{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:33:19Z","timestamp":1726043599855},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811501043"},{"type":"electronic","value":"9789811501050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0105-0_6","type":"book-chapter","created":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T15:02:36Z","timestamp":1567263756000},"page":"76-91","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Socially-Attentive Representation Learning for Cold-Start Fraud Review Detection"],"prefix":"10.1007","author":[{"given":"Qiaobo","family":"Da","sequence":"first","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,1]]},"reference":[{"key":"6_CR1","first-page":"1","volume":"2018","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Li, M., Tang, X., Sheng, V.S., Liu, Y., Guo, W.: Flow correlation degree optimization driven random forest for detecting ddos attacks in cloud computing. Secur. Commun. Netw. 2018, 1\u201314 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"6_CR2","first-page":"095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC-Comput. Mater. Continua 55(1), 095 (2018)","journal-title":"CMC-Comput. Mater. Continua"},{"key":"6_CR3","first-page":"1","volume":"2018","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Zhang, C., Tang, X., Sheng, V.S., Dong, Z., Li, J.: Adaptive DDoS attack detection method based on multiple-Kernel learning. Secur. Commun. Netw. 2018, 1\u201319 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"6_CR4","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1093\/comjnl\/bxy025","volume":"61","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Zhou, J., Liu, Q., Tang, X., Guo, Y.: A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput. J. 61(7), 959\u2013970 (2018)","journal-title":"Comput. J."},{"key":"6_CR5","unstructured":"Dehghani, M., Gouws, S., Vinyals, O., Uszkoreit, J., Kaiser, \u0141.: Universal transformers. In: ICLR (2019)"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/3056563","volume":"11","author":"B Hooi","year":"2017","unstructured":"Hooi, B., Shin, K., Song, H.A., Beutel, A., Shah, N., Faloutsos, C.: Graph-based fraud detection in the face of camouflage. TKDD 11(4), 44 (2017)","journal-title":"TKDD"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: ACM SIGKDD, pp. 895\u2013904. ACM (2016)","DOI":"10.1145\/2939672.2939747"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hovy, D.: The enemy in your own camp: how well can we detect statistically-generated fake reviews-an adversarial study. In: ACL, vol. 2, pp. 351\u2013356 (2016)","DOI":"10.18653\/v1\/P16-2057"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: WSDM, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"6_CR10","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Z., Liu, B., Wei, X., Shao, J.: Spotting fake reviews via collective positive-unlabeled learning. In: ICDM, pp. 899\u2013904. IEEE (2014)","DOI":"10.1109\/ICDM.2014.47"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634\u2013637 (2015)","DOI":"10.1609\/icwsm.v9i1.14652"},{"key":"6_CR13","unstructured":"Li, H., et al.: Modeling review spam using temporal patterns and co-bursting behaviors. arXiv preprint arXiv:1611.06625 (2016)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-16148-4_18","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Q Li","year":"2019","unstructured":"Li, Q., Wu, Q., Zhu, C., Zhang, J., Zhao, W.: Unsupervised user behavior representation for fraud review detection with cold-start problem. In: Yang, Q., Zhou, Z.-H., Gong, Z., Zhang, M.-L., Huang, S.-J. (eds.) PAKDD 2019. LNCS, vol. 11439, pp. 222\u2013236. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16148-4_18"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., Leung, V.C.M.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (2018)","journal-title":"IEEE Access"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Liu, S., Hooi, B., Faloutsos, C.: Holoscope: topology-and-spike aware fraud detection. In: CIKM, pp. 1539\u20131548. ACM (2017)","DOI":"10.1145\/3132847.3133018"},{"issue":"12","key":"6_CR17","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca, M., Zervas, G.: Fake it till you make it: reputation, competition, and Yelp review fraud. Manag. Sci. 62(12), 3412\u20133427 (2016)","journal-title":"Manag. Sci."},{"issue":"11","key":"6_CR18","first-page":"2579","volume":"9","author":"L Maaten van der","year":"2008","unstructured":"van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. JMLR 9(11), 2579\u20132605 (2008)","journal-title":"JMLR"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., et al.: Spotting opinion spammers using behavioral footprints. In: ACM SIGKDD, pp. 632\u2013640. ACM (2013)","DOI":"10.1145\/2487575.2487580"},{"key":"6_CR20","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.: Fake review detection: classification and analysis of real and pseudo reviews. Technical report, Technical report UIC-CS-2013-03, University of Illinois at Chicago (2013)"},{"key":"6_CR21","unstructured":"Mukherjee, A., Venkataraman, V., Liu, B., Glance, N.S.: What yelp fake review filter might be doing? In: ICWSM (2013)"},{"key":"6_CR22","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: ACL HLT, pp. 309\u2013319. Association for Computational Linguistics (2011)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: EMNLP, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: ACM SIGKDD, pp. 985\u2013994. ACM (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"6_CR25","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NIPS, pp. 5998\u20136008 (2017)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Wang, X., Liu, K., Zhao, J.: Handling cold-start problem in review spam detection by jointly embedding texts and behaviors. In: ACL, vol. 1, pp. 366\u2013376 (2017)","DOI":"10.18653\/v1\/P17-1034"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-23528-8_17","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"J Ye","year":"2015","unstructured":"Ye, J., Akoglu, L.: Discovering opinion spammer groups by network footprints. In: Appice, A., Rodrigues, P.P., Santos Costa, V., Soares, C., Gama, J., Jorge, A. (eds.) ECML PKDD 2015. LNCS, vol. 9284, pp. 267\u2013282. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23528-8_17"},{"key":"6_CR28","unstructured":"You, Z., Qian, T., Liu, B.: An attribute enhanced domain adaptive model for cold-start spam review detection. In: COLING, pp. 1884\u20131895 (2018)"},{"issue":"7","key":"6_CR29","first-page":"1254","volume":"30","author":"C Zhu","year":"2018","unstructured":"Zhu, C., Cao, L., Liu, Q., Yin, J., Kumar, V.: Heterogeneous metric learning of categorical data with hierarchical couplings. TKDE 30(7), 1254\u20131267 (2018)","journal-title":"TKDE"}],"container-title":["Communications in Computer and Information Science","Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0105-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T18:31:59Z","timestamp":1695148319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0105-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811501043","9789811501050"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0105-0_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCTCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Conference of Theoretical Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lanzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nctcs2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nctcs2019.lzu.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}