{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T01:36:07Z","timestamp":1777599367728,"version":"3.51.4"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:00:00Z","timestamp":1591401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:00:00Z","timestamp":1591401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s10618-020-00693-w","type":"journal-article","created":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T06:02:12Z","timestamp":1591423332000},"page":"1621-1641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["ColluEagle: collusive review spammer detection using Markov random fields"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4210-0427","authenticated-orcid":false,"given":"Zhuo","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Runlong","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pei","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaowei","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"693_CR1","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013) Opinion fraud detection in online reviews by network effects. In: Proceedings of the seventh international conference on weblogs and social media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8\u201311"},{"issue":"1","key":"693_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s40537-015-0029-9","volume":"2","author":"M Crawford","year":"2015","unstructured":"Crawford M, Khoshgoftaar TM, Prusa JD, Richter AN, Al Najada H (2015) Survey of review spam detection using machine learning techniques. J Big Data 2(1):23. https:\/\/doi.org\/10.1186\/s40537-015-0029-9","journal-title":"J Big Data"},{"key":"693_CR3","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. In: Seventh international AAAI conference on weblogs and social media"},{"key":"693_CR4","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the 2008 international conference on web search and data mining. ACM, New York, pp 219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"693_CR5","unstructured":"Li J, Cardie C, Li S (2013) Topicspam: a topic-model based approach for spam detection. In: Proceedings of the 51st annual meeting of the association for computational linguistics, ACL 2013, 4\u20139 August 2013, Sofia, Bulgaria, vol 2, short papers, pp 217\u2013221"},{"key":"693_CR6","doi-asserted-by":"publisher","unstructured":"Li H, Mukherjee A, Liu B, Kornfield R, Emery S (2014) Detecting campaign promoters on twitter using Markov random fields. In: 2014 IEEE international conference on data mining, ICDM 2014, Shenzhen, China, December 14\u201317, 2014, pp 290\u2013299. https:\/\/doi.org\/10.1109\/ICDM.2014.59","DOI":"10.1109\/ICDM.2014.59"},{"key":"693_CR7","doi-asserted-by":"crossref","unstructured":"Lim EP, Nguyen VA, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on information and knowledge management, CIKM \u201910. New York, NY, USA, pp 939\u2013948","DOI":"10.1145\/1871437.1871557"},{"key":"693_CR8","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on world wide web. ACM, New York, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"693_CR9","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance NS (2013) What yelp fake review filter might be doing? In: Proceedings of the seventh international conference on weblogs and social media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8\u201311"},{"key":"693_CR10","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies, vol 1, Stroudsburg, PA, USA, pp 309\u2013319"},{"issue":"4","key":"693_CR11","first-page":"1","volume":"16","author":"A Rastogi","year":"2017","unstructured":"Rastogi A, Mehrotra M (2017) Opinion spam detection in online reviews. JIKM 16(4):1\u201338","journal-title":"JIKM"},{"key":"693_CR12","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, Sydney, NSW, Australia, August 10\u201313, 2015, pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"issue":"5","key":"693_CR13","doi-asserted-by":"publisher","first-page":"e1209","DOI":"10.1002\/widm.1209","volume":"7","author":"M Viviani","year":"2017","unstructured":"Viviani M, Pasi G (2017) Credibility in social media: opinions, news, and health information\u2014a survey. Wiley Interdiscip Rev Data Min Knowl Discov 7(5):e1209","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"693_CR14","doi-asserted-by":"crossref","unstructured":"Wang G, Xie S, Liu B, Yu PS (2011) Review graph based online store review spammer detection. In: 11th IEEE international conference on data mining, ICDM 2011, Vancouver, BC, Canada, December 11\u201314, 2011, pp 1242\u20131247","DOI":"10.1109\/ICDM.2011.124"},{"issue":"6","key":"693_CR15","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang Z, Hou T, Song D, Li Z, Kong T (2016) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861\u2013874. https:\/\/doi.org\/10.1093\/comjnl\/bxv068","journal-title":"Comput J"},{"issue":"9","key":"693_CR16","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1007\/s10489-018-1142-1","volume":"48","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Xu X (2018a) GSLDA: LDA-based group spamming detection in product reviews. Appl Intell 48(9):3094\u20133107","journal-title":"Appl Intell"},{"issue":"3","key":"693_CR17","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Zhao X, Xu X (2018b) Graph-based review spammer group detection. Knowl Inf Syst 55(3):571\u2013597. https:\/\/doi.org\/10.1007\/s10115-017-1068-7","journal-title":"Knowl Inf Syst"},{"key":"693_CR18","doi-asserted-by":"crossref","unstructured":"Xie S, Wang G, Lin S, Yu PS (2012) Review spam detection via time series pattern discovery. In: Proceedings of the 21st international conference companion on World Wide Web, New York, NY, USA, pp 635\u2013636","DOI":"10.1145\/2187980.2188164"},{"key":"693_CR19","doi-asserted-by":"crossref","unstructured":"Xu X, Yuruk N, Feng Z, Schweiger TAJ (2007) SCAN: a structural clustering algorithm for networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, San Jose, California, USA, August 12\u201315, 2007, pp 824\u2013833","DOI":"10.1145\/1281192.1281280"},{"key":"693_CR20","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J (2015) Towards collusive fraud detection in online reviews. In: 2015 IEEE international conference on data mining, ICDM 2015, Atlantic City, NJ, USA, November 14\u201317, 2015, pp 1051\u20131056","DOI":"10.1109\/ICDM.2015.62"},{"key":"693_CR21","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J, Chang K, Long C (2013) Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM international conference on conference on information and knowledge management. ACM, New York, pp 979\u2013988","DOI":"10.1145\/2505515.2505700"},{"key":"693_CR22","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-23528-8_17","volume-title":"Machine learning and knowledge discovery in databases","author":"J Ye","year":"2015","unstructured":"Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. In: Appice A, Rodrigues P, Santos Costa V, Soares C, Gama J, Jorge A (eds) Machine learning and knowledge discovery in databases, vol 9284. Lecture notes in computer science. Springer, Berlin, pp 267\u2013282"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00693-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-020-00693-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00693-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T23:50:07Z","timestamp":1622937007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-020-00693-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,6]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["693"],"URL":"https:\/\/doi.org\/10.1007\/s10618-020-00693-w","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,6]]},"assertion":[{"value":"10 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}