{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:17:27Z","timestamp":1775067447474,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10602-y","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T22:31:30Z","timestamp":1613687490000},"page":"18107-18124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Spam review detection using self attention based CNN and bi-directional LSTM"],"prefix":"10.1007","volume":"80","author":[{"given":"P.","family":"Bhuvaneshwari","sequence":"first","affiliation":[]},{"given":"A. Nagaraja","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Y. Harold","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,15]]},"reference":[{"key":"10602_CR1","unstructured":"Crawford, M., Khoshgoftaar, T. M., & Prusa, J. D. (2016, March). Reducing feature set explosion to facilitate real-world review spam detection. In The twenty-ninth international flairs conference."},{"key":"10602_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.eswa.2018.07.005","volume":"114","author":"LY Dong","year":"2018","unstructured":"Dong LY, Ji SJ, Zhang CJ, Zhang Q, Chiu DW, Qiu LQ, Li D (2018) An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews. Expert Syst Appl 114:210\u2013223","journal-title":"Expert Syst Appl"},{"issue":"5","key":"10602_CR3","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker H, Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5):1048\u20131054","journal-title":"IEEE Trans Neural Netw"},{"key":"10602_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2016.09.005","volume":"66","author":"F Enr\u00edquez","year":"2016","unstructured":"Enr\u00edquez F, Troyano JA, L\u00f3pez-Solaz T (2016) An approach to the use of word embeddings in an opinion classification task. Expert Syst Appl 66:1\u20136","journal-title":"Expert Syst Appl"},{"issue":"9","key":"10602_CR5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0222713","volume":"14","author":"Y Fang","year":"2019","unstructured":"Fang Y, Gao J, Huang C, Peng H, Wu R (2019) Self multi-head attention-based convolutional neural networks for fake news detection. PLoS One 14(9):e0222713","journal-title":"PLoS One"},{"key":"10602_CR6","unstructured":"Feng S, Banerjee R, Choi Y (2012, July) Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers) (pp. 171-175)."},{"key":"10602_CR7","unstructured":"Harris CG (2012, July) Detecting deceptive opinion spam using human computation. In Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence."},{"issue":"7","key":"10602_CR8","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari A, Ali Tavakoli M, Salim N, Heydari Z (2015) Detection of review spam: a survey. Expert Syst Appl 42(7):3634\u20133642","journal-title":"Expert Syst Appl"},{"key":"10602_CR9","volume-title":"Online shopping","author":"J Horrigan","year":"2008","unstructured":"Horrigan J (2008) Online shopping. Pew Internet & American Life Project, Washington"},{"key":"10602_CR10","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008, February) Opinion spam and analysis. In Proceedings of the 2008 international conference on web search and data mining (pp. 219-230).","DOI":"10.1145\/1341531.1341560"},{"issue":"1","key":"10602_CR11","doi-asserted-by":"publisher","first-page":"350380","DOI":"10.1080\/07421222.2018.1440758","volume":"35","author":"N Kumar","year":"2018","unstructured":"Kumar N, Venugopal D, Qiu L, Kumar S (Jan. 2018) Detecting review manipulation on online platforms with hierarchical supervised learning. J Manage Inf Syst 35(1):350380","journal-title":"J Manage Inf Syst"},{"key":"10602_CR12","series-title":"In Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data (pp. 393\u2013404)","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25816-4_32","volume-title":"Learning document representation for deceptive opinion spam detection","author":"L Li","year":"2015","unstructured":"Li L, Ren W, Qin B, Liu T (2015) Learning document representation for deceptive opinion spam detection, In Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data (pp. 393\u2013404). Springer, Cham"},{"key":"10602_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.neucom.2016.10.080","volume":"254","author":"L Li","year":"2017","unstructured":"Li L, Qin B, Ren W, Liu T (2017) Document representation and feature combination for deceptive spam review detection. Neurocomputing 254:33\u201341","journal-title":"Neurocomputing"},{"key":"10602_CR14","first-page":"728","volume-title":"A model of visual attention for natural image retrieval","author":"G Liu","year":"2013","unstructured":"Liu G, Fan D (2013) A model of visual attention for natural image retrieval. International Conference on Information Science and Cloud Computing Companion, Guangzhou, pp 728\u2013733"},{"issue":"8","key":"10602_CR15","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1016\/j.patcog.2015.02.005","volume":"48","author":"G-H Liu","year":"2015","unstructured":"Liu G-H, Yang J-Y, Li ZY (2015) Content-based image retrieval using computational visual attention model. Pattern Recogn 48(8):2554\u20132566","journal-title":"Pattern Recogn"},{"issue":"12","key":"10602_CR16","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca M, Zervas G (2016) Fake it till you make it: reputation, competition, and yelp review fraud. Manag Sci 62(12):3412\u20133427","journal-title":"Manag Sci"},{"key":"10602_CR17","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013). Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"10602_CR18","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013, August). Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 632-640).","DOI":"10.1145\/2487575.2487580"},{"key":"10602_CR19","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint arXiv:1107.4557."},{"issue":"2","key":"10602_CR20","doi-asserted-by":"publisher","first-page":"147164","DOI":"10.1007\/s12065-019-00204-x","volume":"12","author":"AC Pandey","year":"2019","unstructured":"Pandey AC, Rajpoot DS (Jun. 2019) Spam review detection using spiral cuckoo search clustering method. Evol Intell 12(2):147164","journal-title":"Evol Intell"},{"key":"10602_CR21","doi-asserted-by":"crossref","unstructured":"Rayana, S., & Akoglu, L. (2015, August). Collective opinion spam detection: bridging review networks and metadata. In Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining (pp. 985-994).","DOI":"10.1145\/2783258.2783370"},{"key":"10602_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","volume":"385","author":"Y Ren","year":"2017","unstructured":"Ren Y, Ji D (2017) Neural networks for deceptive opinion spam detection: an empirical study. Inf Sci 385:213\u2013224","journal-title":"Inf Sci"},{"key":"10602_CR23","unstructured":"Ren Y, Zhang Y (2016, December). Deceptive opinion spam detection using neural network. In Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers (pp. 140-150)."},{"key":"10602_CR24","unstructured":"Sedighi Z, Ebrahimpoor-Komleh H, Bagheri A, Kosseim L (2019, May). Opinion spam detection with attention-based neural networks. In the Thirty-Second International Flairs Conference."},{"key":"10602_CR25","doi-asserted-by":"crossref","unstructured":"Wang X, Liu K, Zhao J (2017, November). Detecting deceptive review spam via attention-based neural networks. In National CCF Conference on Natural Language Processing and Chinese Computing (pp. 866-876). Springer, Cham.","DOI":"10.1007\/978-3-319-73618-1_76"},{"key":"10602_CR26","doi-asserted-by":"crossref","unstructured":"Wang CC, Day MY, Chen CC, & Liou, J. W. (2018, June). Detecting spamming reviews using long short-term memory recurrent neural network framework. In Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government (pp. 16-20).","DOI":"10.1145\/3234781.3234794"},{"key":"10602_CR27","doi-asserted-by":"crossref","unstructured":"Ye J, Akoglu L (2015, September) Discovering opinion spammer groups by network footprints. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 267-282). Springer, Cham.","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"10602_CR28","doi-asserted-by":"crossref","unstructured":"Yoo KH, Gretzel . (2009, January). Comparison of deceptive and truthful travel reviews. In ENTER (pp. 37-47).","DOI":"10.1007\/978-3-211-93971-0_4"},{"issue":"4","key":"10602_CR29","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.ipm.2018.03.007","volume":"54","author":"W Zhang","year":"2018","unstructured":"Zhang W, Du Y, Yoshida T, Wang Q (2018) DRI-RCNN: an approach to deceptive review identification using recurrent convolutional neural network. Inf Process Manag 54(4):576\u2013592","journal-title":"Inf Process Manag"},{"issue":"4","key":"10602_CR30","volume":"8","author":"L Zhang","year":"2018","unstructured":"Zhang L, Wang S, Liu B (2018) Deep learning for sentiment analysis: a survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8(4):e1253","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"10602_CR31","volume-title":"Bilateral attention network for RGB-D salient object detection, arXiv","author":"Z Zhang","year":"2020","unstructured":"Zhao Zhang, Zheng Lin, Jun Xu, Wenda Jin, Shao-Ping Lu, Deng-Ping Fan, Bilateral attention network for RGB-D salient object detection, arXiv 2020."},{"key":"10602_CR32","doi-asserted-by":"crossref","unstructured":"Zhao S, Xu Z, Liu L, Guo M, Yun J (2018) Towards accurate deceptive opinions detection based on word order-preserving CNN. Mathematical Problems in Engineering, 2018.","DOI":"10.1155\/2018\/2410206"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10602-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10602-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10602-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:09:55Z","timestamp":1621501795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10602-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,15]]},"references-count":32,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10602"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10602-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,15]]},"assertion":[{"value":"18 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}