{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:41Z","timestamp":1740122861400,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of\u00a0Hunan Province","doi-asserted-by":"publisher","award":["2023JJ40685"],"award-info":[{"award-number":["2023JJ40685"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72201272","72088101","91846301","72025405","72074033"],"award-info":[{"award-number":["72201272","72088101","91846301","72025405","72074033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Social Science Foundation of Hunan Province","award":["20YBA012"],"award-info":[{"award-number":["20YBA012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16293-x","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T05:01:43Z","timestamp":1691211703000},"page":"20931-20952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Aspect-based classification method for review spam detection"],"prefix":"10.1007","volume":"83","author":[{"given":"Mengsi","family":"Cai","sequence":"first","affiliation":[]},{"given":"Yonghao","family":"Du","sequence":"additional","affiliation":[]},{"given":"Yuejin","family":"Tan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3547-6493","authenticated-orcid":false,"given":"Xin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"16293_CR1","doi-asserted-by":"crossref","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013). Opinion fraud detection in online reviews by network effects. Seventh Int AAAI Conf Weblogs and Social Media, 7(1), pp.2\u201311. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/14380. Accessed 2013-07-10","DOI":"10.1609\/icwsm.v7i1.14380"},{"key":"16293_CR2","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.procs.2017.11.467","volume":"122","author":"S Bajaj","year":"2017","unstructured":"Bajaj S, Garg N, Singh S (2017) A novel user-based spam review detection. Procedia Computer Science 122:1009\u20131015. https:\/\/doi.org\/10.1016\/j.procs.2017.11.467","journal-title":"Procedia Computer Science"},{"issue":"4","key":"16293_CR3","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1016\/j.ipm.2019.03.002","volume":"56","author":"R Barbado","year":"2019","unstructured":"Barbado R, Araque O, Iglesias AC (2019) A framework for fake review detection in online consumer electronics retailers. Inf Process Manage 56(4):1234\u20131244. https:\/\/doi.org\/10.1016\/j.ipm.2019.03.002","journal-title":"Inf Process Manage"},{"key":"16293_CR4","doi-asserted-by":"publisher","first-page":"18107","DOI":"10.1007\/s11042-021-10602-y","volume":"80","author":"P Bhuvaneshwari","year":"2021","unstructured":"Bhuvaneshwari P, Rao AN, Robinson YH (2021) Spam review detection using self attention based CNN and bi-directional LSTM. Multimedia Tools and Applications 80:18107\u201318124. https:\/\/doi.org\/10.1007\/s11042-021-10602-y","journal-title":"Multimedia Tools and Applications"},{"key":"16293_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s12525-016-0228-z","volume":"27","author":"R Buettner","year":"2016","unstructured":"Buettner R (2016) Predicting user behavior in electronic markets based on personality-mining in large online social networks: A personality-based product recommender framework. Electron Mark 27:247\u2013265. https:\/\/doi.org\/10.1007\/s12525-016-0228-z","journal-title":"Electron Mark"},{"key":"16293_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2021.3067334","volume":"99","author":"M Cai","year":"2021","unstructured":"Cai M, Tan Y, Ge B, Dou Y, Huang G, Du Y (2021) PURA: A product-and-user oriented approach for requirement analysis from online reviews. IEEE Syst J 99:1\u201312. https:\/\/doi.org\/10.1109\/JSYST.2021.3067334","journal-title":"IEEE Syst J"},{"key":"16293_CR7","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.chb.2015.08.057","volume":"54","author":"AY Chua","year":"2016","unstructured":"Chua AY, Banerjee S (2016) Helpfulness of user-generated reviews as a function of review sentiment, product type and information quality. Comput Hum Behav 54:547\u2013554. https:\/\/doi.org\/10.1016\/j.chb.2015.08.057","journal-title":"Comput Hum Behav"},{"key":"16293_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.patrec.2018.07.013","volume":"132","author":"M Dong","year":"2018","unstructured":"Dong M, Yao L, Wang X, Benatallah B, Huang C, Ning X (2018) Opinion fraud detection via neural autoencoder decision forest. Pattern Recogn Lett 132:21\u201329. https:\/\/doi.org\/10.1016\/j.patrec.2018.07.013","journal-title":"Pattern Recogn Lett"},{"key":"16293_CR9","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.procs.2017.08.368","volume":"113","author":"W Etaiwi","year":"2017","unstructured":"Etaiwi W, Naymat G (2017) The impact of applying different preprocessing steps on review spam detection. Procedia Computer Science 113:273\u2013279. https:\/\/doi.org\/10.1016\/j.procs.2017.08.368","journal-title":"Procedia Computer Science"},{"key":"16293_CR10","doi-asserted-by":"crossref","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013). Exploiting burstiness in reviews for review spammer detection. Seventh Int Conf Weblogs and Social Media, pp.175\u2013184","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"16293_CR11","unstructured":"Feng S, Banerjee R, Yejin C (2012). Syntactic stylometry for deception detection. 50th Annual Meet Assoc Comput Linguist, pp.171\u2013175"},{"key":"16293_CR12","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TMM.2020.2990085","volume":"23","author":"Y Gao","year":"2020","unstructured":"Gao Y, Gong M, Xie Y, Qin QK (2020) An attention-based unsupervised adversarial model for movie review spam detection. IEEE Trans Multimedia 23:784\u2013796. https:\/\/doi.org\/10.1109\/TMM.2020.2990085","journal-title":"IEEE Trans Multimedia"},{"key":"16293_CR13","doi-asserted-by":"publisher","unstructured":"Graves A, Mohamed AR, Hinton G (2013). Speech recognition with deep recurrent neural networks. Int Conf Acoustics, Speech, and Signal Process (ICASSP), pp.6645\u20136649. https:\/\/doi.org\/10.1109\/ICASSP.2013.6638947","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"16293_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MNET.001.1900542","volume":"99","author":"D He","year":"2020","unstructured":"He D, Pan M, Hong K, Cheng Y, Chan S, Liu X, Guizani N (2020) Fake review detection based on PU learning and behavior density. IEEE Network 99:1\u20136. https:\/\/doi.org\/10.1109\/MNET.001.1900542","journal-title":"IEEE Network"},{"issue":"4","key":"16293_CR15","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.ipm.2014.11.001","volume":"51","author":"D Hern\u00e1ndez Fusilier","year":"2015","unstructured":"Hern\u00e1ndez Fusilier D, Montes-y-G\u00f3mez M, Rosso P, Guzm\u00e1n Cabrera R (2015) Detecting positive and negative deceptive opinions using PU-learning. Inf Process Manage 51(4):433\u2013443. https:\/\/doi.org\/10.1016\/j.ipm.2014.11.001","journal-title":"Inf Process Manage"},{"issue":"3","key":"16293_CR16","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/s00500-016-2409-2","volume":"21","author":"\u00c1 Hern\u00e1ndez-Casta\u00f1eda","year":"2017","unstructured":"Hern\u00e1ndez-Casta\u00f1eda \u00c1, Calvo H, Gelbukh A, Flores J (2017) Cross-domain deception detection using support vector networks. Soft Comput 21(3):585\u2013595. https:\/\/doi.org\/10.1007\/s00500-016-2409-2","journal-title":"Soft Comput"},{"issue":"7","key":"16293_CR17","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari A, Tavakoli M, Salim N, Heydari Z (2015) Detection of review spam: A survey. Expert Syst Appl 42(7):3634\u20134364. https:\/\/doi.org\/10.1016\/j.eswa.2014.12.029","journal-title":"Expert Syst Appl"},{"key":"16293_CR18","doi-asserted-by":"publisher","first-page":"53801","DOI":"10.1109\/ACCESS.2020.2979226","volume":"8","author":"N Hussain","year":"2020","unstructured":"Hussain N, Mirza H, Hussain I, Iqbal F, Memon I (2020) Spam review detection using the linguistic and spammer behavioral methods. IEEE Access 8:53801\u201353816. https:\/\/doi.org\/10.1109\/ACCESS.2020.2979226","journal-title":"IEEE Access"},{"key":"16293_CR19","doi-asserted-by":"publisher","unstructured":"Jia S, Zhang X, Wang X, Liu Y (2018). Fake reviews detection based on LDA. 4th Int Conf Inf Manag, pp.280\u2013283. https:\/\/doi.org\/10.1109\/INFOMAN.2018.8392850","DOI":"10.1109\/INFOMAN.2018.8392850"},{"key":"16293_CR20","doi-asserted-by":"publisher","unstructured":"Jindal N, Liu B (2008). Opinion spam and analysis. Int Conf Web Search and Data Mining, pp. 219\u2013230. https:\/\/doi.org\/10.1145\/1341531.1341560","DOI":"10.1145\/1341531.1341560"},{"key":"16293_CR21","doi-asserted-by":"publisher","unstructured":"Jindal N, Liu B (2007). Review spam detection. 16th international conference on World Wide Web, pp.1189\u20131190. https:\/\/doi.org\/10.1145\/1242572.1242759","DOI":"10.1145\/1242572.1242759"},{"key":"16293_CR22","unstructured":"Karami A, Zhou B (2015). Online review spam detection by new linguistic features. Proceedings of iConference 2015. http:\/\/hdl.handle.net\/2142\/73749. Accessed 2015-03-15"},{"key":"16293_CR23","doi-asserted-by":"publisher","unstructured":"KC S, Mukherjee A (2016). On the temporal dynamics of opinion spamming: Case studies on Yelp. 25th Int Conf World Wide Web, pp.369\u2013379. https:\/\/doi.org\/10.1145\/2872427.2883087","DOI":"10.1145\/2872427.2883087"},{"key":"16293_CR24","doi-asserted-by":"publisher","unstructured":"Li H, Fei G, Wang S, Liu B, Shao W, Mukherjee A, Shao J (2017). Bimodal distribution and co-bursting in review spam detection. 26th Int Conf World Wide Web, pp.1063\u20131072. https:\/\/doi.org\/10.1145\/3038912.3052582","DOI":"10.1145\/3038912.3052582"},{"key":"16293_CR25","doi-asserted-by":"publisher","unstructured":"Li F, Huang M, Yang Y, Zhu X (2011). Learning to identify review spam. IJCAI Proc-Int Joint Conf Artificial Intell pp.2488\u20132493. https:\/\/doi.org\/10.5591\/978-1-57735-516-8\/IJCAI11-414","DOI":"10.5591\/978-1-57735-516-8\/IJCAI11-414"},{"issue":"3","key":"16293_CR26","doi-asserted-by":"publisher","first-page":"467","DOI":"10.13053\/cys-18-3-2035","volume":"18","author":"H Li","year":"2014","unstructured":"Li H, Liu B, Mukherje A, Shao J (2014) Spotting fake reviews using positive-unlabeled learning. Computaci\u00f3n y Sistemas 18(3):467\u2013475. https:\/\/doi.org\/10.13053\/cys-18-3-2035","journal-title":"Computaci\u00f3n y Sistemas"},{"key":"16293_CR27","doi-asserted-by":"publisher","unstructured":"Li J, Ott M, Cardie C, Hovy E (2014). Towards a general rule for identifying deceptive opinion spam. 52nd Annual Meet Assoc Comput Linguist, pp.1566\u20131576. https:\/\/doi.org\/10.3115\/v1\/P14-1147","DOI":"10.3115\/v1\/P14-1147"},{"key":"16293_CR28","doi-asserted-by":"publisher","unstructured":"Li A, Qin Z, Liu R, Yang Y, Li D (2019). Spam review detection with graph convolutional networks. 28th ACM Int Conf, pp.2703\u20132711. https:\/\/doi.org\/10.1145\/3357384.3357820","DOI":"10.1145\/3357384.3357820"},{"key":"16293_CR29","doi-asserted-by":"publisher","unstructured":"Lim E, Nguyen V, Jindal N, Liu B, Lauw H (2010). Detecting product review spammers using rating behaviors. 19th ACM Int Conf Inf Knowledge Manag, pp.939\u2013948. https:\/\/doi.org\/10.1145\/1871437.1871557","DOI":"10.1145\/1871437.1871557"},{"key":"16293_CR30","doi-asserted-by":"publisher","unstructured":"Lu Y, Zhang L, Xiao Y, Li Y (2013). Simultaneously detecting fake reviews and review spammers using factor graph model. Third Annual ACM Web Science Conference, pp.225\u2013233. https:\/\/doi.org\/10.1145\/2464464.2464470","DOI":"10.1145\/2464464.2464470"},{"key":"16293_CR31","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.ijhm.2019.02.008","volume":"80","author":"Y Luo","year":"2019","unstructured":"Luo Y, Tang R (2019) Understanding hidden dimensions in textual reviews on Airbnb: An application of modified latent aspect rating analysis (LARA). Int J Hosp Manag 80:144\u2013154. https:\/\/doi.org\/10.1016\/j.ijhm.2019.02.008","journal-title":"Int J Hosp Manag"},{"key":"16293_CR32","doi-asserted-by":"publisher","unstructured":"Mukherjee S, Dutta S, Weikum G (2016). Credible review detection with limited information using consistency features. European Conf Machine Learning and Principles and Practice of Knowledge Discovery, pp.195\u2013213. https:\/\/doi.org\/10.1007\/978-3-319-46227-1_13","DOI":"10.1007\/978-3-319-46227-1_13"},{"key":"16293_CR33","doi-asserted-by":"publisher","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013). Spotting opinion spammers using behavioral footprints. 19th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining, pp.632\u2013640. https:\/\/doi.org\/10.1145\/2487575.2487580","DOI":"10.1145\/2487575.2487580"},{"key":"16293_CR34","doi-asserted-by":"publisher","unstructured":"Mukherjee A, Liu B, Glance N (2012). Spotting fake reviewer groups in consumer reviews. 21st Annual Conf World Wide Web, pp.191\u2013200. https:\/\/doi.org\/10.1145\/2187836.2187863","DOI":"10.1145\/2187836.2187863"},{"key":"16293_CR35","doi-asserted-by":"publisher","unstructured":"Mukherjee A, Liu B, Wang J, Glance N, Jindal N (2011). Detecting group review spam. 20th Int Conf Companion on World Wide Web, pp.93\u201394. https:\/\/doi.org\/10.1145\/1963192.1963240","DOI":"10.1145\/1963192.1963240"},{"key":"16293_CR36","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N (2013). What yelp fake review filter might be doing?. Seventh Int Conf Weblogs and Social Media, pp.409\u2013418","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"16293_CR37","doi-asserted-by":"publisher","unstructured":"Noekhah S, Salim N, Zakaria NH (2018). A comprehensive study on opinion mining features and their applications. International conference of reliable information and communication technology. Int Conf Reliable Inf Commun Technol, pp.78\u201389. https:\/\/doi.org\/10.1007\/978-3-319-59427-9","DOI":"10.1007\/978-3-319-59427-9"},{"issue":"1","key":"16293_CR38","doi-asserted-by":"publisher","first-page":"102140","DOI":"10.1016\/j.ipm.2019.102140","volume":"57","author":"S Noekhah","year":"2019","unstructured":"Noekhah S, Salim N, Zakaria N (2019) Opinion spam detection: Using multi-iterative graph-based model. Inf. Process. Manage 57(1):102140. https:\/\/doi.org\/10.1016\/j.ipm.2019.102140","journal-title":"Inf. Process. Manage"},{"key":"16293_CR39","unstructured":"Ott M, Cardie C, Hancock J (2013). Negative deceptive opinion spam. Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp.497\u2013501"},{"issue":"4","key":"16293_CR40","doi-asserted-by":"publisher","first-page":"1750036","DOI":"10.1142\/S0219649217500368","volume":"16","author":"A Rastogi","year":"2017","unstructured":"Rastogi A, Mehrotra M (2017) Opinion spam detection in online reviews. J Inf Knowl Manag 16(4):1750036. https:\/\/doi.org\/10.1142\/S0219649217500368","journal-title":"J Inf Knowl Manag"},{"key":"16293_CR41","doi-asserted-by":"publisher","unstructured":"Rayana S, Akoglu L (2015). Collective opinion spam detection: Bridging review networks and metadata. 21th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining, pp.985\u2013994. https:\/\/doi.org\/10.1145\/2783258.2783370","DOI":"10.1145\/2783258.2783370"},{"issue":"38","key":"16293_CR42","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","volume":"385","author":"Y Ren","year":"2017","unstructured":"Ren Y, Ji D (2017) Neural networks for deceptive opinion spam detection: An empirical study. Inf Sci 385(38):213\u2013224. https:\/\/doi.org\/10.1016\/j.ins.2017.01.015","journal-title":"Inf Sci"},{"key":"16293_CR43","doi-asserted-by":"publisher","unstructured":"Shahariar GM, Biswas S, Omar F, Shah F, Hassan S (2019). Spam review detection using deep learning. IEEE 10th Annual Inf Technol, Electronics and Mobile Commun Conf, pp.0027\u20130033. https:\/\/doi.org\/10.1109\/IEMCON.2019.8936148","DOI":"10.1109\/IEMCON.2019.8936148"},{"issue":"7","key":"16293_CR44","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TIFS.2017.2675361","volume":"12","author":"S Shehnepoor","year":"2017","unstructured":"Shehnepoor S, Salehi M, Farahbakhsh R, Crespi N (2017) NetSpam: A network-based spam detection framework for reviews in online social media. IEEE Trans Inf Forensics Secur 12(7):1585\u20131595. https:\/\/doi.org\/10.1109\/TIFS.2017.2675361","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16293_CR45","doi-asserted-by":"publisher","unstructured":"Shojaee S, Murad M, Azman A, Sharef N, Nadali S (2013). Detecting deceptive reviews using lexical and syntactic features. Int Conf Intell Syst Des Appl, pp.53\u201358. https:\/\/doi.org\/10.1109\/ISDA.2013.6920707","DOI":"10.1109\/ISDA.2013.6920707"},{"issue":"1","key":"16293_CR46","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: A data mining perspective. ACM SIGKDD Explorations Newsl 19(1):22\u201336. https:\/\/doi.org\/10.1145\/3137597.3137600","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"16293_CR47","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.ins.2020.03.063","volume":"526","author":"X Tang","year":"2020","unstructured":"Tang X, Qian T, You Z (2020) Generating behavior features for cold-start spam review detection with adversarial learning. Inf Sci 526:274\u2013288. https:\/\/doi.org\/10.1016\/j.ins.2020.03.063","journal-title":"Inf Sci"},{"key":"16293_CR48","doi-asserted-by":"publisher","unstructured":"Thapa R, Lamichhane B, Ma D, Jiao X (2021). SpamHD: Memory-efficient text spam detection using brain-inspired hyperdimensional computing. IEEE Comput Soc Annual Symposium on VLSI (ISVLSI), pp.84\u201389. https:\/\/doi.org\/10.1109\/ISVLSI51109.2021.00026","DOI":"10.1109\/ISVLSI51109.2021.00026"},{"key":"16293_CR49","doi-asserted-by":"publisher","first-page":"104122","DOI":"10.1016\/j.tourman.2020.104122","volume":"80","author":"CF Tsai","year":"2020","unstructured":"Tsai CF, Chen K, Hu YH, Chen WK (2020) Improving text summarization of online hotel reviews with review helpfulness and sentiment. Tour. Manag 80:104122. https:\/\/doi.org\/10.1016\/j.tourman.2020.104122","journal-title":"Tour. Manag"},{"key":"16293_CR50","doi-asserted-by":"publisher","unstructured":"Wang X, Liu K, Zhao J (2017). Handling cold-start problem in review spam detection by jointly embedding texts and behaviors. 55th Annual Meet Associ Comput Linguist pp.366\u2013376. https:\/\/doi.org\/10.18653\/v1\/P17-1034","DOI":"10.18653\/v1\/P17-1034"},{"key":"16293_CR51","doi-asserted-by":"publisher","unstructured":"Wang H, Lu Y, Zhai C (2010). Latent aspect rating analysis on review text data: A rating regression approach. ACM SIGKDD Int Conf Knowledge Discovery and Data Mining, pp.783\u2013792. https:\/\/doi.org\/10.1145\/1835804.1835903","DOI":"10.1145\/1835804.1835903"},{"issue":"4","key":"16293_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2337542.2337546","volume":"3","author":"G Wang","year":"2012","unstructured":"Wang G, Xie S, Liu B, Yu P (2012) Identify online store review spammers via social review graph. ACM Trans Intell Syst Technol 3(4):1\u201321. https:\/\/doi.org\/10.1145\/2337542.2337546","journal-title":"ACM Trans Intell Syst Technol"},{"key":"16293_CR53","doi-asserted-by":"publisher","unstructured":"Xie S, Wang G, Lin S, Yu P (2012). Review spam detection via temporal pattern discovery. ACM SIGKDD Int Conf Knowledge Discovery and Data Mining, pp.823\u2013831. https:\/\/doi.org\/10.1145\/2339530.2339662","DOI":"10.1145\/2339530.2339662"},{"issue":"3","key":"16293_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3305258","volume":"11","author":"H Xue","year":"2019","unstructured":"Xue H, Wang Q, Luo B, Seo H, Li F (2019) Content-aware trust propagation toward online review spam detection. Journal of Data and Information Quality 11(3):1\u201331. https:\/\/doi.org\/10.1145\/3305258","journal-title":"Journal of Data and Information Quality"},{"key":"16293_CR55","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.tourman.2016.03.021","volume":"56","author":"Y Yang","year":"2016","unstructured":"Yang Y, Mueller N, Croes R (2016) Market accessibility and hotel prices in the Caribbean: The moderating effect of quality-signaling factors. Tour Manage 56:40\u201351. https:\/\/doi.org\/10.1016\/j.tourman.2016.03.021","journal-title":"Tour Manage"},{"key":"16293_CR56","doi-asserted-by":"publisher","unstructured":"Ye J, Akoglu L (2015). Discovering Opinion Spammer Groups by Network Footprints. ACM on Conf Online Social Netw, pp.97. https:\/\/doi.org\/10.1145\/2817946.2820606","DOI":"10.1145\/2817946.2820606"},{"key":"16293_CR57","doi-asserted-by":"publisher","unstructured":"Yilmaz C, Durahim O (2018). SPR2EP: A semi-supervised spam review detection framework. IEEE\/ACM Int Conf Advances in Social Networks Analysis and Mining, pp.306\u2013313. https:\/\/doi.org\/10.1109\/ASONAM.2018.8508314","DOI":"10.1109\/ASONAM.2018.8508314"},{"key":"16293_CR58","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.future.2019.07.044","volume":"102","author":"L You","year":"2019","unstructured":"You L, Peng Q, Xiong Z, He D, Qiu M, Zhang X (2019) Integrating aspect analysis and local outlier factor for intelligent review spam detection. Futur Gener Comput Syst 102:163\u2013172. https:\/\/doi.org\/10.1016\/j.future.2019.07.044","journal-title":"Futur Gener Comput Syst"},{"key":"16293_CR59","doi-asserted-by":"publisher","unstructured":"Yuan C, Zhou W, Ma Q, Lv S, Han J, Hu S (2019). Learning review representations from user and product level information for spam detection. IEEE Int Conf Data Mining, pp.1444\u20131449. https:\/\/doi.org\/10.1109\/ICDM.2019.00188","DOI":"10.1109\/ICDM.2019.00188"},{"issue":"4","key":"16293_CR60","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.ipm.2018.03.007","volume":"54","author":"W Zhang","year":"2018","unstructured":"Zhang W, Du Y, Yoshida T, Wang Q (2018) DRI-RCNN: An approach to deceptive review identification using recurrent convolutional neural network. Inf Process Manage 54(4):576\u2013592. https:\/\/doi.org\/10.1016\/j.ipm.2018.03.007","journal-title":"Inf Process Manage"},{"key":"16293_CR61","doi-asserted-by":"publisher","first-page":"102389","DOI":"10.1016\/j.ipm.2020.102389","volume":"58","author":"M Zhang","year":"2021","unstructured":"Zhang M, Fan B, Zhang N, Wang W, Fan W (2021) Mining product innovation ideas from online reviews. Inf Process Manag 58:102389. https:\/\/doi.org\/10.1016\/j.ipm.2020.102389","journal-title":"Inf Process Manag"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16293-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16293-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16293-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T10:50:08Z","timestamp":1707994208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16293-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":61,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16293"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16293-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,8,5]]},"assertion":[{"value":"28 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work was supported by the National Natural Science Foundation of China (72201272, 72025405, 72088101), the National\u00a0Social Science Foundation of China (22ZDA102), the Hunan Science and Technology Plan Project (2020TP1013, 2020JJ4673,\u00a02023JJ40685), the Shenzhen Basic Research Project for Development of Science and Technology (JCYJ20200109141218676,\u00a0202008291726500001), the Innovation Team Project of Colleges in Guangdong Province (2020KCXTD040), and the Social\u00a0Science Foundation of Hunan Province (20YBA012). The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}