{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:06:07Z","timestamp":1771956367540,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18192-1","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T09:02:31Z","timestamp":1706259751000},"page":"67643-67671","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SUH-AIFRD: A self-training-based hybrid approach for individual fake reviewer detection"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4680-611X","authenticated-orcid":false,"given":"Arvind","family":"Mewada","sequence":"first","affiliation":[]},{"given":"Rupesh Kumar","family":"Dewang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,26]]},"reference":[{"issue":"9","key":"18192_CR1","doi-asserted-by":"publisher","first-page":"13199","DOI":"10.1007\/s11042-022-13702-5","volume":"82","author":"A Mewada","year":"2022","unstructured":"Mewada A, Dewang RK (2022) A comprehensive survey of various methods in opinion spam detection. Multimedia Tools and Applications 82(9):13199\u2013239","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"18192_CR2","doi-asserted-by":"publisher","first-page":"7530","DOI":"10.1016\/j.jksuci.2021.07.021","volume":"34","author":"A Mewada","year":"2022","unstructured":"Mewada A, Dewang RK (2022) Research on false review detection methods: A state-of-the-art review. Journal of King Saud University-Computer and Information Sciences 34(9):7530\u20137546","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"18192_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100413","volume":"41","author":"PK Jain","year":"2021","unstructured":"Jain PK, Pamula R, Srivastava G (2021) A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews. Computer science review 41:100413","journal-title":"Computer science review"},{"issue":"2","key":"18192_CR4","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s10489-022-03427-1","volume":"53","author":"SK Maurya","year":"2023","unstructured":"Maurya SK, Singh D, Maurya AK (2023) Deceptive opinion spam detection approaches: a literature survey. Appl Intell 53(2):2189\u20132234","journal-title":"Appl Intell"},{"key":"18192_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2018.03.015","volume":"112","author":"R Kaur","year":"2018","unstructured":"Kaur R, Singh S, Kumar H (2018) Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches. J Netw Comput Appl 112:53\u201388","journal-title":"J Netw Comput Appl"},{"key":"18192_CR6","doi-asserted-by":"crossref","unstructured":"Jain PK, Pamula R, Ansari S. A supervised machine learning approach for the credibility assessment of user-generated content. Wireless Personal Communications 118:2469\u201385","DOI":"10.1007\/s11277-021-08136-5"},{"key":"18192_CR7","doi-asserted-by":"crossref","unstructured":"Zhang D, Li W, Niu B, Wu C. A deep learning approach for detecting fake reviewers: Exploiting reviewing behavior and textual information. Decision Support Systems 166:113911","DOI":"10.1016\/j.dss.2022.113911"},{"issue":"4","key":"18192_CR8","doi-asserted-by":"publisher","first-page":"3443","DOI":"10.1007\/s11277-022-09719-6","volume":"125","author":"PK Jain","year":"2022","unstructured":"Jain PK, Prakash A (2022) Predicting consumer recommendation decisions from online reviews: A rough set approach. Wireless Pers Commun 125(4):3443\u201360","journal-title":"Wireless Pers Commun"},{"key":"18192_CR9","doi-asserted-by":"crossref","unstructured":"Walther M, Jakobi T, Watson SJ, Stevens G (2023) A systematic literature review about the consumers\u2019 side of fake review detection-Which cues do consumers use to determine the veracity of online user reviews?. Computers in Human Behavior Reports 100278","DOI":"10.1016\/j.chbr.2023.100278"},{"key":"18192_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.121532","volume":"177","author":"JM Sahut","year":"2022","unstructured":"Sahut JM, Hajek P (2022) Mining behavioural and sentiment-dependent linguistic patterns from restaurant reviews for fake review detection. Technol Forecast Soc Chang 177:121532","journal-title":"Technol Forecast Soc Chang"},{"issue":"1","key":"18192_CR11","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1080\/07421222.2018.1440758","volume":"35","author":"N Kumar","year":"2018","unstructured":"Kumar N, Venugopal D, Qiu L, Kumar S (2018) Detecting review manipulation on online platforms with hierarchical supervised learning. J Manag Inf Syst 35(1):350\u201380","journal-title":"J Manag Inf Syst"},{"key":"18192_CR12","doi-asserted-by":"publisher","first-page":"53801","DOI":"10.1109\/ACCESS.2020.2979226","volume":"8","author":"N Hussain","year":"2020","unstructured":"Hussain N, Mirza HT, Hussain I, Iqbal F, Memon I (2020) Spam review detection using the linguistic and spammer behavioral methods. IEEE Access 8:53801\u201316","journal-title":"IEEE Access"},{"issue":"4","key":"18192_CR13","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1109\/TCYB.2018.2877161","volume":"50","author":"Z Wu","year":"2018","unstructured":"Wu Z, Cao J, Wang Y, Wang Y, Zhang L, Wu J (2018) hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE transactions on cybernetics 50(4):1595\u2013606","journal-title":"IEEE transactions on cybernetics"},{"issue":"4","key":"18192_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais ST, Osuna E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intelligent Systems and their applications 13(4):18\u201328","journal-title":"IEEE Intelligent Systems and their applications"},{"key":"18192_CR15","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"3","author":"SR Safavian","year":"1991","unstructured":"Safavian SR, Landgrebe D (1991) A survey of decision tree classifier methodology. IEEE Trans Syst Man Cybern 3:660\u201374","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"2","key":"18192_CR16","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S0031-3203(02)00060-2","volume":"36","author":"A Likas","year":"2003","unstructured":"Likas A, Vlassis N, Verbeek JJ (2003) The global k-means clustering algorithm. Pattern Recogn 36(2):451\u201361","journal-title":"Pattern Recogn"},{"key":"18192_CR17","doi-asserted-by":"crossref","unstructured":"Lim EP, Nguyen VA, Jindal N, Liu B, Lauw HW (2010) Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management (pp. 939\u2013948)","DOI":"10.1145\/1871437.1871557"},{"key":"18192_CR18","doi-asserted-by":"crossref","unstructured":"Xue H, Li F, Seo H, Pluretti R (2015) Trust-aware review spam detection. In 2015 IEEE Trustcom\/BigDataSE\/ISPA (Vol. 1, pp. 726\u2013733). IEEE","DOI":"10.1109\/Trustcom.2015.440"},{"key":"18192_CR19","doi-asserted-by":"crossref","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. In Proceedings of the international AAAI conference on web and social media (Vol. 7, No. 1, pp. 175\u2013184)","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"18192_CR20","unstructured":"Kim J, Kang J, Shin S, Myaeng SH (2021) Can you distinguish truthful from fake reviews? User analysis and assistance tool for fake review detection. In Proceedings of the first workshop on bridging human\u2013computer interaction and natural language processing (pp. 53\u201359)"},{"key":"18192_CR21","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013) Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 632\u2013640)","DOI":"10.1145\/2487575.2487580"},{"key":"18192_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.dss.2015.10.006","volume":"81","author":"M Salehan","year":"2016","unstructured":"Salehan M, Kim DJ (2016) Predicting the performance of online consumer reviews: A sentiment mining approach to big data analytics. Decis Support Syst 81:30\u201340","journal-title":"Decis Support Syst"},{"issue":"11","key":"18192_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0242050","volume":"15","author":"V Batanovi\u0107","year":"2020","unstructured":"Batanovi\u0107 V, Cvetanovi\u0107 M, Nikoli\u0107 B (2020) A versatile framework for resource-limited sentiment articulation, annotation, and analysis of short texts. PLoS ONE 15(11):e0242050","journal-title":"PLoS ONE"},{"key":"18192_CR24","doi-asserted-by":"crossref","unstructured":"Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In Proceedings of the 21st international conference on World Wide Web 201\u2013210","DOI":"10.1145\/2187836.2187864"},{"key":"18192_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107587","volume":"183","author":"L Kuang","year":"2020","unstructured":"Kuang L, Zhang H, Shi R, Liao Z, Yang X (2020) A spam worker detection approach based on heterogeneous network embedding in crowdsourcing platforms. Comput Netw 183:107587","journal-title":"Comput Netw"},{"key":"18192_CR26","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1, pages 309\u2013319. Association for Computational Linguistics"},{"key":"18192_CR27","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2007) Analyzing and detecting review spam. In Seventh IEEE international conference on data mining (ICDM 2007) (pp. 547\u2013552). IEEE","DOI":"10.1109\/ICDM.2007.68"},{"key":"18192_CR28","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.ins.2020.05.084","volume":"536","author":"SJ Ji","year":"2020","unstructured":"Ji SJ, Zhang Q, Li J, Chiu DK, Xu S, Yi L, Gong M (2020) A burst-based unsupervised method for detecting review spammer groups. Inf Sci 536:454\u201369","journal-title":"Inf Sci"},{"key":"18192_CR29","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: Bridging review networks and metadata. In Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining (pp. 985\u2013994)","DOI":"10.1145\/2783258.2783370"},{"key":"18192_CR30","doi-asserted-by":"crossref","unstructured":"Rostami M, Oussalah M, Berahmand K, Farrahi V (2023) Community Detection Algorithms in Healthcare Applications: A Systematic Review. IEEE Access","DOI":"10.1109\/ACCESS.2023.3260652"},{"key":"18192_CR31","doi-asserted-by":"publisher","first-page":"4281","DOI":"10.1007\/s10489-020-01761-w","volume":"50","author":"Y Fang","year":"2020","unstructured":"Fang Y, Wang H, Zhao L, Yu F, Wang C (2020) Dynamic knowledge graph based fake-review detection. Appl Intell 50:4281\u20134295","journal-title":"Appl Intell"},{"issue":"2","key":"18192_CR32","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1080\/07421222.2016.1205907","volume":"33","author":"D Zhang","year":"2016","unstructured":"Zhang D, Zhou L, Kehoe JL, Kilic IY (2016) What online reviewer behaviors really matter? Effects of verbal and nonverbal behaviors on detection of fake online reviews. J Manag Inf Syst 33(2):456\u201381","journal-title":"J Manag Inf Syst"},{"key":"18192_CR33","doi-asserted-by":"crossref","unstructured":"Liu P, Xu Z, Ai J, Wang F (2017) Identifying indicators of fake reviews based on spammer\u2019s behavior features. In2017 IEEE international conference on software quality, reliability and security companion (QRS-C) (pp. 396\u2013403). IEEE","DOI":"10.1109\/QRS-C.2017.72"},{"key":"18192_CR34","doi-asserted-by":"publisher","first-page":"76","DOI":"10.2478\/jdis-2020-0013","volume":"2","author":"A Rastogi","year":"2020","unstructured":"Rastogi A, Mehrotra M, Ali SS (2020) Effective opinion spam detection: A study on review metadata versus content. Journal of Data and Information Science 2:76\u2013110","journal-title":"Journal of Data and Information Science"},{"key":"18192_CR35","unstructured":"Kumar J (2020) Fake Review Detection Using Behavioral and Contextual Features. arXiv:2003.00807"},{"key":"18192_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113728","volume":"155","author":"A Kumar","year":"2022","unstructured":"Kumar A, Gopal RD, Shankar R, Tan KH (2022) Fraudulent review detection model focusing on emotional expressions and explicit aspects: investigating the potential of feature engineering. Decis Support Syst 155:113728","journal-title":"Decis Support Syst"},{"issue":"12","key":"18192_CR37","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38(12):2270\u201385","journal-title":"Pattern Recogn"},{"key":"18192_CR38","doi-asserted-by":"crossref","unstructured":"Rao VM, Sastry VN (2012) Unsupervised feature ranking based on representation entropy. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT) (pp. 421\u2013425). IEEE","DOI":"10.1109\/RAIT.2012.6194631"},{"key":"18192_CR39","doi-asserted-by":"crossref","unstructured":"Rosenberg C, Hebert M, Schneiderman H (2005) Semi-supervised self-training of object detection models. 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV\/MOTION\u201905) 36(2)","DOI":"10.1109\/ACVMOT.2005.107"},{"key":"18192_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110521","volume":"269","author":"R Sheikhpour","year":"2023","unstructured":"Sheikhpour R, Berahmand K, Forouzandeh S (2023) Hessian-based semi-supervised feature selection using generalized uncorrelated constraint. Knowl-Based Syst 269:110521","journal-title":"Knowl-Based Syst"},{"key":"18192_CR41","doi-asserted-by":"crossref","unstructured":"Zhai X, Oliver A, Kolesnikov A, Beyer L (2019) S4l: Self-supervised semi-supervised learning. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 1476\u20131485)","DOI":"10.1109\/ICCV.2019.00156"},{"key":"18192_CR42","doi-asserted-by":"crossref","unstructured":"Dematis I, Karapistoli E, Vakali A (2018) Fake review detection via exploitation of spam indicators and reviewer behavior characteristics. In SOFSEM 2018: Theory and Practice of Computer Science: 44th International Conference on Current Trends in Theory and Practice of Computer Science, Krems, Austria, January 29-February 2, 2018, Proceedings 44, pages 581\u2013595. Springer","DOI":"10.1007\/978-3-319-73117-9_41"},{"key":"18192_CR43","doi-asserted-by":"crossref","unstructured":"Hussain N, Mirza HT, Hussain I et\u00a0al (2019) Detecting spam review through spammer\u2019s behavior analysis. Advances in Distributed Computing and Artificial Intelligence Journal 8","DOI":"10.14201\/ADCAIJ2019826171"},{"key":"18192_CR44","doi-asserted-by":"crossref","unstructured":"Khalifa MB, Elouedi Z, Lefevre E (2020) An evidential spammer detection based on the suspicious behaviors\u2019 indicators. In 2020 International Multi-Conference on:\u201cOrganization of Knowledge and Advanced Technologies\u201d(OCTA), pages 1\u20138. IEEE","DOI":"10.1109\/OCTA49274.2020.9151805"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18192-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18192-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18192-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T06:38:15Z","timestamp":1731134295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18192-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":44,"journal-issue":{"issue":"26","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["18192"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18192-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"11 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests:"}},{"value":"This article does not involve studies with human or animal subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval:"}}]}}