{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:07Z","timestamp":1775470387133,"version":"3.50.1"},"reference-count":138,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T00:00:00Z","timestamp":1651708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T00:00:00Z","timestamp":1651708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s10489-022-03427-1","type":"journal-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T14:18:58Z","timestamp":1651760338000},"page":"2189-2234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Deceptive opinion spam detection approaches: a literature survey"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0838-2491","authenticated-orcid":false,"given":"Sushil Kumar","family":"Maurya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2142-7631","authenticated-orcid":false,"given":"Dinesh","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9679-9045","authenticated-orcid":false,"given":"Ashish Kumar","family":"Maurya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,5]]},"reference":[{"key":"3427_CR1","doi-asserted-by":"crossref","unstructured":"Aghakhani H, Machiry A, Nilizadeh S, Kruegel C, Giovanni Vigna (2018) Detecting deceptive reviews using generative adversarial networks. In: 2018 IEEE security and privacy workshops (SPW), pp 89\u201395","DOI":"10.1109\/SPW.2018.00022"},{"key":"3427_CR2","doi-asserted-by":"crossref","unstructured":"Ahsan MNI, Nahian T, Kafi AA, Hossain MdI, Shah FM (2016) An ensemble approach to detect review spam using hybrid machine learning technique. In: 2016 19th International conference on computer and information technology (ICCIT). IEEE, pp 388\u2013394","DOI":"10.1109\/ICCITECHN.2016.7860229"},{"issue":"2\u201311","key":"3427_CR3","first-page":"29","volume":"13","author":"L Akoglu","year":"2013","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013) Opinion fraud detection in online reviews by network effects. ICWSM 13(2\u201311):29","journal-title":"ICWSM"},{"key":"3427_CR4","doi-asserted-by":"crossref","unstructured":"Algur SP, Patil AP, Hiremath PS, Shivashankar S (2010) Conceptual level similarity measure based review spam detection. In: 2010 International conference on signal and image processing. IEEE, pp 416\u2013423","DOI":"10.1109\/ICSIP.2010.5697509"},{"key":"3427_CR5","doi-asserted-by":"crossref","unstructured":"Archchitha K, Charles EYA (2019) Opinion spam detection in online reviews using neural networks. In: 2019 19th International conference on advances in ICT for emerging regions (ICTer), vol 250. IEEE, pp 1\u20136","DOI":"10.1109\/ICTer48817.2019.9023695"},{"key":"3427_CR6","unstructured":"Aritsugi M et al (2017) Combining word and character n-grams for detecting deceptive opinions. In: 2017 IEEE 41st annual computer software and applications conference (COMPSAC), vol 1. IEEE, pp 828\u2013833"},{"issue":"5","key":"3427_CR7","doi-asserted-by":"crossref","first-page":"3475","DOI":"10.1007\/s00500-019-04107-y","volume":"24","author":"MZ Asghar","year":"2020","unstructured":"Asghar MZ, Ullah A, Ahmad S, Khan A (2020) Opinion spam detection framework using hybrid classification scheme. Soft Comput 24(5):3475\u20133498","journal-title":"Soft Comput"},{"issue":"4","key":"3427_CR8","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1016\/j.ipm.2019.03.002","volume":"56","author":"R Barbado","year":"2019","unstructured":"Barbado R, Araque O, Iglesias CA (2019) A framework for fake review detection in online consumer electronics retailers. Inform Process Manag 56(4):1234\u20131244","journal-title":"Inform Process Manag"},{"key":"3427_CR9","doi-asserted-by":"crossref","unstructured":"Barushka A, Hajek P (2019) Review spam detection using word embeddings and deep neural networks, Springer","DOI":"10.1007\/978-3-030-19823-7_28"},{"issue":"Jan","key":"3427_CR10","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3 (Jan):993\u20131022","journal-title":"J Mach Learn Res"},{"key":"3427_CR11","doi-asserted-by":"crossref","unstructured":"Blum A, Mitchell T (1998) Combining labeled and unlabeled data with co-training. In: Proceedings of the eleventh annual conference on computational learning theory, pp 92\u2013100","DOI":"10.1145\/279943.279962"},{"key":"3427_CR12","doi-asserted-by":"crossref","unstructured":"Cao N, Ji S, Chiu DKW, He M, Sun X (2020) A deceptive review detection framework: Combination of coarse and fine-grained features. Expert Systems with Applications page 113465","DOI":"10.1016\/j.eswa.2020.113465"},{"key":"3427_CR13","doi-asserted-by":"crossref","unstructured":"Chen Y-R, Chen H-H (2015) Opinion spammer detection in web forum. In: Proceedings of the 38th International ACM SIGIR conference on research and development in information retrieval, pp 759\u2013762","DOI":"10.1145\/2766462.2767766"},{"key":"3427_CR14","doi-asserted-by":"crossref","unstructured":"Chengzhang J, Kang D-K (2015) Detecting the spam review using tri-training. In: 2015 17th International conference on advanced communication technology (ICACT). IEEE, pp 374\u2013377","DOI":"10.1109\/ICACT.2015.7224822"},{"key":"3427_CR15","doi-asserted-by":"crossref","unstructured":"Dematis I, Karapistoli E, Vakali A (2018) Fake review detection via exploitation of spam indicators and reviewer behavior characteristics. In: International conference on current trends in theory and practice of informatics. Springer, pp 581\u2013595","DOI":"10.1007\/978-3-319-73117-9_41"},{"key":"3427_CR16","doi-asserted-by":"crossref","unstructured":"Deng H, Zhao L, Luo N, Liu Y, Guo G, Wang X, Tan Z, Wang S, Zhou F (2017) Semi-supervised learning based fake review detection. In: 2017 IEEE International symposium on parallel and distributed processing with applications and 2017 IEEE International conference on ubiquitous computing and communications (ISPA\/IUCC). IEEE, pp 1278\u20131280","DOI":"10.1109\/ISPA\/IUCC.2017.00195"},{"key":"3427_CR17","doi-asserted-by":"crossref","unstructured":"Deng R, Ruan N, Jin R, Lu Y, Jia W, Su C, Xu D (2018) Spamtracer: manual fake review detection for o2o commercial platforms by using geolocation features. In: International conference on information security and cryptology. Springer, pp 384\u2013403","DOI":"10.1007\/978-3-030-14234-6_21"},{"key":"3427_CR18","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"key":"3427_CR19","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.eswa.2018.07.005","volume":"114","author":"L-Y Dong","year":"2018","unstructured":"Dong L-Y, Ji S-J, Zhang C-J, Zhang Q, Chiu DW, Qiu L-Q, Li D (2018) An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews. Expert Syst Appl 114:210\u2013223","journal-title":"Expert Syst Appl"},{"key":"3427_CR20","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.patrec.2018.07.013","volume":"132","author":"M Dong","year":"2020","unstructured":"Dong M, Yao L, Wang X, Benatallah B, Huang C, Ning X (2020) Opinion fraud detection via neural autoencoder decision forest. Pattern Recogn Lett 132:21\u201329","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"3427_CR21","doi-asserted-by":"crossref","first-page":"4281","DOI":"10.1007\/s10489-020-01761-w","volume":"50","author":"Y Fang","year":"2020","unstructured":"Fang Y, Wang H, Zhao L, Fengping Y, Wang C (2020) Dynamic knowledge graph based fake-review detection. Appl Intell 50(12):4281\u20134295","journal-title":"Appl Intell"},{"key":"3427_CR22","first-page":"175","volume":"13","author":"AM Fei","year":"2013","unstructured":"Fei AM, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. ICWSM 13:175\u2013184","journal-title":"ICWSM"},{"key":"3427_CR23","unstructured":"Feng S, Banerjee R, Choi Y (2012a) Syntactic stylometry for deception detection. In: Proceedings of the 50th annual meeting of the association for computational linguistics (volume 2: short papers), pp 171\u2013175"},{"issue":"98","key":"3427_CR24","first-page":"105","volume":"12","author":"S Feng","year":"2012","unstructured":"Feng S, Xing L, Gogar A, Choi Y (2012b) Distributional footprints of deceptive product reviews. ICWSM 12(98):105","journal-title":"ICWSM"},{"key":"3427_CR25","unstructured":"Feng VW, Hirst G (2013) Detecting deceptive opinions with profile compatibility. In: Proceedings of the sixth international joint conference on natural language processing, pp 338\u2013346"},{"issue":"4","key":"3427_CR26","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.ipm.2014.11.001","volume":"51","author":"DH Fusilier","year":"2015","unstructured":"Fusilier DH, G\u00f3mez MM-y, Rosso P, Cabrera RG (2015) Detecting positive and negative deceptive opinions using pu-learning. Inform Process Manag 51(4):433\u2013443","journal-title":"Inform Process Manag"},{"issue":"9","key":"3427_CR27","doi-asserted-by":"crossref","first-page":"4517","DOI":"10.1016\/j.eswa.2015.01.064","volume":"42","author":"K Gao","year":"2015","unstructured":"Gao K, Hua X, Wang J (2015) A rule-based approach to emotion cause detection for chinese micro-blogs. Expert Syst Appl 42(9):4517\u20134528","journal-title":"Expert Syst Appl"},{"issue":"1","key":"3427_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TKDE.2018.2880192","volume":"32","author":"G Giasemidis","year":"2018","unstructured":"Giasemidis G, Kaplis N, Agrafiotis I, Nurse JRC (2018) A semi-supervised approach to message stance classification. IEEE Trans Knowl Data Eng 32(1):1\u201311","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3427_CR29","unstructured":"Gong M, Gao Y, Xie Y, Qin AK (2020) An attention-based unsupervised adversarial model for movie review spam detection. IEEE Transactions on Multimedia"},{"key":"3427_CR30","doi-asserted-by":"crossref","unstructured":"Hajek P, Barushka A (2019) A comparative study of machine learning methods for detection of fake online consumer reviews. In: Proceedings of the 2019 3rd international conference on E-Business and internet, pp 18\u201322","DOI":"10.1145\/3383902.3383909"},{"key":"3427_CR31","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.eswa.2016.03.020","volume":"58","author":"A Heydari","year":"2016","unstructured":"Heydari A, Tavakoli M, Salim N (2016) Detection of fake opinions using time series. Expert Syst Appl 58:83\u201392","journal-title":"Expert Syst Appl"},{"key":"3427_CR32","doi-asserted-by":"crossref","unstructured":"Huang J, Qian T, He G, Zhong M, Peng Q (2013) Detecting professional spam reviewers. In: International Conference on advanced data mining and applications. Springer, pp 288\u2013 299","DOI":"10.1007\/978-3-642-53917-6_26"},{"issue":"5","key":"3427_CR33","doi-asserted-by":"crossref","first-page":"987","DOI":"10.3390\/app9050987","volume":"9","author":"N Hussain","year":"2019","unstructured":"Hussain N, Mirza HT, Rasool G, Hussain I, Kaleem M (2019) Spam review detection techniques: a systematic literature review. Appl Sci 9(5):987","journal-title":"Appl Sci"},{"key":"3427_CR34","doi-asserted-by":"crossref","first-page":"53801","DOI":"10.1109\/ACCESS.2020.2979226","volume":"8","author":"N Hussain","year":"2020","unstructured":"Hussain N, Mirza HT, Hussain I, Iqbal F, Memon I (2020) Spam review detection using the linguistic and spammer behavioral methods. IEEE Access 8:53801\u201353816","journal-title":"IEEE Access"},{"key":"3427_CR35","doi-asserted-by":"crossref","unstructured":"Jain N, Kumar A, Singh S, Singh C, Tripathi S (2019) Deceptive reviews detection using deep learning techniques. In: International conference on applications of natural language to information systems. Springer, pp 79\u201391","DOI":"10.1007\/978-3-030-23281-8_7"},{"key":"3427_CR36","doi-asserted-by":"crossref","unstructured":"Ji S-J, Qi Zhang, Li J, Chiu DKW, Xu S, Yi L, Gong M (2020) A burst-based unsupervised method for detecting review spammer groups. Information Sciences","DOI":"10.1016\/j.ins.2020.05.084"},{"key":"3427_CR37","doi-asserted-by":"crossref","unstructured":"Jia S, Zhang X, Wang X, Liu Y (2018) Fake reviews detection based on lda. In: 2018 4th International conference on information management (ICIM). IEEE, pp 280\u2013283","DOI":"10.1109\/INFOMAN.2018.8392850"},{"key":"3427_CR38","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2007) Analyzing and detecting review spam. In: Seventh IEEE International conference on data mining ICDM, vol 2007, pp 547\u2013552","DOI":"10.1109\/ICDM.2007.68"},{"key":"3427_CR39","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the 2008 International conference on web search and data mining, pp 219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"3427_CR40","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B, Lim E-P (2010) Finding unusual review patterns using unexpected rules. In: Proceedings of the 19th ACM International conference on information and knowledge management, pp 1549\u20131552","DOI":"10.1145\/1871437.1871669"},{"issue":"1","key":"3427_CR41","doi-asserted-by":"crossref","first-page":"387","DOI":"10.2991\/ijcis.2019.125905655","volume":"12","author":"F Khurshid","year":"2018","unstructured":"Khurshid F, Zhu Y, Zhuang X, Ahmad M, Ahmad M (2018) Enactment of ensemble learning for review spam detection on selected features. Int J Comput Intell Syst 12(1):387\u2013394","journal-title":"Int J Comput Intell Syst"},{"key":"3427_CR42","doi-asserted-by":"crossref","unstructured":"Kim S, Chang H, Lee S, Minhwan Y, Kang J (2015) Deep semantic frame-based deceptive opinion spam analysis, pp 1131\u20131140","DOI":"10.1145\/2806416.2806551"},{"key":"3427_CR43","doi-asserted-by":"crossref","unstructured":"Lai CL, Xu KQ, Lau RYK, Li Y, Jing L (2010a) Toward a language modeling approach for consumer review spam detection. In: 2010 IEEE 7th International conference on E-Business engineering. IEEE, pp 1\u20138","DOI":"10.1109\/ICEBE.2010.47"},{"key":"3427_CR44","doi-asserted-by":"crossref","unstructured":"Lai CL, Xu KQ, Lau RYK, Li Y, Song D (2010b) High-order concept associations mining and inferential language modeling for online review spam detection. In: 2010 IEEE International conference on data mining workshops. IEEE, pp 1120\u20131127","DOI":"10.1109\/ICDMW.2010.30"},{"issue":"4","key":"3427_CR45","first-page":"1","volume":"2","author":"RYK Lau","year":"2012","unstructured":"Lau RYK, Liao SY, Kwok RC-W, Xu K, Xia Y, Li Y (2012) Text mining and probabilistic language modeling for online review spam detection. ACM Trans Manag Inform Syst (TMIS) 2(4):1\u201330","journal-title":"ACM Trans Manag Inform Syst (TMIS)"},{"key":"3427_CR46","doi-asserted-by":"crossref","unstructured":"Li A, Qin Z, Liu R, Yang Y, Li D (2019a) Spam review detection with graph convolutional networks. In: Proceedings of the 28th ACM International conference on information and knowledge management, pp 2703\u20132711","DOI":"10.1145\/3357384.3357820"},{"key":"3427_CR47","unstructured":"Li FH, Huang M, Yang Y, Zhu X (2011) Learning to identify review spam. In: Twenty-Second International joint conference on artificial intelligence"},{"issue":"3","key":"3427_CR48","first-page":"467","volume":"18","author":"H Li","year":"2014","unstructured":"Li H, Liu B, Mukherjee A, Shao J (2014a) Spotting fake reviews using positive-unlabeled learning. Computacion y Sistemas\u0301 18(3):467\u2013475","journal-title":"Computacion y Sistemas\u0301"},{"key":"3427_CR49","unstructured":"Li H, Chen Z, Mukherjee A, Liu B, Shao J (2015) Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: Ninth International AAAI conference on web and social media"},{"key":"3427_CR50","doi-asserted-by":"crossref","unstructured":"Li H, Fei G, Wang S, Liu B, Shao W, Mukherjee A, Shao J (2017a) Bimodal distribution and co-bursting in review spam detection. In: Proceedings of the 26th International conference on world wide web, pp 1063\u20131072","DOI":"10.1145\/3038912.3052582"},{"key":"3427_CR51","first-page":"171","volume":"114585","author":"J Li","year":"2021","unstructured":"Li J, Lv P, Xiao W, Yang L, Zhang P (2021) Exploring groups of opinion spam using sentiment analysis guided by nominated topics. Expert Syst Appl 114585:171","journal-title":"Expert Syst Appl"},{"key":"3427_CR52","unstructured":"Li J, Cardie C, Li S (2013) Topicspam: a topic-model based approach for spam detection. In: Proceedings of the 51st annual meeting of the association for computational linguistics (volume 2: short papers), pp 217\u2013221"},{"key":"3427_CR53","doi-asserted-by":"crossref","unstructured":"Li J, Ott M, Cardie C, Hovy E (2014b) Towards a general rule for identifying deceptive opinion spam. In: Proceedings of the 52nd annual meeting of the association for computational linguistics (volume 1: long papers), pp 1566\u20131576","DOI":"10.3115\/v1\/P14-1147"},{"key":"3427_CR54","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.neucom.2016.10.080","volume":"254","author":"L Li","year":"2017","unstructured":"Li L, Qin B, Ren W, Liu T (2017b) Document representation and feature combination for deceptive spam review detection. Neurocomputing 254:33\u201341","journal-title":"Neurocomputing"},{"key":"3427_CR55","doi-asserted-by":"crossref","unstructured":"Li Q, Wu Q, Zhu C, Zhang J, Zhao W (2019b) Unsupervised user behavior representation for fraud review detection with cold-start problem. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, pp 222\u2013236","DOI":"10.1007\/978-3-030-16148-4_18"},{"key":"3427_CR56","doi-asserted-by":"crossref","first-page":"107023","DOI":"10.1016\/j.asoc.2020.107023","volume":"101","author":"A Ligthart","year":"2021","unstructured":"Ligthart A, Catal C, Tekinerdogan B (2021) Analyzing the effectiveness of semi-supervised learning approaches for opinion spam classification. Appl Soft Comput 101:107023","journal-title":"Appl Soft Comput"},{"key":"3427_CR57","doi-asserted-by":"crossref","unstructured":"Lim E-P, Nguyen V-A, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on information and knowledge management, pp 939\u2013948","DOI":"10.1145\/1871437.1871557"},{"key":"3427_CR58","doi-asserted-by":"crossref","unstructured":"Lin C, He Y (2009) Joint sentiment\/topic model for sentiment analysis. In: Proceedings of the 18th ACM conference on information and knowledge management, pp 375\u2013384","DOI":"10.1145\/1645953.1646003"},{"key":"3427_CR59","doi-asserted-by":"crossref","unstructured":"Lin Y, Zhu T, Wu H, Zhang J, Wang X, Zhou A (2014) Towards online anti-opinion spam: Spotting fake reviews from the review sequence. In: 2014 IEEE\/ACM International conference on advances in social networks analysis and mining (ASONAM 2014). IEEE, pp 261\u2013264","DOI":"10.1109\/ASONAM.2014.6921594"},{"key":"3427_CR60","doi-asserted-by":"crossref","unstructured":"Liu S, Zhang J, Xiang Y (2016) Statistical detection of online drifting twitter spam. In: Proceedings of the 11th ACM on asia conference on computer and communications security, pp 1\u201310","DOI":"10.1145\/2897845.2897928"},{"issue":"3","key":"3427_CR61","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/s00607-019-00763-y","volume":"102","author":"W Liu","year":"2020","unstructured":"Liu W, Jing W, Li Y (2020) Incorporating feature representation into bilstm for deceptive review detection. Computing 102(3):701\u2013715","journal-title":"Computing"},{"key":"3427_CR62","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.neucom.2019.08.013","volume":"366","author":"Y Liu","year":"2019","unstructured":"Liu Y, Bo P, Wang X (2019) Opinion spam detection by incorporating multimodal embedded representation into a probabilistic review graph. Neurocomputing 366:276\u2013283","journal-title":"Neurocomputing"},{"key":"3427_CR63","unstructured":"Yuqing L, Zhang L, Xiao Y, Li Y (2013) Simultaneously detecting fake reviews and review spammers using factor graph model. In: Proceedings of the 5th annual ACM web science conference, pp 225\u2013233"},{"issue":"1","key":"3427_CR64","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ipm.2017.09.004","volume":"54","author":"MSI Malik","year":"2018","unstructured":"Malik MSI, Hussain A (2018) An analysis of review content and reviewer variables that contribute to review helpfulness. Inform Process Manag 54(1):88\u2013104","journal-title":"Inform Process Manag"},{"key":"3427_CR65","doi-asserted-by":"crossref","unstructured":"Manaskasemsak B, Chanmakho C, Klainongsuang J, Rungsawang A (2019) Opinion spam detection through user behavioral graph partitioning approach. In: Proceedings of the 2019 3rd international conference on intelligent systems metaheuristics & swarm intelligence. ACM, pp 73\u201377","DOI":"10.1145\/3325773.3325783"},{"key":"3427_CR66","doi-asserted-by":"crossref","unstructured":"Mandhula T, Pabboju S, Gugulotu N (2019) Predicting the customer\u2019s opinion on amazon products using selective memory architecture-based convolutional neural network. The Journal of Supercomputing, 1\u201325","DOI":"10.1007\/s11227-019-03081-4"},{"key":"3427_CR67","doi-asserted-by":"crossref","unstructured":"Maurya R, Singh SK, Maurya AK, Glcm AK (2014) Multi class support vector machine based automated skin cancer classification. In: International conference on computing for sustainable global development (INDIACom). IEEE, pp 444\u2013447","DOI":"10.1109\/IndiaCom.2014.6828177"},{"key":"3427_CR68","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, pp 3111\u20133119"},{"key":"3427_CR69","doi-asserted-by":"crossref","unstructured":"Kakhki AM, Kliman-Silver C, Iolaus AM (2013) Securing online content rating systems. In: Proceedings of the 22nd International conference on world wide web, pp 919\u2013930","DOI":"10.1145\/2488388.2488468"},{"key":"3427_CR70","unstructured":"Mukherjee A, detection VV (2014) Opinion spam An unsupervised approach using generative models. Techincal Report UHx"},{"key":"3427_CR71","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International conference on world wide web, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"3427_CR72","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013a) Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International conference on knowledge discovery and data mining, pp 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"3427_CR73","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N et al (2013b) Fake review detection: Classification and analysis of real and pseudo reviews. UIC-CS-03-2013. Technical Report"},{"key":"3427_CR74","first-page":"409","volume":"2013","author":"A Mukherjee","year":"2013","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance NS (2013c) What yelp fake review filter might be doing?. ICWSM 2013:409\u2013418","journal-title":"ICWSM"},{"key":"3427_CR75","doi-asserted-by":"crossref","unstructured":"Narayan R, Rout JK, Jena SK (2018) Review spam detection using opinion mining. In: Progress in intelligent computing techniques: theory, practice, and applications. Springer, pp 273\u2013279","DOI":"10.1007\/978-981-10-3376-6_30"},{"key":"3427_CR76","doi-asserted-by":"crossref","unstructured":"Navastara DA, Zaqiyah AA, Fatichah C (2019) Opinion spam detection in product reviews using self-training semi-supervised learning approach. In: 2019 International conference on advanced mechatronics, intelligent manufacture and industrial automation (ICAMIMIA), pp 169\u2013173","DOI":"10.1109\/ICAMIMIA47173.2019.9223407"},{"key":"3427_CR77","unstructured":"Noekhah S, Fouladfar E, Salim N, Ghorashi SH, Hozhabri AA (2014) A novel approach for opinion spam detection in e-commerce. In: Proceedings of the 8th IEEE International conference on E-commerce with focus on E-trust"},{"key":"3427_CR78","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. arXiv:1107.4557"},{"key":"3427_CR79","unstructured":"Ott M, Cardie C, Hancock JT (2013) Negative deceptive opinion spam. In: Proceedings of the 2013 conference of the north american chapter of the association for computational linguistics: human language technologies, pp 497\u2013501"},{"issue":"2","key":"3427_CR80","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s12065-019-00204-x","volume":"12","author":"AC Pandey","year":"2019","unstructured":"Pandey AC, Rajpoot DS (2019) Spam review detection using spiral cuckoo search clustering method. Evol Intel 12(2):147\u2013164","journal-title":"Evol Intel"},{"key":"3427_CR81","doi-asserted-by":"crossref","unstructured":"Peng Q (2013) Store review spammer detection based on review relationship, Springer","DOI":"10.1007\/978-3-319-14139-8_30"},{"issue":"2001","key":"3427_CR82","first-page":"2001","volume":"71","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker JW, Francis ME , Booth RJ (2001) Linguistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates 71(2001):2001","journal-title":"Mahway: Lawrence Erlbaum Associates"},{"key":"3427_CR83","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"3427_CR84","doi-asserted-by":"crossref","unstructured":"Rajamohana SP, Umamaheswari K (2017) Hybrid optimization algorithm of improved binary particle swarm optimization (ibpso) and cuckoo search for review spam detection. In: Proceedings of the 9th International conference on machine learning and computing, pp 238\u2013242","DOI":"10.1145\/3055635.3056647"},{"key":"3427_CR85","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: Bridging review networks and metadata. In: Proceedings of the 21th acm sigkdd International conference on knowledge discovery and data mining, pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"key":"3427_CR86","doi-asserted-by":"crossref","first-page":"42934","DOI":"10.1109\/ACCESS.2019.2908495","volume":"7","author":"Y Ren","year":"2019","unstructured":"Ren Y, Ji D (2019) Learning to detect deceptive opinion A survey spam. IEEE Access 7:42934\u201342945","journal-title":"IEEE Access"},{"key":"3427_CR87","unstructured":"Ren Y, Zhang Y (2016) Deceptive opinion spam detection using neural network. In: Proceedings of COLING 2016, the 26th International conference on computational linguistics: technical papers, pp 140\u2013150"},{"key":"3427_CR88","doi-asserted-by":"crossref","unstructured":"Ren Y, Ji D, Zhang H (2014) Positive unlabeled learning for deceptive reviews detection. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 488\u2013498","DOI":"10.3115\/v1\/D14-1055"},{"issue":"1","key":"3427_CR89","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/cje.2015.01.009","volume":"24","author":"Y Ren","year":"2015","unstructured":"Ren Y, Ji D, Yin L, Zhang H (2015) Finding deceptive opinion spam by correcting the mislabeled instances. Chin J Electron 24(1):52\u201357","journal-title":"Chin J Electron"},{"key":"3427_CR90","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/ACCESS.2017.2655032","volume":"5","author":"JK Rout","year":"2017","unstructured":"Rout JK, Dalmia A, Choo K-KR, Bakshi S, Jena SK (2017) Revisiting semi-supervised learning for online deceptive review detection. IEEE Access 5:1319\u20131327","journal-title":"IEEE Access"},{"key":"3427_CR91","doi-asserted-by":"crossref","unstructured":"Runa D, Zhang X, Zhai Y (2017) Try to find fake reviews with semantic and relational discovery. In: 2017 13th International conference on semantics, knowledge and grids (SKG). IEEE, pp 234\u2013239","DOI":"10.1109\/SKG.2017.00048"},{"key":"3427_CR92","unstructured":"Saeed RMK, Rady S, Gharib TF (2019) An ensemble approach for spam detection in arabic opinion texts. Journal of King Saud University-Computer and Information Sciences"},{"key":"3427_CR93","doi-asserted-by":"crossref","unstructured":"Saini M, Verma S, Sharan A (2019) Multi-view ensemble learning using rough set based feature ranking for opinion spam detection. In: Advances in computer communication and computational sciences. Springer, pp 3\u201312","DOI":"10.1007\/978-981-13-0341-8_1"},{"key":"3427_CR94","unstructured":"Sanjay KS, Danti A (2019) Detection of fake opinions on online products using decision tree and information gain. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). IEEE, pp 372\u2013375"},{"issue":"2","key":"3427_CR95","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s40012-018-0193-0","volume":"6","author":"S Saumya","year":"2018","unstructured":"Saumya S, Singh JP (2018) Detection of spam reviews A sentiment analysis approach. Csi Transactions on ICT 6(2):137\u2013148","journal-title":"Csi Transactions on ICT"},{"key":"3427_CR96","doi-asserted-by":"crossref","unstructured":"Saumya S, Singh JP (2020) Spam review detection using lstm autoencoder: an unsupervised approach. Electron Commer Res, 1\u201321","DOI":"10.1007\/s10660-020-09413-4"},{"issue":"22","key":"3427_CR97","doi-asserted-by":"crossref","first-page":"8650","DOI":"10.1016\/j.eswa.2015.07.019","volume":"42","author":"D Savage","year":"2015","unstructured":"Savage D, Zhang X, Xinghuo Y, Chou P, Wang Q (2015) Detection of opinion spam based on anomalous rating deviation. Expert Syst Appl 42(22):8650\u20138657","journal-title":"Expert Syst Appl"},{"issue":"7","key":"3427_CR98","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1109\/TIFS.2017.2675361","volume":"12","author":"S Shehnepoor","year":"2017","unstructured":"Shehnepoor S, Salehi M, Farahbakhsh R, Netspam NC (2017) A network-based spam detection framework for reviews in online social media. IEEE Trans Inform Forensic Secur 12(7):1585\u20131595","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3427_CR99","doi-asserted-by":"crossref","unstructured":"Shojaee S, Murad MAA, Azman AB, Sharef NM, Nadali S (2013) Detecting deceptive reviews using lexical and syntactic features. In: 2013 13th International conference on Intellient systems design and applications. IEEE, pp 53\u201358","DOI":"10.1109\/ISDA.2013.6920707"},{"key":"3427_CR100","doi-asserted-by":"crossref","unstructured":"Singh VP, Maurya AK (2021) Role of machine learning and texture features for the diagnosis of laryngeal cancer. Machine Learning for Healthcare Applications, p 353","DOI":"10.1002\/9781119792611.ch23"},{"key":"3427_CR101","unstructured":"Stanton G, Irissappane AA (2019)"},{"key":"3427_CR102","doi-asserted-by":"crossref","unstructured":"Sun C, Qiaolin DU, Tian G (2016) Exploiting product related review features for fake review detection. Math Probl Eng, 16","DOI":"10.1155\/2016\/4935792"},{"key":"3427_CR103","doi-asserted-by":"crossref","unstructured":"Tang X, Qian T, You Z (2020) Generating behavior features for cold-start spam review detection with adversarial learning Information Sciences","DOI":"10.1016\/j.ins.2020.03.063"},{"issue":"6","key":"3427_CR104","doi-asserted-by":"crossref","first-page":"102381","DOI":"10.1016\/j.ipm.2020.102381","volume":"57","author":"Y Tian","year":"2020","unstructured":"Tian Y, Mirzabagheri M, Tirandazi P, Bamakan SMH (2020) A non-convex semi-supervised approach to opinion spam detection by ramp-one class svm. Inform Process Manag 57(6):102381","journal-title":"Inform Process Manag"},{"key":"3427_CR105","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.neucom.2016.12.088","volume":"268","author":"E Tsironi","year":"2017","unstructured":"Tsironi E, Barros P, Weber C, Wermter S (2017) An analysis of convolutional long short-term memory recurrent neural networks for gesture recognition. Neurocomputing 268:76\u201386","journal-title":"Neurocomputing"},{"issue":"2","key":"3427_CR106","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1007\/s10462-019-09697-5","volume":"53","author":"DU Vidanagama","year":"2020","unstructured":"Vidanagama DU, Silva TP, Karunananda AS (2020) Deceptive consumer review detection: a survey. Artif Intell Rev 53(2):1323\u20131352","journal-title":"Artif Intell Rev"},{"key":"3427_CR107","doi-asserted-by":"crossref","unstructured":"Wang C-C, Day M-Y, Chen C-C, Liou J-W (2018a) Detecting spamming reviews using long short-term memory recurrent neural network framework. In: Proceedings of the 2nd International conference on E-commerce, E-Business and E-Government, pp 16\u201320","DOI":"10.1145\/3234781.3234794"},{"key":"3427_CR108","doi-asserted-by":"crossref","unstructured":"Wang G, Xie S, Liu B, Philip SY (2011) Review graph based online store review spammer detection. In: 2011 IEEE 11Th International conference on data mining. IEEE, pp 1242\u2013 1247","DOI":"10.1109\/ICDM.2011.124"},{"key":"3427_CR109","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang X, Jiang C, Liu H (2018b) Identification of fake reviews using semantic and behavioral features. In: 2018 4th International conference on information management (ICIM). IEEE, pp 92\u201397","DOI":"10.1109\/INFOMAN.2018.8392816"},{"key":"3427_CR110","doi-asserted-by":"crossref","unstructured":"Wang X, Liu K, Zhao J (2017a) Detecting deceptive review spam via attention-based neural networks. In: National CCF conference on natural language processing and chinese computing. Springer, pp 866\u2013876","DOI":"10.1007\/978-3-319-73618-1_76"},{"key":"3427_CR111","unstructured":"Wang X, Liu K, Zhao J (2017b) spam detection by jointly embedding texts and behaviors. In: Proceedings of the 55th annual meeting of the association for computational linguistics (volume 1: long papers), pp 366\u2013376"},{"issue":"2","key":"3427_CR112","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10660-018-9310-2","volume":"19","author":"Y Wang","year":"2019","unstructured":"Wang Y, Wang J, Yao T (2019a) What makes a helpful online review?a meta-analysis of review characteristics. Electronic Commerce Research 19(2):257\u2013284","journal-title":"Electronic Commerce Research"},{"key":"3427_CR113","doi-asserted-by":"crossref","unstructured":"Wang Y, Zuo W, Wang Y (2019b) Research on opinion spam detection by time series anomaly detection. In: International conference on artificial intelligence and security. Springer, pp 182\u2013193","DOI":"10.1007\/978-3-030-24274-9_16"},{"issue":"16","key":"3427_CR114","first-page":"5759","volume":"11","author":"Z Wang","year":"2015","unstructured":"Wang Z, Hou T, Li Z, Song D (2015) Spotting fake reviewers using product review graph. J Comput Inform Syst 11(16):5759\u20135767","journal-title":"J Comput Inform Syst"},{"issue":"6","key":"3427_CR115","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang Z, Hou T, Song D, Li Z, Kong T (2016) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861\u2013874","journal-title":"Comput J"},{"issue":"9","key":"3427_CR116","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1007\/s10489-018-1142-1","volume":"48","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Xu X (2018c) Gslda: Lda-based group spamming detection in product reviews. Appl Intell 48(9):3094\u20133107","journal-title":"Appl Intell"},{"issue":"3","key":"3427_CR117","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Zhao X, Xu X (2018d) Graph-based review spammer group detection. Knowl Inform Syst 55(3):571\u2013 597","journal-title":"Knowl Inform Syst"},{"key":"3427_CR118","doi-asserted-by":"crossref","unstructured":"Wang Z, Hu R, Chen Q, Gao P, Xu X (2019c) Collueagle: Collusive review spammer detection using markov random fields. arXiv:1911.01690","DOI":"10.1007\/s10618-020-00693-w"},{"key":"3427_CR119","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1007\/s10618-020-00693-w","volume":"34","author":"Z Wang","year":"2020","unstructured":"Wang Z, Runlong H, Chen Q, Gao P, Xiaowei X (2020) Collueagle: collusive review spammer detection using markov random fields. Data Min Knowl Disc 34:1621\u20131641","journal-title":"Data Min Knowl Disc"},{"key":"3427_CR120","doi-asserted-by":"crossref","unstructured":"Wang Z, Wei W, Mao X-L, Guo G, Zhou P, Jiang S (2021) User-based network embedding for opinion spammer detection Pattern Recognition, p 108512","DOI":"10.1016\/j.patcog.2021.108512"},{"key":"3427_CR121","unstructured":"Guangyu W, Greene D, Smyth B, Cunningham P (2010) Distortion as a validation criterion in the identification of suspicious reviews, pp 10\u201313"},{"key":"3427_CR122","doi-asserted-by":"crossref","unstructured":"Wu X, Dong Y, Tao J, Huang C, Chawla NV (2017) Reliable fake review detection via modeling temporal and behavioral patterns. In: 2017 IEEE International conference on big data (big data). IEEE, pp 494\u2013499","DOI":"10.1109\/BigData.2017.8257963"},{"key":"3427_CR123","doi-asserted-by":"crossref","unstructured":"Wu Z, Wang Y, Wang Y, Wu J, Cao J, Zhang L (2015) Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International conference on data mining. IEEE, pp 1039\u2013 1044","DOI":"10.1109\/ICDM.2015.73"},{"key":"3427_CR124","unstructured":"Wu Z, Jie C, Wang Y, Wang Y, Zhang L, Wu J (2018) hpsd: A hybrid pu-learning-based spammer detection model for product reviews. IEEE transactions on cybernetics"},{"key":"3427_CR125","doi-asserted-by":"crossref","unstructured":"Xie S, Wang G, Lin S, Yu PS (2012) Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD International conference on knowledge discovery and data mining, pp 823\u2013831","DOI":"10.1145\/2339530.2339662"},{"key":"3427_CR126","doi-asserted-by":"crossref","unstructured":"Xie S, Hu Q, Zhang J, Philip SY (2015) Economic bi-level approach to ranking and rating spam detection. In: An effective IEEE International conference on data science and advanced analytics (DSAA), p 2015","DOI":"10.1109\/DSAA.2015.7344794"},{"key":"3427_CR127","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J (2015) Towards collusive fraud detection in online reviews. In: IEEE International conference on data mining. IEEE, p 2015","DOI":"10.1109\/ICDM.2015.62"},{"key":"3427_CR128","doi-asserted-by":"crossref","unstructured":"Chang X, Zhang J, Chang K, Long C (2013) Uncovering collusive spammers in chinese review websites, pp 979\u2013988","DOI":"10.1145\/2505515.2505700"},{"key":"3427_CR129","doi-asserted-by":"crossref","unstructured":"Xu G, Hu M, Ma C, Daneshmand M (2019) Gscpm: Cpm-based group spamming detection in online product reviews. In: ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2019.8761650"},{"key":"3427_CR130","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.ins.2021.07.072","volume":"576","author":"G Xu","year":"2021","unstructured":"Xu G, Hu M, Ma C (2021) Secure and smart autonomous multi-robot systems for opinion spammer detection. Inf Sci 576:681\u2013693","journal-title":"Inf Sci"},{"key":"3427_CR131","unstructured":"Yang X (2015) One methodology for spam review detection based on review coherence metrics. In: Proceedings of International conference on intelligent computing and internet of things. IEEE, p 2015"},{"key":"3427_CR132","doi-asserted-by":"crossref","unstructured":"Yang Y, Shafiq MO (2018) Large scale and parallel sentiment analysis based on label propagation in twitter data. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (trustcom\/bigdataSE). IEEE, pp 1791\u20131798","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00270"},{"key":"3427_CR133","doi-asserted-by":"crossref","unstructured":"Yilmaz CM, Durahim AO (2018) Spr2ep: a semi-supervised spam review detection framework. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, pp 306\u2013313","DOI":"10.1109\/ASONAM.2018.8508314"},{"key":"3427_CR134","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.future.2019.07.044","volume":"102","author":"L You","year":"2020","unstructured":"You L, Peng Q, Xiong Z, He D, Qiu M, Zhang X (2020) Integrating aspect analysis and local outlier factor for intelligent review spam detection. Futur Gener Comput Syst 102:163\u2013172","journal-title":"Futur Gener Comput Syst"},{"key":"3427_CR135","doi-asserted-by":"crossref","unstructured":"Yuan C, Zhou W, Ma Q, Lv S, Han J, Hu S (2019) Product level information for spam detection. In: 2019 Learning review representations from user IEEE International Conference on Data Mining (ICDM). IEEE, pp 1444\u20131449","DOI":"10.1109\/ICDM.2019.00188"},{"issue":"1","key":"3427_CR136","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3390\/info7010012","volume":"7","author":"W Zhang","year":"2016","unstructured":"Zhang W, Bu C, Yoshida T, Zhang S (2016) Cospa: A co-training approach for spam review identification with support vector machine. Information 7(1):12","journal-title":"Information"},{"issue":"4","key":"3427_CR137","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1016\/j.ipm.2018.03.007","volume":"54","author":"W Zhang","year":"2018","unstructured":"Zhang W, Yuhang D, Yoshida T, Dri-rcnn QW (2018) An approach to deceptive review identification using recurrent convolutional neural network. Inform Process Manag 54(4):576\u2013592","journal-title":"Inform Process Manag"},{"issue":"11","key":"3427_CR138","doi-asserted-by":"crossref","first-page":"10283","DOI":"10.1016\/j.eswa.2012.02.166","volume":"39","author":"W Zhang","year":"2012","unstructured":"Zhang W, Hua X, Wan W (2012) Weakness finder: Find product weakness from chinese reviews by using aspects based sentiment analysis. Expert Syst Appl 39(11):10283\u201310291","journal-title":"Expert Syst Appl"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03427-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03427-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03427-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T21:46:21Z","timestamp":1727127981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03427-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,5]]},"references-count":138,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["3427"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03427-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,5]]},"assertion":[{"value":"22 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}