{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:15:24Z","timestamp":1743099324473,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662490136"},{"type":"electronic","value":"9783662490143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-49014-3_50","type":"book-chapter","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T09:41:36Z","timestamp":1450863696000},"page":"563-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Recognition of Spam Microblog for TV Program Evaluation Under Mircoblog Platform"],"prefix":"10.1007","author":[{"given":"Fulian","family":"Yin","sequence":"first","affiliation":[]},{"given":"Xinran","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Chai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"key":"50_CR1","first-page":"1505","volume":"07","author":"Q Mo","year":"2014","unstructured":"Mo, Q., Yang, K.: Study on network navy recognition. Softw. J. 07, 1505\u20131526 (2014)","journal-title":"Softw. J."},{"issue":"1","key":"50_CR2","first-page":"84","volume":"24","author":"H Liu","year":"2010","unstructured":"Liu, H., Zhao, Y., Qin, B., Liu, T.: Comment target extraction and sentiment classification. J. Chin. Inf. Process. 24(1), 84\u201388 (2010)","journal-title":"J. Chin. Inf. Process."},{"key":"50_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669","volume-title":"Finding Unusual Review Patterns Using Unexpected Rules","author":"N Jindal","year":"2010","unstructured":"Jindal, N., Liu, B., Lim, E.P.: Finding Unusual Review Patterns Using Unexpected Rules. ACM Press, New York (2010)"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Wang, G., Xie, S., Liu, B., Yu, P.S.: Review graph based online store review spammer detection. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining, pp. 1242\u20131247 (2011)","DOI":"10.1109\/ICDM.2011.124"},{"key":"50_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2012.07.023","volume":"219","author":"T Song","year":"2013","unstructured":"Song, T., Pan, L., P\u0103un, Gh: Asynchronous spiking neural P systems with local synchronization. Inf. Sci. 219, 197\u2013207 (2013)","journal-title":"Inf. Sci."},{"issue":"4","key":"50_CR6","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1039621.1039625","volume":"3","author":"L Zhang","year":"2004","unstructured":"Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. Asian Lang. Inf. Process. 3(4), 243\u2013269 (2004)","journal-title":"Asian Lang. Inf. Process."},{"issue":"3","key":"50_CR7","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support vector machine. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"50_CR8","unstructured":"Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector or machines. In: Advances in Kernel Methods-Support Vector Learning. MIT Press (1998)"},{"key":"50_CR9","first-page":"53","volume":"11","author":"R Yu","year":"2013","unstructured":"Yu, R., Liu, C., Jin, X., Wang, Y., Cheng, X.: Chinese spam filtering based on multi angle of feature fusion. J. Shandong Univ. 11, 53\u201358 (2013)","journal-title":"J. Shandong Univ."}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing -- Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49014-3_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T22:57:29Z","timestamp":1559343449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49014-3_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662490136","9783662490143"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49014-3_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}