{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:03Z","timestamp":1775470383619,"version":"3.50.1"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61702320"],"award-info":[{"award-number":["61702320"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801285"],"award-info":[{"award-number":["61801285"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802247"],"award-info":[{"award-number":["61802247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s10489-020-01764-7","type":"journal-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T13:03:47Z","timestamp":1592226227000},"page":"3554-3569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Identifying ground truth in opinion spam: an empirical survey based on review psychology"],"prefix":"10.1007","volume":"50","author":[{"given":"Jiandun","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaogang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pengpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dingyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"1764_CR1","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. WSDM\u201908: the (2008) international conference on web search and data mining.&nbsp;ACM, New York, pp 219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"1764_CR2","doi-asserted-by":"crossref","unstructured":"Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. Proceedings of the 21st international conference on World Wide Web - WWW '12.&nbsp;ACM, New York, pp 201\u2013210","DOI":"10.1145\/2187836.2187864"},{"issue":"2","key":"1764_CR3","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.neucom.2018.04.074","volume":"309","author":"EF Cardoso","year":"2018","unstructured":"Cardoso EF, Silva RM, Almeida TA (2018) Towards automatic filtering of fake reviews. Neurocomputing 309(2):106\u2013116","journal-title":"Neurocomputing"},{"key":"1764_CR4","doi-asserted-by":"crossref","first-page":"42934","DOI":"10.1109\/ACCESS.2019.2908495","volume":"7","author":"Y Ren","year":"2019","unstructured":"Ren Y, Ji D (2019) Learning to detect deceptive opinion spam: A survey. IEEE Access 7:42934\u201342945","journal-title":"IEEE Access"},{"key":"1764_CR5","doi-asserted-by":"crossref","unstructured":"Vidanagama DU, Silva TP (2019) Karunananda AS Deceptive consumer review detection: A survey. Artif Intell Rev :1\u201330","DOI":"10.1007\/s10462-019-09697-5"},{"key":"1764_CR6","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2007) Analyzing and detecting review spam. Seventh IEEE International Conference on Data Mining (ICDM 2007).&nbsp;IEEE,&nbsp;Omaha, pp 547\u2013552","DOI":"10.1109\/ICDM.2007.68"},{"key":"1764_CR7","unstructured":"Anderson E, Simester D (2013) Deceptive reviews: The influential tail"},{"key":"1764_CR8","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/978-3-319-10422-5_38","volume":"570","author":"P De Meo","year":"2015","unstructured":"De Meo P, Messina F, Rosaci D, Sarn\u00e8 GM (2015) L. 2d-socialnetworks:Away to virally distribute popular information avoiding spam. Stud Comput Intell 570:369\u2013375","journal-title":"Stud Comput Intell"},{"key":"1764_CR9","doi-asserted-by":"crossref","first-page":"1555","DOI":"10.1016\/j.eswa.2007.08.062","volume":"35","author":"D-H Shih","year":"2008","unstructured":"Shih D-H, Chiang H-S, Lin B (2008) Collaborative spam filtering with heterogeneous agents. Expert Syst Appl 35:1555\u20131566","journal-title":"Expert Syst Appl"},{"key":"1764_CR10","unstructured":"Somayeh S et al (2013) Detecting deceptive reviews using lexical and syntactic features. In: 13th International Conference on Intellient Systems Design and Applications"},{"key":"1764_CR11","doi-asserted-by":"crossref","unstructured":"Duhan N, Divya; Mittal M (2017) Opinion mining using ontological spam detection. In: 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (Ictus), pp 557\u2013562","DOI":"10.1109\/ICTUS.2017.8286071"},{"key":"1764_CR12","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B, Lim E-P (2010) Finding unusual review patterns using unexpected rules. In: The 19th ACM international conference on Information and knowledge management,&nbsp;ACM, New York,&nbsp; pp 1549\u20131552","DOI":"10.1145\/1871437.1871669"},{"key":"1764_CR13","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013) Spotting opinion spammers using behavioral footprints. KDD\u201913. Chicago, Illinois, USA, pp 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"1764_CR14","doi-asserted-by":"crossref","first-page":"8650","DOI":"10.1016\/j.eswa.2015.07.019","volume":"42","author":"D Savage","year":"2015","unstructured":"Savage D, Zhang XZ, Yu XH, Chou P, Wang QM (2015) Detection of opinion spam based on anomalous rating deviation. Expert Syst Appl 42:8650\u20138657","journal-title":"Expert Syst Appl"},{"key":"1764_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tele.2019.01.009","volume":"38","author":"L Zhang","year":"2019","unstructured":"Zhang L, Wang S-F, Lin Z-Z, Wu Y (2019) Online ballot stuffing: Influence of self-boosting manipulation on rating dynamics in online rating systems. Telematics Inform 38:1\u201312","journal-title":"Telematics Inform"},{"key":"1764_CR16","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N (2013) What yelp fake review filter might be doing. In: The Seventh International AAAI Conference on Weblogs and Social Media,&nbsp;AAAI, Menlo Park, pp 409\u2013418"},{"issue":"2011","key":"1764_CR17","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.dss.2010.08.013","volume":"50","author":"N Hu","year":"2011","unstructured":"Hu N, Bose I, Gao Y, Liu L (2011) Manipulation in digital word-of-mouth: A reality check for book reviews. Decis Support Syst 50(2011):627\u2013635","journal-title":"Decis Support Syst"},{"key":"1764_CR18","doi-asserted-by":"crossref","unstructured":"Mayzlin D, Dover Y, Chevalier J (2014) Promotional reviews: An empirical investigation of online review manipulation. Am Econ&amp;nbsp;Rev 104:8","DOI":"10.1257\/aer.104.8.2421"},{"key":"1764_CR19","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari A, Tavakoli Ma, Salim N, Heydari Z (2015) Detection of review spam: A survey. Expert Syst Appl 42:3634\u20133642","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1764_CR20","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10844-017-0454-7","volume":"50","author":"RK Dewang","year":"2018","unstructured":"Dewang RK, Singh AK (2018) State-of-art approaches for review spammer detection: A survey. J Intell Inf Syst 50(2):231\u2013264","journal-title":"J Intell Inf Syst"},{"issue":"2017","key":"1764_CR21","first-page":"946","volume":"4","author":"L Li","year":"2018","unstructured":"Li L, Qin B, Liu T (2018) Survey on fake review detection research. Chin J Comput 4(2017):946\u2013968","journal-title":"Chin J Comput"},{"key":"1764_CR22","doi-asserted-by":"crossref","first-page":"987","DOI":"10.3390\/app9050987","volume":"9","author":"N Hussain","year":"2019","unstructured":"Hussain N, Turab Mirza H, Rasool G, Hussain I, Kaleem M (2019) Spam review detection techniques: A systematic literature review. Appl Sci 9:987","journal-title":"Appl Sci"},{"key":"1764_CR23","doi-asserted-by":"crossref","unstructured":"Crawford M, Khoshgoftaar TM, Prusa JD, Richter AN, Al Najada H (2015) Survey of review spam detection using machine learning techniques. J&amp;nbsp; Big Data 2:1","DOI":"10.1186\/s40537-015-0029-9"},{"key":"1764_CR24","doi-asserted-by":"crossref","unstructured":"Ahmad S, Pathak A, Jaiswal S (2018) A survey about spam detection and analysis using users\u2019 reviews. Malay J Matematik S(1):1\u20134","DOI":"10.26637\/MJM0S01\/01"},{"key":"1764_CR25","unstructured":"Dou Y (2019) A review of recent advance in online spam detection"},{"key":"1764_CR26","doi-asserted-by":"crossref","unstructured":"Wang Qianqian LB, Wenchang S, Zhaohui L, Wei S. (2010) Detecting spam comments with malicious users\u2019 behavioral characteristics. In: ICITIS2010: 2010 IEEE International Conference on Information Theory and Information Security. IEEE, pp 563\u2013567","DOI":"10.1109\/ICITIS.2010.5689532"},{"key":"1764_CR27","first-page":"6","volume":"44","author":"E Dichter","year":"1966","unstructured":"Dichter E (1966) How word-of-mouth advertising works. Harvard Bus Rev 44:6","journal-title":"Harvard Bus Rev"},{"key":"1764_CR28","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1177\/002224296903300303","volume":"33","author":"JF Engel","year":"1969","unstructured":"Engel JF, Kegerreis RJ, Blackwell RD (1969) Word-of-mouth communication by the innovator. J Mark 33:15\u201319","journal-title":"J Mark"},{"key":"1764_CR29","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1080\/096525498346658","volume":"6","author":"FA Buttle","year":"1998","unstructured":"Buttle FA (1998) Word of mouth: Understanding and managing referral marketing. J Strateg Mark 6:241\u2013254","journal-title":"J Strateg Mark"},{"key":"1764_CR30","first-page":"1","volume":"25","author":"DS Sundaram","year":"1998","unstructured":"Sundaram DS, Mitra K, Webster C (1998) Word-of-mouth communications: A motivational analysis. ACR N Am Adv 25:1","journal-title":"ACR N Am Adv"},{"issue":"1","key":"1764_CR31","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1002\/dir.10073","volume":"18","author":"T Hennig-Thurau","year":"2004","unstructured":"Hennig-Thurau T, Gwinner KP, Walsh G, Gremler DD (2004) Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the internet? J Interact Mark 18(1):38\u201352","journal-title":"J Interact Mark"},{"key":"1764_CR32","unstructured":"Dellarocas C, Narayan R (2006) What motivates consumers to review a product online? A study of the product-specific antecedents of online movie reviews. WISE"},{"key":"1764_CR33","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1509\/jm.74.2.133","volume":"74","author":"F Zhu","year":"2010","unstructured":"Zhu F, Zhang X (2010) Impact of online consumer reviews on sales:The moderating role of product and consumer characteristics. J Mark 74:133\u2013148","journal-title":"J Mark"},{"issue":"3","key":"1764_CR34","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1080\/10864415.2001.11044212","volume":"5","author":"S Balasubramanian","year":"2001","unstructured":"Balasubramanian S, Mahajan V (2001) The economic leverage of the virtual community. International journal of electronic commerce 5(3):103\u2013138","journal-title":"International journal of electronic commerce"},{"key":"1764_CR35","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1086\/209223","volume":"16","author":"RL Oliver","year":"1989","unstructured":"Oliver RL, Swan JE (1989) Equity and disconfirmation perceptions as influences on merchant and product satisfaction. Journal of consumer research 16:372\u2013383","journal-title":"Journal of consumer research"},{"key":"1764_CR36","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1177\/0146167292183004","volume":"18","author":"A Mark","year":"1992","unstructured":"Mark A, James B, Jeffrey G, Ml K, Jon M, Heather S, Robin S (1992) Complaining behavior in social interaction. Personality social psychology bulletin 18:286\u2013295","journal-title":"Personality social psychology bulletin"},{"issue":"1","key":"1764_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/h0029607","volume":"35","author":"L Berkowitz","year":"1970","unstructured":"Berkowitz L (1970) Experimental investigations of hostility catharsis. J Consult Clin Psychol 35(1):1\u20137","journal-title":"J Consult Clin Psychol"},{"key":"1764_CR38","doi-asserted-by":"crossref","unstructured":"Leibenstein H (1950) Bandwagon, snob, and veblen effects in the theory of consumers' demand. Q J Econ 64:183\u2013207","DOI":"10.2307\/1882692"},{"key":"1764_CR39","unstructured":"Shyam SS, Oeldorf-Hirsch A, Xu Q (2008) The bandwagon effect of collaborative filtering technology. In: CHI'08: CHI'08 extended abstracts on Human factors in computing systems. ACM, New York, pp 3453\u20133458"},{"key":"1764_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/1467-937X.00074","volume":"66","author":"M Eric","year":"1999","unstructured":"Eric M (1999) Nash equilibrium and welfare optimality. Rev Econ Stud 66:1","journal-title":"Rev Econ Stud"},{"issue":"3","key":"1764_CR41","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1002\/bdm.3960010303","volume":"1","author":"F Deborah","year":"1988","unstructured":"Deborah F, Baron J (1988) Ambiguity and rationality. J Behav Decis Mak 1(3):149\u2013157","journal-title":"J Behav Decis Mak"},{"key":"1764_CR42","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1177\/0146167202286008","volume":"28","author":"EL Pronin","year":"2002","unstructured":"Pronin EL, Daniel Y, Ross (2002) Lee. The bias blind spot: Perceptions of bias in self versus others. Pers Soc Psychol Bull 28:369\u2013381","journal-title":"Pers Soc Psychol Bull"},{"key":"1764_CR43","doi-asserted-by":"crossref","unstructured":"Schein AI, Popescul A, Ungar LH, Pennock DM (2002) Methods and metrics for cold-start recommendations. In: Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, New York","DOI":"10.1145\/564376.564421"},{"key":"1764_CR44","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhou W (2016) Can you really make profit from online rating manipulations?: An empirical study (2016). In: IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, Atlanta, pp 509\u2013518","DOI":"10.1109\/COMPSAC.2016.77"},{"key":"1764_CR45","doi-asserted-by":"crossref","first-page":"683","DOI":"10.2307\/1229439","volume":"51","author":"T Kuran","year":"1998","unstructured":"Kuran T, Sunstein CR (1998) Availability cascades and risk regulation. Stan L Rev 51:683","journal-title":"Stan L Rev"},{"key":"1764_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-018-20784-5","volume":"8","author":"DJ Carragher","year":"2018","unstructured":"Carragher DJ, Lawrence BJ, Thomas NA, Nicholls ME (2018) R. Visuospatial asymmetries do not modulate the cheerleader effect. Sci Rep 8:1","journal-title":"Sci Rep"},{"key":"1764_CR47","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.paid.2019.05.004","volume":"147","author":"J McDowell","year":"2019","unstructured":"McDowell J, Starratt VG (2019) Experimental examination and extension of the cheerleader effect. Personality Individ Differ 147:245\u2013249","journal-title":"Personality Individ Differ"},{"issue":"1","key":"1764_CR48","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1177\/002224379303000105","volume":"30","author":"BA Bickart","year":"1993","unstructured":"Bickart BA (1993) Carryover and backfire effects in marketing research. Journal of Marketing research 30(1):52\u201362","journal-title":"Journal of Marketing research"},{"key":"1764_CR49","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1037\/0022-3514.73.3.437","volume":"73","author":"F Strack","year":"1997","unstructured":"Strack F, Mussweiler T (1997) Explaining the enigmatic anchoring effect: Mechanisms of selective accessibility. J Personal Soc Psychol 73:437","journal-title":"J Personal Soc Psychol"},{"key":"1764_CR50","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0010-0285(73)90033-9","volume":"5","author":"A Tversky","year":"1973","unstructured":"Tversky A, Kahneman D, Availability (1973) A heuristic for judging frequency and probability. Cogn Psychol 5:207\u2013232","journal-title":"Cogn Psychol"},{"key":"1764_CR51","doi-asserted-by":"crossref","unstructured":"Burgoon JK, Blair JP, Qin T, Nunamaker JF Jr (2003) Detecting deception through linguistic analysis. Intelligence and Security Informatics","DOI":"10.1007\/3-540-44853-5_7"},{"issue":"3","key":"1764_CR52","first-page":"211","volume":"44","author":"M Bar-Hillel","year":"1980","unstructured":"Bar-Hillel M (1980) The base-rate fallacy in probability judgments. Acta Physiol (Oxf) 44(3):211\u2013233","journal-title":"Acta Physiol (Oxf)"},{"key":"1764_CR53","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/3056563","volume":"11","author":"B Hooi","year":"2017","unstructured":"Hooi B, Shin K, Song HA, Beutel A, Shah N, Faloutsos C (2017) Graph-based fraud detection in the face of camouflage. ACM Trans Knowl Discov Data 11:4","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1764_CR54","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. In: The 49th annual meeting of the association for computational linguistics: Human language technologies-vol 1. Association for Computational Linguistics, Stroudsburg, pp 309\u2013319"},{"key":"1764_CR55","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1287\/isre.1070.0154","volume":"19","author":"X Li","year":"2008","unstructured":"Li X, Hitt LM (2008) Self-selection and information role of online product reviews. Inf Syst Res 19:456\u2013474","journal-title":"Inf Syst Res"},{"key":"1764_CR56","doi-asserted-by":"crossref","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca M, Zervas G (2016) Fake it till you make it: Reputation, competition, and yelp review fraud. Manag Sci 62:3412\u20133427","journal-title":"Manag Sci"},{"issue":"5","key":"1764_CR57","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1177\/0146167203029005010","volume":"29","author":"ML Newman","year":"2003","unstructured":"Newman ML, Pennebaker JW, Berry DS, Richards JM (2003) Lying words: Predicting deception from linguistic styles. Pers Soc Psychol Bull 29(5):665\u2013675","journal-title":"Pers Soc Psychol Bull"},{"key":"1764_CR58","doi-asserted-by":"crossref","unstructured":"Zhou L (2003) An exploratory study into deception detection in text-based computer-mediated communication. In: The 36th Annual Hawaii International Conference on System Sciences. IEEE, Big Island, pp 1\u201310","DOI":"10.1109\/HICSS.2003.1173793"},{"issue":"4","key":"1764_CR59","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1509\/jmr.11.0538","volume":"50","author":"Erict Anderson","year":"2013","unstructured":"Anderson Erict (2013) Advertising in a competitive market: The role of product standards, customer learning, and switching costs. J Mark Res 50(4):489\u2013504","journal-title":"J Mark Res"},{"key":"1764_CR60","doi-asserted-by":"crossref","unstructured":"Mukherjee S, Dutta S, Weikum G (2016) Credible review detection with limited information using consistency features. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Berlin, pp 195\u2013213","DOI":"10.1007\/978-3-319-46227-1_13"},{"key":"1764_CR61","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/ACCESS.2017.2655032","volume":"5","author":"JK Rout","year":"2017","unstructured":"Rout JK, Dalmia A, Choo KKR, Bakshi S, Jena SK (2017) Revisiting semi-supervised learning for online deceptive review detection. IEEE Access 5:1319\u20131327","journal-title":"IEEE Access"},{"key":"1764_CR62","doi-asserted-by":"crossref","unstructured":"Xie S, Wang G, Lin S, Yu PS (2012) Review spam detection via temporal pattern discovery. In: KDD\u201912: the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, New York, pp 823\u2013831","DOI":"10.1145\/2339530.2339662"},{"key":"1764_CR63","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.eswa.2018.06.028","volume":"112","author":"Y Liu","year":"2018","unstructured":"Liu Y, Pang B (2018) A unified framework for detecting author spamicity by modeling review deviation. Expert Syst Appl 112:148\u2013155","journal-title":"Expert Syst Appl"},{"key":"1764_CR64","doi-asserted-by":"crossref","unstructured":"Lim E-P, Nguyen V-A, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on Information and knowledge management. ACM, New York","DOI":"10.1145\/1871437.1871557"},{"key":"1764_CR65","unstructured":"Feng S, Xing L, Gogar A, Choi Y (2012) Distributional footprints of deceptive product reviews. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"1764_CR66","unstructured":"Li H (2016) Modeling review spam using temporal patterns and co-bursting behaviors. arXiv:1611.06625v1"},{"key":"1764_CR67","doi-asserted-by":"crossref","unstructured":"G\u00fcnnemann S, G\u00fcnnemann N, Faloutsos C (2014) Detecting anomalies in dynamic rating data: A robust probabilistic model for rating evolution. In: The 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, New York, pp 841\u2013850","DOI":"10.1145\/2623330.2623721"},{"key":"1764_CR68","doi-asserted-by":"crossref","unstructured":"G\u00fcnnemann N, G\u00fcnnemann S, Faloutsos C (2014) Robust multivariate autoregression for anomaly detection in dynamic product ratings. In: WWW\u201914: the 23rd international conference on World wide web. ACM, New York, pp 361\u2013372","DOI":"10.1145\/2566486.2568008"},{"key":"1764_CR69","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. In: The Seventh International AAAI Conference on Weblogs and Social Media"},{"key":"1764_CR70","doi-asserted-by":"crossref","unstructured":"Wu F, Huberman BA (2008) How public opinion forms. In: International Workshop on Internet and Network Economics. Springer, Berlin, pp 334\u2013341","DOI":"10.1007\/978-3-540-92185-1_39"},{"issue":"3","key":"1764_CR71","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1287\/mksc.1110.0653","volume":"31","author":"D Godes","year":"2012","unstructured":"Godes D, Silva JC (2012) Sequential and temporal dynamics of online opinion. Mark Sci 31(3):448\u2013473","journal-title":"Mark Sci"},{"key":"1764_CR72","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: WWW 2012: the 21st international conference on World Wide Web. ACM, New York, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"1764_CR73","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.1109\/ACCESS.2017.2784370","volume":"6","author":"L Zhang","year":"2018","unstructured":"Zhang L, Wu Z, Cao J (2018) Detecting spammer groups from product reviews: A partially supervised learning model. IEEE Access 6:2559\u20132568","journal-title":"IEEE Access"},{"key":"1764_CR74","doi-asserted-by":"crossref","unstructured":"Li Q, Wu Q, Zhu C, Zhang J, Zhao W (2019) Unsupervised user behavior representation for fraud review detection with cold-start problem. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Cham, pp 222\u2013236","DOI":"10.1007\/978-3-030-16148-4_18"},{"key":"1764_CR75","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.knosys.2019.04.012","volume":"178","author":"Y Xu","year":"2019","unstructured":"Xu Y, Zhang F (2019) Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowl-Based Syst 178:25\u201347","journal-title":"Knowl-Based Syst"},{"key":"1764_CR76","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.ins.2019.10.067","volume":"513","author":"NH Aghdam","year":"2020","unstructured":"Aghdam NH, Ashtiani M, Azgomi MA (2020) An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks. Inf Sci 513:465\u2013503","journal-title":"Inf Sci"},{"key":"1764_CR77","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.knosys.2016.08.019","volume":"111","author":"C Jiang","year":"2016","unstructured":"Jiang C, Liu S, Lin Z, Zhao G, Duan R, Liang K (2016) Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networks. Knowl-Based Syst 111:237\u2013247","journal-title":"Knowl-Based Syst"},{"key":"1764_CR78","doi-asserted-by":"crossref","unstructured":"Wu G, Greene D, Smyth B, Cunningham P (2010) Distortion as a validation criterion in the identification of suspicious reviews","DOI":"10.1145\/1964858.1964860"},{"key":"1764_CR79","doi-asserted-by":"crossref","unstructured":"Kakhki AM, Kliman-Silver C, Mislove A (2013) Iolaus: Securing online content rating systems. In: The 22nd international conference on World Wide Web.ACM, New York, pp 919\u2013930","DOI":"10.1145\/2488388.2488468"},{"key":"1764_CR80","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1287\/mksc.1050.0137","volume":"25","author":"D Mayzlin","year":"2006","unstructured":"Mayzlin D (2006) Promotional chat on the internet. Mark Sci 25:2","journal-title":"Mark Sci"},{"key":"1764_CR81","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781"},{"key":"1764_CR82","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1016\/j.future.2018.04.059","volume":"86","author":"W Chang","year":"2018","unstructured":"Chang W, Xu Z, Zhou S, Cao W (2018) Research on detection methods based on doc2vec abnormal comments. Futur Gener Comput Syst 86:656\u2013662","journal-title":"Futur Gener Comput Syst"},{"key":"1764_CR83","unstructured":"Vrij A (2008) Detecting lies and deceit: Pitfalls and opportunities. Wiley, Hoboken"},{"key":"1764_CR84","doi-asserted-by":"crossref","unstructured":"Wang X, Liu K, Zhao J (2017) Handling cold-start problem in review spam detection by jointly embedding texts and behaviors. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (vol 1: Long Papers)","DOI":"10.18653\/v1\/P17-1034"},{"key":"1764_CR85","doi-asserted-by":"crossref","unstructured":"McAuley J, Targett C, Shi Q, van den Hengel A. (2015) Image-based recommendations on styles and substitutes. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR '15, pp 43\u201352","DOI":"10.1145\/2766462.2767755"},{"issue":"3","key":"1764_CR86","first-page":"637","volume":"18","author":"XW Liao","year":"2017","unstructured":"Liao XW, Xu XT, Pan JS, Chen GL (2017) Detect online review spammers based on comprehensive trustiness propagation model. J Internet Technol 18(3):637\u2013644","journal-title":"J Internet Technol"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-01764-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-020-01764-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-01764-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T18:07:10Z","timestamp":1666980430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-020-01764-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":86,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["1764"],"URL":"https:\/\/doi.org\/10.1007\/s10489-020-01764-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"11 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}