{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T23:10:03Z","timestamp":1751238603579,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811073588"},{"type":"electronic","value":"9789811073595"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-7359-5_14","type":"book-chapter","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T06:13:47Z","timestamp":1516342427000},"page":"144-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Spammers in Sina Micro-blog Based on Multiple Features"],"prefix":"10.1007","author":[{"given":"Zhenwei","family":"Gao","sequence":"first","affiliation":[]},{"given":"Mingwei","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Du","sequence":"additional","affiliation":[]},{"given":"Shimin","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,20]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Fu, H., Xie, X., Rui, Y.: Leveraging careful microblog users for spammer detection. In: International Conference on World Wide Web, pp. 419\u2013429. ACM (2015)","DOI":"10.1145\/2740908.2745400"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., et al.: Detecting product review spammers using rating behaviors. In: ACM International Conference on Information and Knowledge Management, pp. 939\u2013948. ACM (2010)","DOI":"10.1145\/1871437.1871557"},{"issue":"4","key":"14_CR3","first-page":"190","volume":"39","author":"F Ming","year":"2013","unstructured":"Ming, F., Yi, F.: A new intelligent recognition method of zombie fan. Comput. Eng. 39(4), 190\u2013193 (2013)","journal-title":"Comput. Eng."},{"issue":"2","key":"14_CR4","first-page":"250","volume":"31","author":"Z Xiying","year":"2014","unstructured":"Xiying, Z., Xin, C., Xianyun, T.: A recognition method of zombie fans on micro-blog user\u2019s behavior. J. Nat. Sci. Heilongjiang Univ. 31(2), 250\u2013254 (2014)","journal-title":"J. Nat. Sci. Heilongjiang Univ."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Gao, S., Ma, X., Wang, L., et al.: Spammer detection based on comprehensive features in Sina Microblog. In: International Conference on Service Systems and Service Management, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICSSSM.2016.7538616"},{"issue":"1","key":"14_CR6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1504\/IJES.2016.073747","volume":"8","author":"Z Han","year":"2016","unstructured":"Han, Z., Yang, K., Xu, F., et al.: Probabilistic graphical model for detecting spammers in microblog websites. Int. J. Embed. Syst. 8(1), 12 (2016)","journal-title":"Int. J. Embed. Syst."},{"key":"14_CR7","unstructured":"Zhang, Y., Huang, Y., et al.: Weibo spammers\u2019 identification algorithm based on Bayesian model. J. Commun. 1(38) (2017)"},{"key":"14_CR8","unstructured":"Wang, B., Zubiaga, A., Liakata, M., et al.: Making the most of tweet inherent features for social spam detection on twitter. In: WWW Workshop on Making Sense of Microposts (2015)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Soman, S.J., Murugappan, S.: Detecting malicious tweets in trending topics using clustering and classification. In: International Conference on Recent Trends in Information Technology, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ICRTIT.2014.6996188"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: International Conference on World Wide Web, pp. 1189\u20131190 (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Draisbach, U., Naumann, F., Szott, S., et al.: Adaptive windows for duplicate detection. In: IEEE International Conference on Data Engineering, pp. 1073\u20131083. IEEE (2012)","DOI":"10.1109\/ICDE.2012.20"},{"issue":"4","key":"14_CR12","first-page":"456","volume":"49","author":"B Zhao","year":"2013","unstructured":"Zhao, B., Ji, G.L., Qu, W.G., et al.: Detecting microblog spammers based on reuse detection. J. Nanjing Univ. 49(4), 456\u2013464 (2013)","journal-title":"J. Nanjing Univ."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Ma, H., Qian, W., et al.: Duplicate detection for identifying social spam in microblogs. In: IEEE International Congress on Big Data, pp. 141\u2013148. IEEE (2013)","DOI":"10.1109\/BigData.Congress.2013.27"},{"issue":"1","key":"14_CR14","first-page":"117","volume":"30","author":"B Wu","year":"2015","unstructured":"Wu, B., Li, G., Liu, Y., Zhang, L., Wang, B.: Spammer detection based on duplicate microblog post. J. Data Acquis. Process. 30(1), 117\u2013125 (2015)","journal-title":"J. Data Acquis. Process."}],"container-title":["Communications in Computer and Information Science","Knowledge Graph and Semantic Computing. Language, Knowledge, and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7359-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T22:49:43Z","timestamp":1751237383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7359-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811073588","9789811073595"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7359-5_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}