{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:04:24Z","timestamp":1777493064310,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,3,5]],"date-time":"2014-03-05T00:00:00Z","timestamp":1393977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s10844-014-0310-y","type":"journal-article","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T06:14:18Z","timestamp":1393913658000},"page":"129-145","source":"Crossref","is-referenced-by-count":12,"title":["Link-based web spam detection using weight properties"],"prefix":"10.1007","volume":"43","author":[{"given":"Kwang Leng","family":"Goh","sequence":"first","affiliation":[]},{"given":"Ravi Kumar","family":"Patchmuthu","sequence":"additional","affiliation":[]},{"given":"Ashutosh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,5]]},"reference":[{"issue":"1","key":"310_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1326561.1326563","volume":"2","author":"L Becchetti","year":"2008","unstructured":"Becchetti, L., Castillo, C., Donato, D., Baeza-Yates, R., Leonardi, S. (2008). Link analysis for Web spam detection. ACM Trans Web, 2(1), 1\u201342. doi: 10.1145\/1326561.1326563 .","journal-title":"ACM Trans Web"},{"key":"310_CR2","volume-title":"Proceedings of the workshop on web mining and web usage analysis (WebKDD 2006), 20-23 August","author":"L Becchetti","year":"2006","unstructured":"Becchetti, L., Castillo, C., Donato, D., Leonardi, S., Baeza-Yates, R. (2006). Using rank propagation and probabilistic counting for link-based spam detection. In Proceedings of the workshop on web mining and web usage analysis (WebKDD 2006), 20-23 August. Philadelphia: ACM Press."},{"issue":"1","key":"310_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/1052934.1052942","volume":"5","author":"A Borodin","year":"2005","unstructured":"Borodin, A., Roberts, G.O., Rosenthal, J.S., Tsaparas, P. (2005). Link analysis ranking: algorithms, theory, and experiments. ACM Transactions on Internet Technology, 5(1), 231\u2013297. doi: 10.1145\/1052934.052942 .","journal-title":"ACM Transactions on Internet Technology"},{"issue":"3","key":"310_CR4","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/1151087.1151090","volume":"6","author":"M Brinkmeier","year":"2006","unstructured":"Brinkmeier, M. (2006). PageRank revisited. ACM Transactions on Internet Technology, 6(3), 282\u2013301. doi: 10.1145\/1151087.151090 .","journal-title":"ACM Transactions on Internet Technology"},{"key":"310_CR5","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Becchetti, L., Boldi, P., Santini, M., Vigna, S. (2006). A reference collection for web spam. SIGIR Forum, 40(2).","DOI":"10.1145\/1189702.1189703"},{"key":"310_CR6","doi-asserted-by":"crossref","unstructured":"Eiron, N., McCurley, K.S., Tomlin, J.A. (2004). Ranking the web frontier. Paper presented at the proceedings of the 13th international conference on world wide web, 19-21 May. New York.","DOI":"10.1145\/988672.988714"},{"key":"310_CR7","volume-title":"Paper presented at the proceedings of the 7th international workshop on the web and databases: colocated with ACM SIGMOD\/PODS 2004, 1718 June","author":"D Fetterly","year":"2004","unstructured":"Fetterly, D., Manasse, M., Najork, M. (2004). Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. Paper presented at the proceedings of the 7th international workshop on the web and databases: colocated with ACM SIGMOD\/PODS 2004, 1718 June. Paris: Maison de la Chimie."},{"key":"310_CR8","unstructured":"Gy\u00f6ngyi, Z., & Garcia-Molina, H. (2005). Web spam taxonomy. In Proceedings of the 1st international workshop on adversarial information retrieval on the web (AIRWeb), 10\u201314 May (pp. 39\u201347). Chiba."},{"key":"310_CR9","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J. (2004). Combating web spam with TrustRank. In Proceedings of the thirtieth international conference on very large data bases (pp. 576\u2013587) VLDB Endowment. Toronto."},{"key":"310_CR10","unstructured":"Gy\u00f6ngyi, Z., Berkhin, P., Garcia-Molina, H., Pedersen, J. (2006). Link spam detection based on mass estimation. In: Proceedings of the 32nd international conference on very large data bases (pp. 439\u2013450). VLDB Endowment. Seoul."},{"issue":"2","key":"310_CR11","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"MR Henzinger","year":"2002","unstructured":"Henzinger, M.R., Motwani, R., Silverstein, C. (2002). Challenges in web search engines. SIGIR Forum, 36(2), 11\u201322. doi: 10.1145\/792550.792553 .","journal-title":"SIGIR Forum"},{"issue":"5","key":"310_CR12","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M. (1999). Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5), 604\u2013632. doi: 10.1145\/324133.324140 .","journal-title":"Journal of the ACM"},{"key":"310_CR13","unstructured":"Krishnan, V., & Raj, R. (2006). Web spam detection with anti-TrustRank. In Proceedings of the 2nd international workshop on adversarial information retrieval on the web (AIRWeb), 10 August (pp. 37\u201340). Seattle."},{"issue":"2","key":"310_CR14","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/382979.383041","volume":"19","author":"R Lempel","year":"2001","unstructured":"Lempel, R., & Moran, S. (2001). SALSA: the stochastic approach for link-structure analysis. ACM Transactions on Information Systems, 19(2), 131\u2013160. doi: 10.1145\/382979.383041 .","journal-title":"ACM Transactions on Information Systems"},{"key":"310_CR15","first-page":"18","volume-title":"The 2nd international conference on uncertainty reasoning and knowledge engineering, 14-15 August","author":"AGK Leng","year":"2012","unstructured":"Leng, A.G.K., Patchmuthu, R.K., Singh, A.K. (2012a). Incorporating weight properties in detection of web spam. In The 2nd international conference on uncertainty reasoning and knowledge engineering, 14-15 August (pp 18\u201321). Jakarta: IEEE."},{"issue":"6","key":"310_CR16","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1080\/01969722.2012.707491","volume":"43","author":"AGK Leng","year":"2012","unstructured":"Leng, A.G.K., Patchmuthu, R.K., Singh, A.K., Mohan, A. (2012b). Link based spam algorithms in adversarial information retrieval. Cybernetics and Systems: An International Journal, 43(6), 459\u2013475. doi: 10.1080\/01969722.2012.707491 .","journal-title":"Cybernetics and Systems: An International Journal"},{"key":"310_CR17","doi-asserted-by":"crossref","unstructured":"Li, L., Shang, Y., Zhang, W. (2002). Improvement of HITS-based algorithms on web documents. In Proceedings of the 11th international conference on world wide web (pp. 527\u2013535). ACM.","DOI":"10.1145\/511446.511514"},{"issue":"4","key":"310_CR18","first-page":"1705","volume":"3","author":"C Liang","year":"2007","unstructured":"Liang, C., Ru, L., Zhu, X. (2007). R-SpamRank: a spam detection algorithm based on link analysis. Journal of Computational Information Systems, 3(4), 1705\u20131712.","journal-title":"Journal of Computational Information Systems"},{"key":"310_CR19","doi-asserted-by":"crossref","unstructured":"Nemirovsky, D., & Avrachenkov, K. (2008). Weighted PageRank: Cluster-related weights.","DOI":"10.6028\/NIST.SP.500-277.enterprise-inria"},{"key":"310_CR20","first-page":"869","volume-title":"Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval, 23-27 July","author":"L Nie","year":"2007","unstructured":"Nie, L., Wu, B., Davison, B.D. (2007). Winnowing wheat from the chaff: propagating trust to sift spam from the web. In: Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval, 23-27 July (pp. 869\u2013870). New York: ACM. doi: 10.1145\/1277741.1277950 ."},{"key":"310_CR21","first-page":"372","volume-title":"Proceedings of the 20th international conference on artificial neural networks: Part II, Thessaloniki, Greece, 15\u201318 September","author":"LD Noi","year":"2010","unstructured":"Noi, L.D., Hagenbuchner, M., Scarselli, F., Tsoi, A.C. (2010). Web spam detection by probability mapping GraphSOMs and Graph Neural Networks. In: Proceedings of the 20th international conference on artificial neural networks: Part II, Thessaloniki, Greece, 15\u201318 September (pp. 372\u2013381). Germany: Springer."},{"key":"310_CR22","doi-asserted-by":"crossref","unstructured":"Qi, C., Song-Nian, Y., Sisi, C. (2008). Link variable TrustRank for fighting web spam. In: Proceedings of international conference on computer science and software engineering, Wuhan, China, 12\u201314 Dec (pp. 1004\u20131007). Wuhan. doi: 10.1109\/csse.2008.1099 .","DOI":"10.1109\/CSSE.2008.1099"},{"issue":"1","key":"310_CR23","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TNN.2008.2005141","volume":"20","author":"F Scarselli","year":"2009","unstructured":"Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G. (2009a). Computational capabilities of graph neural networks. Transactions on Neural Network, 20(1), 81\u2013102. doi: 10.1109\/tnn.2008.2005141 .","journal-title":"Transactions on Neural Network"},{"issue":"1","key":"310_CR24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2009","unstructured":"Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G. (2009b). The graph neural network model. Trans Neur Netw, 20(1), 61\u201380. doi: 10.1109\/tnn.2008.2005605 .","journal-title":"Trans Neur Netw"},{"key":"310_CR25","unstructured":"Sobek, M. (2002). Pr0 - Google\u2019s PageRank 0 Penalty. http:\/\/pr.efactory.de\/e-pr0.shtml . Accessed 25 Feb 2012."},{"issue":"2","key":"310_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1344411.1344416","volume":"26","author":"X Wang","year":"2008","unstructured":"Wang, X., Tao, T., Sun, J.-T., Shakery, A., Zhai, C. (2008). DirichletRank: solving the zero-one gap problem of PageRank. ACM Transactions on Information Systems, 26(2), 1\u201329. doi: 10.1145\/1344411.1344416 .","journal-title":"ACM Transactions on Information Systems"},{"key":"310_CR27","unstructured":"Wu, B., & Davison, B.D. (2005a). Cloaking and redirection: a preliminary study. In: Proceedings of the 1st international workshop on adversarial information retrieval on the web (AIRWeb), Chiba, Japan, 10\u201314 May (pp. 39\u201347). Chiba."},{"key":"310_CR28","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1145\/1062745.1062762","volume-title":"Proceedings of special interest tracks and posters of the 14th international conference on world wide web","author":"B Wu","year":"2005","unstructured":"Wu, B., & Davison, B.D. (2005b). Identifying link farm spam pages. In: Proceedings of special interest tracks and posters of the 14th international conference on world wide web (pp. 820\u2013829). New York: ACM. doi: 10.1145\/1062745.1062762 ."},{"key":"310_CR29","unstructured":"Wu, B., Goel, V., Davison, B.D. (2006a). Propagating trust and distrust to demote web spam. Paper presented at the world wide web (WWW2006) Workshop on Models of Trust for the Web (MTW), 22\u201326 May. Edinburgh."},{"key":"310_CR30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1135777.1135792","volume-title":"Proceedings of the 15th international conference on world wide web, Edinburgh, Scotland, 22\u201326 May","author":"B Wu","year":"2006","unstructured":"Wu, B., Goel, V., Davison, B.D. (2006b). Topical TrustRank: using topicality to combat web spam. In Proceedings of the 15th international conference on world wide web, Edinburgh, Scotland, 22\u201326 May (pp. 63\u201372). New York: ACM. doi: 10.1145\/1135777.1135792 ."},{"key":"310_CR31","unstructured":"Xing, W., & Ghorbani, A. (2004). Weighted pagerank algorithm. In: Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on (pp. 305\u2013314). IEEE."},{"key":"310_CR32","unstructured":"Yahoo! (2007). Web Spam Collections. http:\/\/barcelona.research.yahoo.net\/webspam\/datasets\/ ."},{"key":"310_CR33","first-page":"431","volume-title":"Proceedings of the 30th annual international acm sigir conference on research and development in information retrieval, Amsterdam, The Netherlands, 23-27 July","author":"H Yang","year":"2007","unstructured":"Yang, H., King, I., Lyu, M.R. (2007). DiffusionRank: a possible penicillin for web spamming. In Proceedings of the 30th annual international acm sigir conference on research and development in information retrieval, Amsterdam, The Netherlands, 23-27 July (pp. 431\u2013438). New York: ACM. doi: 10.1145\/1277741.1277815 ."},{"key":"310_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jiang, Q., Zhang, L., Zhu, Y. (2009). Exploiting bidirectional links: making spamming detection easier. In Proceedings of the 18th ACM conference on Information and knowledge management, Hong Kong, China (pp. 1839\u20131842). ACM, 1646244. doi: 10.1145\/1645953.1646244 .","DOI":"10.1145\/1645953.1646244"},{"key":"310_CR35","first-page":"1292","volume-title":"Proceedings of the twenty-fifth conference on artificial intelligence (AAAI-11)","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Wang, Y., Mou, N., Liang, W. (2011). Propagating both trust and distrust with target differentiation for combating web spam. In W. Burgard, D. Roth (Eds.), Proceedings of the twenty-fifth conference on artificial intelligence (AAAI-11) (pp. 1292\u20131297). San Francisco: AAAI Press, conf\/aaai\/ZhangWML11."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0310-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-014-0310-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0310-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:55:43Z","timestamp":1746143743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-014-0310-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,5]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["310"],"URL":"https:\/\/doi.org\/10.1007\/s10844-014-0310-y","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,5]]}}}