{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T15:59:26Z","timestamp":1762531166421,"version":"build-2065373602"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T00:00:00Z","timestamp":1754352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T00:00:00Z","timestamp":1754352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10115-025-02542-y","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T17:19:43Z","timestamp":1754414383000},"page":"10581-10610","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deceptive reviewer group detection using self-adversarial variational autoencoder: a heterogeneous graph-based approach"],"prefix":"10.1007","volume":"67","author":[{"given":"Sushil Kumar","family":"Maurya","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,5]]},"reference":[{"key":"2542_CR1","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29:626\u2013688","journal-title":"Data Min Knowl Discov"},{"issue":"1","key":"2542_CR2","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1609\/icwsm.v11i1.14887","volume":"11","author":"L Wu","year":"2017","unstructured":"Wu L, Hu X, Morstatter F, Liu H (2017) Adaptive spammer detection with sparse group modeling. Proceedings of the international AAAI conference on web and social media 11(1):319\u2013326","journal-title":"Proceedings of the international AAAI conference on web and social media"},{"key":"2542_CR3","doi-asserted-by":"crossref","unstructured":"Lim E-P, Nguyen V-A, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on Information and knowledge management, pp 939\u2013948","DOI":"10.1145\/1871437.1871557"},{"key":"2542_CR4","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.ins.2020.03.063","volume":"526","author":"X Tang","year":"2020","unstructured":"Tang X, Qian T, You Z (2020) Generating behavior features for cold-start spam review detection with adversarial learning. Inf Sci 526:274\u2013288","journal-title":"Inf Sci"},{"key":"2542_CR5","doi-asserted-by":"publisher","first-page":"3475","DOI":"10.1007\/s00500-019-04107-y","volume":"24","author":"MZ Asghar","year":"2020","unstructured":"Asghar MZ, Ullah A, Ahmad S, Khan A (2020) Opinion spam detection framework using hybrid classification scheme. Soft Comput 24:3475\u20133498","journal-title":"Soft Comput"},{"key":"2542_CR6","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.eswa.2018.06.028","volume":"112","author":"Y Liu","year":"2018","unstructured":"Liu Y, Pang Bo (2018) A unified framework for detecting author spamicity by modeling review deviation. Expert Syst Appl 112:148\u2013155","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2542_CR7","first-page":"946","volume":"41","author":"L Li","year":"2018","unstructured":"Li L, Qin B, Liu T (2018) Survey on fake review detection research. Chin J Comput 41(4):946\u2013968","journal-title":"Chin J Comput"},{"key":"2542_CR8","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on World Wide Web, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"2542_CR9","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J (2015) Towards collusive fraud detection in online reviews. In: 2015 IEEE international conference on data mining. IEEE, pp 1051\u20131056","DOI":"10.1109\/ICDM.2015.62"},{"key":"2542_CR10","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining, pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"issue":"no. 6","key":"2542_CR11","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang Z, Hou T, Song D, Li Z, Kong T (2016) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861\u2013874","journal-title":"Comput J"},{"key":"2542_CR12","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1007\/s10489-018-1142-1","volume":"48","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Xu X (2018) Gslda: lda-based group spamming detection in product reviews. Appl Intell 48:3094\u20133107","journal-title":"Appl Intell"},{"key":"2542_CR13","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1007\/s10618-020-00693-w","volume":"34","author":"Z Wang","year":"2020","unstructured":"Wang Z, Hu R, Chen Q, Gao P, Xu X (2020) ColluEagle: collusive review spammer detection using Markov random fields. Data Min Knowl Discov 34:1621\u20131641","journal-title":"Data Min Knowl Discov"},{"issue":"no. 2","key":"2542_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/304181.304187","volume":"28","author":"M Ankerst","year":"1999","unstructured":"Ankerst M, Breunig MM, Kriegel H-P, Sander J (1999) Optics: ordering points to identify the clustering structure. ACM Sigmod Rec 28(2):49\u201360","journal-title":"ACM Sigmod Rec"},{"issue":"2","key":"2542_CR15","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s10489-022-03427-1","volume":"53","author":"SK Maurya","year":"2023","unstructured":"Maurya SK, Singh D, Maurya AK (2023) Deceptive opinion spam detection approaches: a literature survey. Appl Intell 53(2):2189\u20132234","journal-title":"Appl Intell"},{"key":"2542_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113465","volume":"156","author":"N Cao","year":"2020","unstructured":"Cao N, Ji S, Chiu DK, He M, Sun X (2020) A deceptive review detection framework: combination of coarse and fine-grained features. Expert Syst Appl 156:113465","journal-title":"Expert Syst Appl"},{"key":"2542_CR17","doi-asserted-by":"crossref","unstructured":"Wang J, Chen J, Zhang W (2023) A novel approach for fake review detection based on reviewing behavior and BERT fused with cosine similarity. In: International Symposium on Knowledge and Systems Sciences. Singapore: Springer Nature Singapore, pp 18\u201332","DOI":"10.1007\/978-981-99-8318-6_2"},{"issue":"1","key":"2542_CR18","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10660-020-09413-4","volume":"22","author":"S Saumya","year":"2022","unstructured":"Saumya S, Singh JP (2022) Spam review detection using LSTM autoencoder: an unsupervised approach. Electron Commer Res 22(1):113\u2013133","journal-title":"Electron Commer Res"},{"issue":"1","key":"2542_CR19","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1016\/j.jksuci.2019.10.002","volume":"34","author":"RM Saeed","year":"2022","unstructured":"Saeed RM, Rady S, Gharib TF (2022) An ensemble approach for spam detection in Arabic opinion texts. J King Saud Univ-Comput Inform Sci 34(1):1407\u20131416","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"2542_CR20","doi-asserted-by":"crossref","unstructured":"Narayan R, Rout JK, Jena SK (2018) Review spam detection using opinion mining. In: Progress in intelligent computing techniques: theory, practice, and applications: proceedings of ICACNI 2016, volume 2. Springer Singapore, pp 273\u2013279","DOI":"10.1007\/978-981-10-3376-6_30"},{"issue":"4","key":"2542_CR21","first-page":"1","volume":"2","author":"RY Lau","year":"2012","unstructured":"Lau RY, Liao SY, Kwok RCW, Xu K, Xia Y, Li Y (2012) Text mining and probabilistic language modeling for online review spam detection. ACM Trans Manag Inform Syst (TMIS) 2(4):1\u201330","journal-title":"ACM Trans Manag Inform Syst (TMIS)"},{"key":"2542_CR22","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.eswa.2018.07.005","volume":"114","author":"LY Dong","year":"2018","unstructured":"Dong LY, Ji SJ, Zhang CJ, Zhang Q, Chiu DW, Qiu LQ, Li D (2018) An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews. Expert Syst Appl 114:210\u2013223","journal-title":"Expert Syst Appl"},{"issue":"1","key":"2542_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2018.2880192","volume":"32","author":"G Giasemidis","year":"2018","unstructured":"Giasemidis G, Kaplis N, Agrafiotis I, Nurse JR (2018) A semi-supervised approach to message stance classification. IEEE Trans Knowl Data Eng 32(1):1\u201311","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2542_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.107023","volume":"101","author":"A Ligthart","year":"2021","unstructured":"Ligthart A, Catal C, Tekinerdogan B (2021) Analyzing the effectiveness of semi-supervised learning approaches for opinion spam classification. Appl Soft Comput 101:107023","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2542_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/info7010012","volume":"7","author":"W Zhang","year":"2016","unstructured":"Zhang W, Bu C, Yoshida T, Zhang S (2016) CoSpa: a co-training approach for spam review identification with support vector machine. Information 7(1):12","journal-title":"Information"},{"key":"2542_CR26","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.ins.2022.05.086","volume":"606","author":"F Zhang","year":"2022","unstructured":"Zhang F, Yuan S, Zhang P, Chao J, Yu H (2022) Detecting review spammer groups based on generative adversarial networks. Inf Sci 606:819\u2013836","journal-title":"Inf Sci"},{"key":"2542_CR27","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.ins.2020.05.084","volume":"536","author":"SJ Ji","year":"2020","unstructured":"Ji SJ, Zhang Q, Li J, Chiu DK, Xu S, Yi L, Gong M (2020) A burst-based unsupervised method for detecting review spammer groups. Inf Sci 536:454\u2013469","journal-title":"Inf Sci"},{"key":"2542_CR28","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Zhao X, Xu X (2018) Graph-based review spammer group detection. Knowl Inf Syst 55:571\u2013597","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"2542_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102140","volume":"57","author":"S Noekhah","year":"2020","unstructured":"Noekhah S, Salim N, Zakaria NH (2020) Opinion spam detection: using multi-iterative graph-based model. Inf Process Manag 57(1):102140","journal-title":"Inf Process Manag"},{"issue":"1","key":"2542_CR30","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s42400-023-00159-8","volume":"6","author":"Q Zhang","year":"2023","unstructured":"Zhang Q, Liang Z, Ji S, Xing B, Chiu DK (2023) Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. Cybersecurity 6(1):26","journal-title":"Cybersecurity"},{"key":"2542_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105520","volume":"193","author":"F Zhang","year":"2020","unstructured":"Zhang F, Hao X, Chao J, Yuan S (2020) Label propagation-based approach for detecting review spammer groups on e-commerce websites. Knowl-Based Syst 193:105520","journal-title":"Knowl-Based Syst"},{"key":"2542_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113911","volume":"166","author":"D Zhang","year":"2023","unstructured":"Zhang D, Li W, Niu B, Wu C (2023) A deep learning approach for detecting fake reviewers: exploiting reviewing behavior and textual information. Decis Support Syst 166:113911","journal-title":"Decis Support Syst"},{"key":"2542_CR33","doi-asserted-by":"crossref","unstructured":"Rangar KP, Khan A (2022) A machine learning model for spam reviews and spammer community detection. In: 2022 IEEE World Conference on Applied Intelligence and Computing (AIC). IEEE, pp 632\u2013638","DOI":"10.1109\/AIC55036.2022.9848811"},{"key":"2542_CR34","doi-asserted-by":"crossref","unstructured":"Dou Y, Ma G, Yu PS, Xie S (2020) Robust spammer detection by nash reinforcement learning. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 924\u2013933","DOI":"10.1145\/3394486.3403135"},{"key":"2542_CR35","doi-asserted-by":"crossref","unstructured":"Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. In: Machine learning and knowledge discovery in databases: European Conference, ECML PKDD 2015, Porto, Portugal, September 7\u201311, 2015, Proceedings, Part I 15. Springer International Publishing, pp 267\u2013282","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"2542_CR36","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J, Chang K, Long C (2013) Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM international conference on information & knowledge management, pp 979\u2013988","DOI":"10.1145\/2505515.2505700"},{"issue":"3","key":"2542_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103282","volume":"60","author":"F Zhang","year":"2023","unstructured":"Zhang F, Wu J, Zhang P, Ma R, Yu H (2023) Detecting collusive spammers with heterogeneous graph attention network. Inf Process Manag 60(3):103282","journal-title":"Inf Process Manag"},{"key":"2542_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117482","volume":"203","author":"F Zhang","year":"2022","unstructured":"Zhang F, Yuan S, Wu J, Zhang P, Chao J (2022) Detecting collusive spammers on e-commerce websites based on reinforcement learning and adversarial autoencoder. Expert Syst Appl 203:117482","journal-title":"Expert Syst Appl"},{"key":"2542_CR39","first-page":"1","volume":"2022","author":"J Chao","year":"2022","unstructured":"Chao J, Zhao C, Zhang F (2022) Network embedding-based approach for detecting collusive spamming groups on e-commerce platforms. Secur Commun Netw 2022:1\u201313","journal-title":"Secur Commun Netw"},{"key":"2542_CR40","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"2542_CR41","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"issue":"2","key":"2542_CR42","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TBDATA.2022.3177455","volume":"9","author":"X Wang","year":"2022","unstructured":"Wang X, Bo D, Shi C, Fan S, Ye Y, Philip SY (2022) A survey on heterogeneous graph embedding: methods, techniques, applications and sources. IEEE Trans Big Data 9(2):415\u2013436","journal-title":"IEEE Trans Big Data"},{"key":"2542_CR43","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114"},{"key":"2542_CR44","doi-asserted-by":"crossref","unstructured":"Xu G, Hu M, Ma C, Daneshmand M (2019) GSCPM: CPM-based group spamming detection in online product reviews. In:\u00a0ICC 2019\u20132019 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2019.8761650"},{"key":"2542_CR45","doi-asserted-by":"crossref","unstructured":"Rout JK, Sahoo KS, Dalmia A, Bakshi S, Bilal M, Song H (2023) Understanding large-scale network effects in detecting review spammers. IEEE Trans Comput Soc Syst","DOI":"10.1109\/TCSS.2023.3243139"},{"key":"2542_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119454","volume":"216","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Zhou M, Wan J, Lu K, Chen G, Liao H (2023) Spammer detection via ranking aggregation of group behavior. Expert Syst Appl 216:119454","journal-title":"Expert Syst Appl"},{"issue":"15","key":"2542_CR47","doi-asserted-by":"publisher","first-page":"45111","DOI":"10.1007\/s11042-023-17348-9","volume":"83","author":"SA Shinde","year":"2024","unstructured":"Shinde SA, Pawar RR, Jagtap AA, Tambewagh PA, Rajput PU, Mali MK, Mulik SV et al (2024) Deceptive opinion spam detection using bidirectional long short-term memory with capsule neural network. Multim Tools Appl 83(15):45111\u201345140","journal-title":"Multim Tools Appl"},{"issue":"3","key":"2542_CR48","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/TSMC.2022.3205365","volume":"53","author":"ZW Zhang","year":"2022","unstructured":"Zhang ZW, Liu ZG, Martin A, Zhou K (2022) BSC: belief shift clustering. IEEE Trans Syst Man Cybernet: Syst 53(3):1748\u20131760","journal-title":"IEEE Trans Syst Man Cybernet: Syst"},{"key":"2542_CR49","doi-asserted-by":"crossref","unstructured":"Maurya SK, Singh D (2025) Enhancing deceptive reviewer and review detection in e-commerce: analyzing ensemble attention-based deep learning models. Multim Tools Appl 1\u201332","DOI":"10.1007\/s11042-025-20922-y"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02542-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02542-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02542-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T15:52:01Z","timestamp":1762530721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02542-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,5]]},"references-count":49,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2542"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02542-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2025,8,5]]},"assertion":[{"value":"13 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not involve human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal participants"}},{"value":"There is no plagiarism.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}