{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:04:48Z","timestamp":1777493088757,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T00:00:00Z","timestamp":1484006400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10844-016-0439-y","type":"journal-article","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T22:35:37Z","timestamp":1484087737000},"page":"213-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Distrust seed set propagation algorithm to detect web spam"],"prefix":"10.1007","volume":"49","author":[{"given":"Kwang Leng","family":"Goh","sequence":"first","affiliation":[]},{"given":"Ravi Kumar","family":"Patchmuthu","sequence":"additional","affiliation":[]},{"given":"Ashutosh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,10]]},"reference":[{"issue":"1","key":"439_CR1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., & Page, L (1998). The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, 30(1), 107\u2013117.","journal-title":"Computer networks and ISDN systems"},{"issue":"3","key":"439_CR2","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/1151087.1151090","volume":"6","author":"M Brinkmeier","year":"2006","unstructured":"Brinkmeier, M. (2006). Pagerank revisited. ACM Transactions on Internet Technology (TOIT), 6(3), 282\u2013301.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"439_CR3","unstructured":"Castillo, C., Chellapilla, K., & Davison, B.D. (2007). Web spam challenge track i."},{"key":"439_CR4","unstructured":"Castillo, C, Chellapilla, K, & Denoyer, L (2008). Web spam challenge 2008."},{"key":"439_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Q., Yu, S. N., & Cheng, S. (2008). Link variable trustrank for fighting web spam. In Computer science and software engineering, 2008 international conference on, IEEE, (Vol. 4 pp. 1004\u20131007).","DOI":"10.1109\/CSSE.2008.1099"},{"key":"439_CR6","doi-asserted-by":"crossref","unstructured":"Eiron, N., McCurley, K.S., & Tomlin, J.A. (2004). Ranking the web frontier. In Proceedings of the 13th international conference on World Wide Web (pp. 309\u2013318): ACM.","DOI":"10.1145\/988672.988714"},{"key":"439_CR7","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.procs.2015.10.069","volume":"70","author":"KL Goh","year":"2015","unstructured":"Goh, K. L., & Singh, A. K. (2015). Comprehensive literature review on machine learning structures for web spam classification. Procedia Computer Science, 70, 434\u2013441.","journal-title":"Procedia Computer Science"},{"issue":"1","key":"439_CR8","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10844-014-0310-y","volume":"43","author":"KL Goh","year":"2014","unstructured":"Goh, K.L., Patchmuthu, R.K., & Singh, A.K. (2014a). Link-based web spam detection using weight properties. Journal of Intelligent Information Systems, 43(1), 129\u2013145.","journal-title":"Journal of Intelligent Information Systems"},{"issue":"4","key":"439_CR9","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1080\/01969722.2014.887938","volume":"45","author":"KLA Goh","year":"2014","unstructured":"Goh, K.L.A., Kumar Singh, A., Ravi Kumar, P., & Mohan, A. (2014b). Tprank: Contend with web spam using trust propagation. Cybernetics and Systems, 45(4), 307\u2013323.","journal-title":"Cybernetics and Systems"},{"key":"439_CR10","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., & Pedersen, J. (2004). Combating web spam with trustrank. In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30, VLDB Endowment (pp. 576\u2013587)."},{"key":"439_CR11","unstructured":"Gyongyi, Z., Berkhin, P., Garcia-Molina, H., & Pedersen, J. (2006). Link spam detection based on mass estimation. In Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment (pp. 439\u2013450)."},{"key":"439_CR12","unstructured":"Krishnan, V. (2006). Web spam detection with anti-trust rank. In In AIRWEB (pp. 37\u201340)."},{"issue":"6","key":"439_CR13","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1080\/01969722.2012.707491","volume":"43","author":"AGK Leng","year":"2012","unstructured":"Leng, A.G.K., Kumar, P.R., Singh, A.K., & Mohan, A. (2012a). Link-based spam algorithms in adversarial information retrieval. Cybernetics and Systems, 43(6), 459\u2013475.","journal-title":"Cybernetics and Systems"},{"key":"439_CR14","doi-asserted-by":"crossref","unstructured":"Leng, A.G.K., Patchmuthu, R., & Singh, A.K. (2012b). Incorporating weight properties in detection of web spam. In The 2nd international conference on uncertainty reasoning and knowledge engineering, 14-15 August (pp. 18\u201321).","DOI":"10.1109\/URKE.2012.6319540"},{"key":"439_CR15","doi-asserted-by":"publisher","unstructured":"Li, Z., Qiancheng, J., & Yan, Z. (2008). From good to bad ones: Making spam detection easier. In IEEE 8th International Conference on Computer and Information Technology Workshops (pp. 129\u2013134), DOI \n                        10.1109\/CIT. 2008.Workshops.49\n                        \n                    , (to appear in print).","DOI":"10.1109\/CIT.2008.Workshops.49"},{"issue":"4","key":"439_CR16","first-page":"1705","volume":"3","author":"C Liang","year":"2007","unstructured":"Liang, C., Ru, L., & Zhu, X. (2007). R-spamrank: a spam detection algorithm based on link analysis. Journal of Computational Information Systems, 3(4), 1705\u20131712.","journal-title":"Journal of Computational Information Systems"},{"key":"439_CR17","doi-asserted-by":"crossref","unstructured":"Nie, L., Wu, B., & Davison, B.D. (2007). Winnowing wheat from the chaff: Propagating trust to sift spam from the web. In Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 869\u2013870): ACM.","DOI":"10.1145\/1277741.1277950"},{"key":"439_CR18","doi-asserted-by":"crossref","unstructured":"Shen, G., Gao, B., Liu, T.Y., Feng, G., Song, S., & Li, H. (2006). Detecting link spam using temporal information, IEEE.","DOI":"10.1109\/ICDM.2006.51"},{"key":"439_CR19","unstructured":"Sobek, M. (2002). Pr0 - google\u2019s pagerank 0 penalty. URL \n                        http:\/\/pr.efactory.de\/e-pr0.shtml\n                        \n                    ."},{"key":"439_CR20","doi-asserted-by":"crossref","unstructured":"Wu, B., & Davison, B.D. (2005). Identifying link farm spam pages. In Special interest tracks and posters of the 14th international conference on World Wide Web (pp. 820\u2013829): ACM.","DOI":"10.1145\/1062745.1062762"},{"key":"439_CR21","unstructured":"Wu, B., Goel, V., & Davison, B.D. (2006a). Propagating trust and distrust to demote web spam. MTW 190."},{"key":"439_CR22","doi-asserted-by":"crossref","unstructured":"Wu, B., Goel, V., & Davison, B.D. (2006b). Topical trustrank: Using topicality to combat web spam. In Proceedings of the 15th international conference on World Wide Web (pp. 63\u201372): ACM.","DOI":"10.1145\/1135777.1135792"},{"key":"439_CR23","doi-asserted-by":"crossref","unstructured":"Yang, H., King, I., & Lyu, M.R. (2007). Diffusionrank: a possible penicillin for web spamming. In Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 431\u2013438): ACM.","DOI":"10.1145\/1277741.1277815"},{"key":"439_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, X., Han, B., & Liang, W. (2009a). Automatic seed set expansion for trust propagation based anti-spamming algorithms. In Proceedings of the eleventh international workshop on Web information and data management (pp. 31\u201338): ACM.","DOI":"10.1145\/1651587.1651596"},{"key":"439_CR25","unstructured":"Zhang, X., Wang, Y., Mou, N., & Liang, W. (2011). Propagating both trust and distrust with target differentiation for combating web spam. In: AAAI."},{"key":"439_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jiang, Q., Zhang, L., & Zhu, Y. (2009b). Exploiting bidirectional links: making spamming detection easier. In Proceedings of the 18th ACM conference on Information and knowledge management (pp. 1839\u20131842): ACM.","DOI":"10.1145\/1645953.1646244"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-016-0439-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-016-0439-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-016-0439-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T08:07:59Z","timestamp":1505376479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-016-0439-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,10]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["439"],"URL":"https:\/\/doi.org\/10.1007\/s10844-016-0439-y","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,10]]}}}