2013510 (2010)","DOI":"10.1145\/1772690.1772742"},{"issue":"1","key":"31_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. SIGKDD Explor. Newsl.\u00a011(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Buehrer, G., Stokes, J.W., Chellapilla, K.: A large-scale study of automated web search traffic. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, AIRWeb 2008, pp. 1\u20138. ACM (2008)","DOI":"10.1145\/1451983.1451985"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Yu, F., Xie, Y., Ke, Q.: Sbotminer: large scale search bot detection. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM 2010 (2010)","DOI":"10.1145\/1718487.1718540"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, vol.\u00a030, pp. 576\u2013587. VLDB Endowment (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Wu, B., Davison, B.D.: Identifying link farm spam pages. Special interest tracks and posters of the 14th International Conference on World Wide Web, WWW 2005, pp. 820\u2013829 (2005)","DOI":"10.1145\/1062745.1062762"},{"key":"31_CR11","unstructured":"Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. In: AIRWeb 2006, pp. 37\u201340 (2006)"},{"key":"31_CR12","unstructured":"Benczur, A.A., Csalogany, K., Sarlos, T., Uher, M., Uher, M.: Spamrank - fully automatic link spam detection. In: Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web, AIRWeb (2005)"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, pp. 675\u2013684 (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012, pp. 61\u201370 (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"31_CR15","unstructured":"Wagner, C., Mitter, S., K\u00f6rner, C., Strohmaier, M.: When social bots attack: Modeling susceptibility of users in online social networks. In: 2nd Workshop on Making Sense of Microposts at WWW 2012 (2012)"},{"key":"31_CR16","unstructured":"Silvia Mitter, C.W., Strohmaier, M.: Understanding the impact of socialbot attacks in online social networks. In: WebSci, pp. 15\u201323 (2013)"},{"issue":"2","key":"31_CR17","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.comnet.2012.06.006","volume":"57","author":"Y. Boshmaf","year":"2013","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Design and analysis of a social botnet. Comput. Netw.\u00a057(2), 556\u2013578 (2013)","journal-title":"Comput. Netw."},{"key":"31_CR18","unstructured":"Reddy, R.N., Kumar, N.: Automatic detection of fake profiles in online social networks (2012), \n                    \n                      http:\/\/ethesis.nitrkl.ac.in\/3578\/1\/thesis.pdf"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012, pp. 71\u201380 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"31_CR20","unstructured":"Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Li, H., Yang, Q.: Discovering spammers in social networks. In: AAAI (2012)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40994-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T23:26:29Z","timestamp":1558049189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40994-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387081","9783642387098"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40994-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}