{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:31:02Z","timestamp":1767771062317,"version":"3.41.0"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:00:00Z","timestamp":1475884800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong (HK)","doi-asserted-by":"publisher","award":["CityU 145712 and CityU 11502115"],"award-info":[{"award-number":["CityU 145712 and CityU 11502115"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Municipal Science and Technology R&D Funding","award":["JCYJ20140419115614350"],"award-info":[{"award-number":["JCYJ20140419115614350"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s10660-016-9244-5","type":"journal-article","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T11:27:42Z","timestamp":1475926062000},"page":"51-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Who are the spoilers in social media marketing? Incremental learning of latent semantics for social spam detection"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9874-8188","authenticated-orcid":false,"given":"Long","family":"Song","sequence":"first","affiliation":[]},{"given":"Raymond Yiu Keung","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Ron Chi-Wai","family":"Kwok","sequence":"additional","affiliation":[]},{"given":"Kristijan","family":"Mirkovski","sequence":"additional","affiliation":[]},{"given":"Wenyu","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,8]]},"reference":[{"key":"9244_CR1","doi-asserted-by":"crossref","unstructured":"van Marle, D. (2011) IP telephony shifts from unified communications to social media. In Proceedings of the 50th FITCE Congress, 2011 (pp. 1\u20134). Piscataway: IEEE","DOI":"10.1109\/FITCE.2011.6133429"},{"key":"9244_CR2","doi-asserted-by":"crossref","unstructured":"Gupta, R., Gupta, H., & Mohania, M. (2012). Cloud computing and big data analytics: What is new from databases perspective? In Big Data Analytics (pp. 42\u201361). Berlin: Springer.","DOI":"10.1007\/978-3-642-35542-4_5"},{"key":"9244_CR3","unstructured":"Chandramouli, R. (2011). Emerging social media threats: Technology and policy perspectives. In Proceedings of the 2nd Worldwide Cybersecurity Summit (WCS), London (pp. 1\u20134). Piscataway: IEEE"},{"issue":"6","key":"9244_CR4","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1016\/j.im.2014.05.011","volume":"51","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Wu, J., & Zhang, D. (2014). Discourse cues to deception in the case of multiple receivers. Information & Management, 51(6), 726\u2013737. doi: 10.1016\/j.im.2014.05.011 .","journal-title":"Information & Management"},{"key":"9244_CR5","doi-asserted-by":"publisher","unstructured":"Wu, G., Greene, D., Smyth, B., & Cunningham, P. A. (2010) Distortion as a validation criterion in the identification of suspicious reviews. In Proceedings of the 1st Workshop on Social Media Analytics, New York (pp. 10\u201313, SOMA \u201810): Association of Computing Machinery (ACM). doi: 10.1145\/1964858.1964860 .","DOI":"10.1145\/1964858.1964860"},{"key":"9244_CR6","doi-asserted-by":"crossref","unstructured":"Yoo, K.-H., & Gretzel, U. (2009). Comparison of deceptive and truthful travel reviews. In W. H\u00f6pken, U. Gretzel, & R. Law (Eds.), Information and Communication Technologies in Tourism 2009 (pp. 37\u201347). Vienna: Springer.","DOI":"10.1007\/978-3-211-93971-0_4"},{"key":"9244_CR7","unstructured":"Theft, fraud cost retailers $8 million a day: study. (2007), The Ottawa Citizen, pp. E.3-E3."},{"issue":"1","key":"9244_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-014-0189-1","volume":"4","author":"D Wang","year":"2014","unstructured":"Wang, D., Irani, D., & Pu, C. (2014). SPADE: A social-spam analytics and detection framework. Social Network Analysis and Mining, 4(1), 1\u201318. doi: 10.1007\/s13278-014-0189-1 .","journal-title":"Social Network Analysis and Mining"},{"issue":"10","key":"9244_CR9","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of ACM, 50(10), 94\u2013100.","journal-title":"Communications of ACM"},{"issue":"1","key":"9244_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1326561.1326565","volume":"2","author":"Y-R Lin","year":"2008","unstructured":"Lin, Y.-R., Sundaram, H., Chi, Y., Tatemura, J. I., & Tseng, B. L. (2008). Detecting splogs via temporal dynamics using self-similarity analysis. ACM Transactions on the Web, 2(1), 4. doi: 10.1145\/1326561.1326565 .","journal-title":"ACM Transactions on the Web"},{"key":"9244_CR11","doi-asserted-by":"crossref","unstructured":"Boyd, D., & Heer, J. (2006) Profiles as conversation: Networked identity performance on friendster. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Koloa, Hawaii (Vol. 3, pp. 59c-59c). Piscataway: IEEE Computer Society","DOI":"10.1109\/HICSS.2006.394"},{"key":"9244_CR12","doi-asserted-by":"publisher","unstructured":"Brown, G., Howe, T., Ihbe, M., Prakash, A., & Borders, K. (2008). Social networks and context-aware spam. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, New York (pp. 403\u2013412, CSCW \u201808): Association of Computing Machinery (ACM). doi: 10.1145\/1460563.1460628 .","DOI":"10.1145\/1460563.1460628"},{"key":"9244_CR13","unstructured":"Zinman, A., & Donath, J. (2007). Is Britney Spears spam? In Paper presented at the 4th Conference on Email and Anti-Spam, Mountain View, California."},{"key":"9244_CR14","unstructured":"Harold, & Nguyen (2014). 2013 State of Social Media Spam Report (2013 Research Report ed., pp. 21). Burlingame, California: Nexgate."},{"key":"9244_CR15","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010) @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, New York (Vol. Chicago, Illinois, pp. 27\u201337): Association of Computing Machinery (ACM). doi: http:\/\/doi.acm.org\/10.1145\/1866307.1866311 .","DOI":"10.1145\/1866307.1866311"},{"issue":"7","key":"9244_CR16","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1016\/j.im.2014.08.003","volume":"51","author":"D Zhang","year":"2014","unstructured":"Zhang, D., Yan, Z., Jiang, H., & Kim, T. (2014). A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites. Information & Management, 51(7), 845\u2013853.","journal-title":"Information & Management"},{"key":"9244_CR17","unstructured":"Ensing, & David (2013). Money talks and listens: Characteristics of rating and review site users. Maritz Research\u2019s White Papers, 4"},{"key":"9244_CR18","unstructured":"IC3 (2008). 2008 Internet Crime Report (p. 25): Internet Crime Complaint Center."},{"key":"9244_CR19","unstructured":"Reviews, reputation, and revenue: The case of Yelp.com (2011). Harvard Business School, Boston College. http:\/\/www.hbs.edu\/faculty\/Publication%20Files\/12-016_0464f20e-35b2-492e-a328-fb14a325f718.pdf ."},{"key":"9244_CR20","doi-asserted-by":"crossref","unstructured":"Ramage, D., Hall, D., Nallapati, R., & Manning, C. D. (2009). Labeled LDA: A supervised topic model for credit attribution in multi-labeled corpora. In Proceedings on the Conference on Empirical Methods in Natural Language Processing, Singapore (pp. 248\u2013256): Association for Computational Linguistics","DOI":"10.3115\/1699510.1699543"},{"key":"9244_CR21","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D. M., Ng, A. Y., & Jordan, M. I. (2003). Latent dirichlet allocation. Journal of Machine Learning Research, 3, 993\u20131022.","journal-title":"Journal of Machine Learning Research"},{"key":"9244_CR22","unstructured":"Markines, B., Cattuto, C., & Menczer, F. (2009). Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, New York (pp. 41\u201348, AIRWeb \u201809): Association of Computing Machinery (ACM). doi: http:\/\/doi.acm.org\/10.1145\/1531914.1531924 ."},{"key":"9244_CR23","doi-asserted-by":"publisher","unstructured":"Lee, K., Caverlee, J., & Webb, S. (2010). Uncovering social spammers: social honeypots\u00a0+\u00a0machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, New York (pp. 435\u2013442): Association of Computing Machinery (ACM). doi: 10.1145\/1835449.1835522 .","DOI":"10.1145\/1835449.1835522"},{"issue":"12","key":"9244_CR24","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.14778\/3402755.3402795","volume":"4","author":"X Jin","year":"2011","unstructured":"Jin, X., Lin, C., Luo, J., & Han, J. (2011). A data mining-based spam detection system for social media networks. Proceedings of the VLDB Endowment, 4(12), 1458\u20131461.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"9244_CR25","doi-asserted-by":"publisher","unstructured":"Lin, L., & Kun, J. (2012). Detecting spam in Chinese microblogs: A study on Sina Weibo. In Proceedings of the 8th International Conference on Computational Intelligence and Security, Guangzhou, Guangdong Province (pp. 578\u2013581): China Printing Solutions. doi: 10.1109\/cis.2012.135 .","DOI":"10.1109\/cis.2012.135"},{"key":"9244_CR26","unstructured":"Dae-Ha, P., Eun-Ae, C., & Byung-Won, O. (2013). Social spam discovery using bayesian network classifiers based on feature extractions. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, July 2013 (pp. 1808\u20131811) Piscataway: IEEE"},{"key":"9244_CR27","unstructured":"Po-Ching, L., & Po-Min, H. (2013). A study of effective features for detecting long-surviving Twitter spam accounts. In Proceedings of the 15th International Conference on Advanced Communication Technology, PyeongChang, South Korea, Jan 2013 (pp. 841\u2013846). Piscataway: IEEE"},{"key":"9244_CR28","unstructured":"Sureka, A. (2011). Mining user comment activity for detecting forum spammers in Youtube. Paper presented at the 1st International Workshop on Usage Analysis and the Web of Data, Hyderabad, India"},{"key":"9244_CR29","unstructured":"Brody, S., & Elhadad, N. (2010). An unsupervised aspect-sentiment model for online reviews. In Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Los Angeles, California (pp. 804\u2013812): Association for Computational Linguistics"},{"issue":"24","key":"9244_CR30","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1093\/bioinformatics\/btq576","volume":"26","author":"B Liu","year":"2010","unstructured":"Liu, B., Liu, L., Tsykin, A., Goodall, G. J., Green, J. E., Zhu, M., et al. (2010). Identifying functional miRNA\u2013mRNA regulatory modules with correspondence latent dirichlet allocation. Bioinformatics, 26(24), 3105\u20133111.","journal-title":"Bioinformatics"},{"key":"9244_CR31","unstructured":"Wang, C., Blei, D., & Li, F.-F. (2009). Simultaneous image classification and annotation. In Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL (pp. 1903\u20131910). Piscataway: IEEE"},{"key":"9244_CR32","doi-asserted-by":"crossref","unstructured":"B\u00edr\u00f3, I., Szab\u00f3, J., & Bencz\u00far, A. A. (2008). Latent dirichlet allocation in web spam filtering. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, Beijing (pp. 29\u201332). New York: Association of Computing Machinery (ACM)","DOI":"10.1145\/1451983.1451991"},{"issue":"11","key":"9244_CR33","first-page":"156","volume":"37","author":"K Cui","year":"2010","unstructured":"Cui, K., Zhou, B., Jia, Y., & Liang, Z. (2010). LDA-based model for online topic evolution mining. Computer Science, 37(11), 156\u2013193.","journal-title":"Computer Science"},{"key":"9244_CR34","doi-asserted-by":"crossref","unstructured":"Sizov, S. (2010). Geofolk: Latent spatial semantics in web 2.0 social media. In Proceedings of the third ACM international conference on Web search and data mining (pp. 281\u2013290). New York: ACM","DOI":"10.1145\/1718487.1718522"},{"key":"9244_CR35","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1007\/978-0-387-73003-5_304","volume-title":"Encyclopedia of biometrics","author":"X Geng","year":"2009","unstructured":"Geng, X., & Smith-Miles, K. (2009). Incremental learning. In S. Li & A. Jain (Eds.), Encyclopedia of biometrics (pp. 731\u2013735). Berlin: Springer."},{"key":"9244_CR36","volume-title":"Machine learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T. M. (1997). Machine learning. Boston: McGraw-Hill."},{"issue":"2","key":"9244_CR37","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/0004-3702(82)90040-6","volume":"18","author":"TM Mitchell","year":"1982","unstructured":"Mitchell, T. M. (1982). Generalization as search. Artificial Intelligence, 18(2), 203\u2013226.","journal-title":"Artificial Intelligence"},{"issue":"2","key":"9244_CR38","first-page":"139","volume":"2","author":"DH Fisher","year":"1987","unstructured":"Fisher, D. H. (1987). Knowledge acquisition via incremental conceptual clustering. Machine Learning, 2(2), 139\u2013172.","journal-title":"Machine Learning"},{"key":"9244_CR39","doi-asserted-by":"crossref","unstructured":"Utgoff, P. E. (1988). Id5: An incremental id3. In Proceedings of 5th International Workshop on Machine Learning, Ann Arbor, Michigan (pp. 107\u2013120). Burlington, MA: Morgan Kaufmann","DOI":"10.1016\/B978-0-934613-64-4.50017-7"},{"key":"9244_CR40","unstructured":"Martinez, C., & Tony, G.-C. (1995). ILA: Combining inductive learning with prior knowledge and reasoning. 17"},{"key":"9244_CR41","doi-asserted-by":"crossref","unstructured":"Tsai, C. H., Lin, C. Y., & Lin, C. J. (2014). Incremental and decremental training for linear classification. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York (pp. 343\u2013352). New York: Association of Computing Machinery (ACM)","DOI":"10.1145\/2623330.2623661"},{"issue":"2","key":"9244_CR42","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1137\/140957639","volume":"25","author":"J Mairal","year":"2015","unstructured":"Mairal, J. (2015). Incremental majorization-minimization optimization with application to large-scale machine learning. SIAM Journal on Optimization, 25(2), 829\u2013855.","journal-title":"SIAM Journal on Optimization"},{"key":"9244_CR43","volume-title":"Introduction to modern information retrieval","author":"G Salton","year":"1986","unstructured":"Salton, G., & McGill, M. J. (1986). Introduction to modern information retrieval. New York: McGraw-Hill."},{"issue":"10","key":"9244_CR44","doi-asserted-by":"crossref","first-page":"1964","DOI":"10.1002\/asi.23110","volume":"65","author":"Y Aphinyanaphongs","year":"2014","unstructured":"Aphinyanaphongs, Y., Fu, L. D., Li, Z., Peskin, E. R., Efstathiadis, E., Aliferis, C. F., et al. (2014). A comprehensive empirical comparison of modern supervised classification and feature selection methods for text categorization. Journal of the Association for Information Science and Technology, 65(10), 1964\u20131987.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"9244_CR45","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1002\/asi.21690","volume":"63","author":"SO Sood","year":"2012","unstructured":"Sood, S. O., Churchill, E. F., & Antin, J. (2012). Automatic identification of personal insults on social news sites. Journal of the American Society for Information Science and Technology, 63(2), 270\u2013285.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"9244_CR46","first-page":"143","volume-title":"Proceedings of the 14th International Conference on Machine Learning, Nashville, TN, USA, 1997","author":"T Joachims","year":"1997","unstructured":"Joachims, T. (1997). A probabilistic analysis of the rocchio algorithm with TFIDF for text categorization. Proceedings of the 14th International Conference on Machine Learning, Nashville, TN, USA, 1997 (pp. 143\u2013151). San Francisco: Morgan Kaufmann Publishers Inc."},{"key":"9244_CR47","unstructured":"Soucy, P., & Mineau, G. W. (2005) Beyond TFIDF weighting for text categorization in the vector space model. In Proceedings of the International Joint Conferences on Artificial Intelligence, Edinburgh, Scotland (Vol. 5, pp. 1130\u20131135): IJCAI Organization"},{"key":"9244_CR48","doi-asserted-by":"crossref","unstructured":"Singhal, A., Choi, J., Hindle, D., Lewis, D. D., & Pereira, F. (1999). AT&T at TREC-7. In Proceedings of the 7th Text Retrieval Conference, Gaithersburg, MD (pp. 239\u2013252): National Institute of Standards and Technology (NIST)","DOI":"10.6028\/NIST.SP.500-242.ATT"},{"key":"9244_CR49","doi-asserted-by":"crossref","unstructured":"Alexandrov, M., Gelbukh, A. F., & Lozovoi, G. (2001) Chi square classifier for document categorization. In Proceedings of the 2nd International Conference on Computational Linguistics and Intelligent Text Processing, Mexico City (Vol. 2004, pp. 457\u2013459). Belin: Springer","DOI":"10.1007\/3-540-44686-9_45"},{"key":"9244_CR50","volume-title":"Introductory and advanced topics","author":"MH Dunham","year":"2003","unstructured":"Dunham, M. H., & Ming, D. (2003). Introductory and advanced topics. Upper Saddle River, NJ: Prentice Hall\/Pearson Education."},{"issue":"7\u20138","key":"9244_CR51","first-page":"1289","volume":"3","author":"G Forman","year":"2003","unstructured":"Forman, G. (2003). An extensive empirical study of feature selection metrics for text classification. Journal of Machine Learning Research, 3(7\u20138), 1289\u20131305.","journal-title":"Journal of Machine Learning Research"},{"key":"9244_CR52","unstructured":"Al-Harbi, S., Almuhareb, A., Al-Thubaity, A., Khorsheed, M. S., & Al-Rajeh, A. (2008). Automatic arabic text classification. In Paper presented at the 9th International Conference on the Statistical Analysis of Textual Data, Lyon."},{"issue":"6","key":"9244_CR53","doi-asserted-by":"crossref","first-page":"430","DOI":"10.3844\/jcssp.2007.430.435","volume":"3","author":"AMd Mesleh","year":"2007","unstructured":"Mesleh, A Md. (2007). Chi square feature extraction based svms arabic text categorization system. Journal of Computer Science, 3(6), 430\u2013435.","journal-title":"Journal of Computer Science"},{"issue":"1","key":"9244_CR54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F. (2002). Machine learning in automated text categorization. ACM Computing Surveys, 34(1), 1\u201347.","journal-title":"ACM Computing Surveys"},{"key":"9244_CR55","volume-title":"An introduction to functional grammar","author":"MA Halliday","year":"2004","unstructured":"Halliday, M. A., & Matthiessen, C. M. (2004). An introduction to functional grammar. New York: Routledge."},{"key":"9244_CR56","doi-asserted-by":"crossref","DOI":"10.4324\/9780203697078","volume-title":"Analysing discourse: Textual analysis for social research","author":"N Fairclough","year":"2003","unstructured":"Fairclough, N. (2003). Analysing discourse: Textual analysis for social research. London: Routledge."},{"issue":"4","key":"9244_CR57","doi-asserted-by":"crossref","first-page":"811","DOI":"10.2307\/25148873","volume":"32","author":"A Abbasi","year":"2008","unstructured":"Abbasi, A., & Chen, H. (2008). CyberGate: a design framework and system for text analysis of computer-mediated communication. MIS Quarterly, 32(4), 811\u2013837.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9244_CR58","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00031305.1992.10475878","volume":"46","author":"G Casella","year":"1992","unstructured":"Casella, G., & George, E. I. (1992). Explaining the Gibbs sampler. The American Statistician, 46(3), 167\u2013174.","journal-title":"The American Statistician"},{"issue":"14","key":"9244_CR59","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1016\/j.comcom.2011.03.015","volume":"34","author":"Z Duan","year":"2011","unstructured":"Duan, Z., Gopalan, K., & Yuan, X. (2011). An empirical study of behavioral characteristics of spammers: Findings and implications. Computer Communications, 34(14), 1764\u20131776. doi: 10.1016\/j.comcom.2011.03.015 .","journal-title":"Computer Communications"},{"key":"9244_CR60","unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., & Choudhary, A. N. (2012). Towards online spam filtering in social networks. In NDSS"},{"key":"9244_CR61","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010). Detecting and characterizing social spam campaigns. In Paper presented at the Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, Melbourne."},{"key":"9244_CR62","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., & Zhang, X. (2013). Battling the internet water army: detection of hidden paid posters. In Paper presented at the Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara.","DOI":"10.1145\/2492517.2492637"},{"key":"9244_CR63","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., & Glance, N. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st international conference on World Wide Web, 2012 (pp. 191\u2013200). New York: ACM","DOI":"10.1145\/2187836.2187863"},{"key":"9244_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent advances in intrusion detection","author":"J Song","year":"2011","unstructured":"Song, J., Lee, S., & Kim, J. (2011). Spam filtering in twitter using sender-receiver relationship. In R. Sommer, D. Balzarotti, & G. Maier (Eds.), Recent advances in intrusion detection (Vol. 6961, pp. 301\u2013317)., Lecture Notes in Computer Science Berlin, Heidelberg: Springer."},{"key":"9244_CR65","unstructured":"Wang, A. H. (2010). Don\u2019t follow me: Spam detection in Twitter. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT) 2010 (pp. 1\u201310)"},{"issue":"1\u20134","key":"9244_CR66","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF01840446","volume":"1","author":"EW Myers","year":"1986","unstructured":"Myers, E. W. (1986). An O(ND) difference algorithm and its variations. Algorithmica, 1(1\u20134), 251\u2013266.","journal-title":"Algorithmica"},{"issue":"1","key":"9244_CR67","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/S0019-9958(85)80046-2","volume":"64","author":"E Ukkonen","year":"1985","unstructured":"Ukkonen, E. (1985). Algorithms for approximate string matching. Information and Control, 64(1), 100\u2013118.","journal-title":"Information and Control"},{"issue":"3","key":"9244_CR68","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1009700419189","volume":"1","author":"T Fawcett","year":"1997","unstructured":"Fawcett, T., & Provost, F. (1997). Adaptive fraud detection. Data Mining and Knowledge Discovery, 1(3), 291\u2013316.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"9244_CR69","doi-asserted-by":"crossref","unstructured":"Manaskasemsak, B., Jiarpakdee, J., & Rungsawang, A. (2014). Adaptive Learning Ant Colony Optimization for Web Spam Detection. In Computational Science and Its Applications\u2014ICCSA 2014 (Vol. 8584, pp. 642\u2013653, Lecture Notes in Computer Science). Berlin: Springer.","DOI":"10.1007\/978-3-319-09153-2_48"},{"issue":"4","key":"9244_CR70","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MIS.2013.54","volume":"29","author":"X Congfu","year":"2014","unstructured":"Congfu, X., Baojun, S., Yunbiao, C., & Weike, P. (2014). An adaptive fusion algorithm for spam detection. IEEE Intelligent Systems, 29(4), 2\u20138.","journal-title":"IEEE Intelligent Systems"},{"issue":"6","key":"9244_CR71","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt, F. (1958). The perceptron: a probabilistic model for information storage and organization in the brain. Psychological Review, 65(6), 386\u2013408.","journal-title":"Psychological Review"},{"issue":"1\u20133","key":"9244_CR72","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1023\/A:1012435301888","volume":"46","author":"Y Li","year":"2002","unstructured":"Li, Y., & Long, P. (2002). The relaxed online maximum margin algorithm. Machine Learning, 46(1\u20133), 361\u2013387.","journal-title":"Machine Learning"},{"key":"9244_CR73","doi-asserted-by":"publisher","unstructured":"Zhang, T. Solving large scale linear prediction problems using stochastic gradient descent algorithms. In Proceedings of the 21th International Conference on Machine Learning, Banff, Alberta, Canada, 2004 (p. 116). New York: Association of Computing Machinery (ACM). doi: 10.1145\/1015330.1015332 .","DOI":"10.1145\/1015330.1015332"},{"issue":"1","key":"9244_CR74","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10107-010-0420-4","volume":"127","author":"S Shalev-Shwartz","year":"2011","unstructured":"Shalev-Shwartz, S., Singer, Y., Srebro, N., & Cotter, A. (2011). Pegasos: primal estimated sub-gradient solver for SVM. Mathematical Programming, 127(1), 3\u201330.","journal-title":"Mathematical Programming"},{"issue":"3","key":"9244_CR75","first-page":"551","volume":"7","author":"K Crammer","year":"2006","unstructured":"Crammer, K., Dekel, O., Keshet, J., Shalev-Shwartz, S., & Singer, Y. (2006). Online passive-aggressive algorithms. Journal of Machine Learning Research, 7(3), 551\u2013585.","journal-title":"Journal of Machine Learning Research"},{"key":"9244_CR76","doi-asserted-by":"crossref","unstructured":"Hofmann, T. (1999). Probabilistic latent semantic indexing. In Paper presented at the Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, Berkeley, CA.","DOI":"10.1145\/312624.312649"},{"key":"9244_CR77","unstructured":"O\u2019Callaghan, D., Harrigan, M., Carthy, J., & Cunningham, P. A. (2012) Identifying discriminating network motifs in YouTube spam. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, Dublin (pp. 521\u2013529): Association for the Advancement of Artificial Intelligence"},{"key":"9244_CR78","doi-asserted-by":"crossref","unstructured":"O\u2019Callaghan, D., Harrigan, M., Carthy, J., & Cunningham, P. A. (2012) Network analysis of recurring YouTube spam campaigns. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, Dublin (pp. 531\u2013534)","DOI":"10.1609\/icwsm.v6i1.14288"},{"key":"9244_CR79","unstructured":"Helft, M. (2008). Search ads come to YouTube. http:\/\/bits.blogs.nytimes.com\/2008\/10\/13\/search-ads-come-to-youtube\/ ."},{"key":"9244_CR80","unstructured":"YouTube (2013). Youtube: Statistics."},{"key":"9244_CR81","volume-title":"Data mining: Techniques and trends","author":"B Sivaselvan","year":"2009","unstructured":"Sivaselvan, B., & Gopalan, N. P. (2009). Data mining: Techniques and trends. New Delhi: Prentice-Hall."},{"key":"9244_CR82","unstructured":"Ahmed, S., & Mithun, F. (2004). Word stemming to enhance spam filtering. In Paper presented at the 1st Conference on Email and Anti-Spam, Mountain View, CA."},{"key":"9244_CR83","doi-asserted-by":"crossref","unstructured":"Sculley, D. (2010) Combined regression and ranking. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington DC (pp. 979\u2013988). New York: Association of Computing Machinery (ACM)","DOI":"10.1145\/1835804.1835928"},{"issue":"4","key":"9244_CR84","doi-asserted-by":"crossref","first-page":"558","DOI":"10.2307\/2342192","volume":"97","author":"J Neyman","year":"1934","unstructured":"Neyman, J. (1934). On the two different aspects of the representative method: the method of stratified sampling and the method of purposive selection. Journal of the Royal Statistical Society, 97(4), 558\u2013625.","journal-title":"Journal of the Royal Statistical Society"},{"key":"9244_CR85","volume-title":"Pattern classification","author":"RO Duda","year":"2012","unstructured":"Duda, R. O., Hart, P. E., & Stork, D. G. (2012). Pattern classification. New York: Wiley."},{"key":"9244_CR86","unstructured":"Ott, M., Choi, Y., Cardie, C., & Hancock, J. T. (2011). Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Stroudsburg (Vol. 1, pp. 309\u2013319, HLT\u201911): Association for Computational Linguistics"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9244-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-016-9244-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9244-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T03:37:01Z","timestamp":1749613021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-016-9244-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,8]]},"references-count":86,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["9244"],"URL":"https:\/\/doi.org\/10.1007\/s10660-016-9244-5","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"type":"print","value":"1389-5753"},{"type":"electronic","value":"1572-9362"}],"subject":[],"published":{"date-parts":[[2016,10,8]]}}}