{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T08:26:12Z","timestamp":1768724772998,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T00:00:00Z","timestamp":1657497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T00:00:00Z","timestamp":1657497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172059"],"award-info":[{"award-number":["62172059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010083","name":"Hunan Provincial Innovation Foundation for Postgraduate","doi-asserted-by":"publisher","award":["CX20210812"],"award-info":[{"award-number":["CX20210812"]}],"id":[{"id":"10.13039\/501100010083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972057"],"award-info":[{"award-number":["61972057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2022JJ30623"],"award-info":[{"award-number":["2022JJ30623"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Fund of Hunan Provincial Education Department of China","award":["21A0211"],"award-info":[{"award-number":["21A0211"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11227-022-04685-z","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T18:02:54Z","timestamp":1657648974000},"page":"419-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Deep feature fusion for cold-start spam review detection"],"prefix":"10.1007","volume":"79","author":[{"given":"Lingyun","family":"Xiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5592-0195","authenticated-orcid":false,"given":"Huiqing","family":"You","sequence":"additional","affiliation":[]},{"given":"Guoqing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,11]]},"reference":[{"key":"4685_CR1","unstructured":"Luca M (2016) Reviews, reputation, and revenue: the case of yelp. com. Com (March 15, 2016). Harvard Business School NOM Unit Working Paper (12-016)"},{"issue":"6","key":"4685_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1509\/jm.11.0011","volume":"77","author":"NN Ho-Dac","year":"2013","unstructured":"Ho-Dac NN, Carson SJ, Moore WL (2013) The effects of positive and negative online customer reviews: do brand strength and category maturity matter? J Mark 77(6):37\u201353","journal-title":"J Mark"},{"issue":"2","key":"4685_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1509\/jm.74.2.133","volume":"74","author":"F Zhu","year":"2010","unstructured":"Zhu F, Zhang X (2010) Impact of online consumer reviews on sales: The moderating role of product and consumer characteristics. J Mark 74(2):133\u2013148","journal-title":"J Mark"},{"key":"4685_CR4","doi-asserted-by":"publisher","first-page":"53801","DOI":"10.1109\/ACCESS.2020.2979226","volume":"8","author":"N Hussain","year":"2020","unstructured":"Hussain N, Mirza HT, Hussain I, Iqbal F, Memon I (2020) Spam review detection using the linguistic and spammer behavioral methods. IEEE Access 8:53801\u201353816","journal-title":"IEEE Access"},{"key":"4685_CR5","doi-asserted-by":"publisher","first-page":"65771","DOI":"10.1109\/ACCESS.2021.3075573","volume":"9","author":"R Mohawesh","year":"2021","unstructured":"Mohawesh R, Xu S, Tran SN, Ollington R, Springer M, Jararweh Y, Maqsood S (2021) Fake reviews detection: a survey. IEEE Access 9:65771\u201365802","journal-title":"IEEE Access"},{"key":"4685_CR6","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N (2013) What yelp fake review filter might be doing? In: Seventh International AAAI Conference on Weblogs and Social Media"},{"key":"4685_CR7","doi-asserted-by":"crossref","unstructured":"Wang X, Liu K, Zhao J (2017) Handling cold-start problem in review spam detection by jointly embedding texts and behaviors. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 366\u2013376","DOI":"10.18653\/v1\/P17-1034"},{"issue":"7","key":"4685_CR8","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TIFS.2017.2675361","volume":"12","author":"S Shehnepoor","year":"2017","unstructured":"Shehnepoor S, Salehi M, Farahbakhsh R, Crespi N (2017) Netspam: a network-based spam detection framework for reviews in online social media. IEEE Trans Inf Forensics Secur 12(7):1585\u20131595","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4685_CR9","unstructured":"Dou Y (2019) A review of recent advance in online spam detection"},{"key":"4685_CR10","unstructured":"You Z, Qian T, Liu B (2018) An attribute enhanced domain adaptive model for cold-start spam review detection. In: Proceedings of the 27th International Conference on Computational Linguistics, pp. 1884\u20131895"},{"key":"4685_CR11","doi-asserted-by":"publisher","first-page":"3456","DOI":"10.1109\/TIFS.2021.3081258","volume":"16","author":"S Shehnepoor","year":"2021","unstructured":"Shehnepoor S, Togneri R, Liu W, Bennamoun M (2021) Dfraud$$^3$$: Multi-component fraud detection free of cold-start. IEEE Trans Inf Forensics Secur 16:3456\u20133468","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4685_CR12","unstructured":"Bordes A, Usunier N, Garcia-Duran A, Weston J, Yakhnenko O (2013) Translating embeddings for modeling multi-relational data. Adv Neural Inform Process Syst 26"},{"key":"4685_CR13","doi-asserted-by":"crossref","unstructured":"Huynh V-P, Papotti P (2018) Towards a benchmark for fact checking with knowledge bases. In: Companion Proceedings of the The Web Conference 2018, pp. 1595\u20131598","DOI":"10.1145\/3184558.3191616"},{"key":"4685_CR14","doi-asserted-by":"crossref","unstructured":"Gori M, Monfardini G, Scarselli F (2005) A new model for learning in graph domains. In: Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005., vol. 2, pp. 729\u2013734 . IEEE","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"4685_CR15","doi-asserted-by":"crossref","unstructured":"Xu B, Shen H, Sun B, An R, Cao Q, Cheng X (2021) Towards consumer loan fraud detection: Graph neural networks with role-constrained conditional random field. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4537\u20134545","DOI":"10.1609\/aaai.v35i5.16582"},{"issue":"1","key":"4685_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00697-w","volume":"10","author":"W Kudo","year":"2020","unstructured":"Kudo W, Nishiguchi M, Toriumi F (2020) Gcnext: graph convolutional network with expanded balance theory for fraudulent user detection. Soc Netw Anal Min 10(1):1\u201312","journal-title":"Soc Netw Anal Min"},{"key":"4685_CR17","doi-asserted-by":"crossref","unstructured":"Zhang S, Yin H, Chen T, Hung QVN, Huang Z, Cui L (2020) Gcn-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 689\u2013698","DOI":"10.1145\/3397271.3401165"},{"key":"4685_CR18","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"4685_CR19","doi-asserted-by":"crossref","unstructured":"Xiang L, Guo G, Li Q, Zhu C, Chen J, Ma H (2020) Spam detection in reviews using lstm-based multi-entity temporal features. Intell Automat Soft Comput","DOI":"10.32604\/iasc.2020.013382"},{"key":"4685_CR20","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: Bridging review networks and metadata. In: Proceedings of the 21th Acm Sigkdd International Conference on Knowledge Discovery and Data Mining, pp. 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"key":"4685_CR21","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"key":"4685_CR22","doi-asserted-by":"crossref","unstructured":"Du C, Sun H, Wang J, Qi Q, Liao J (2020) Adversarial and domain-aware bert for cross-domain sentiment analysis. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, pp. 4019\u20134028","DOI":"10.18653\/v1\/2020.acl-main.370"},{"key":"4685_CR23","doi-asserted-by":"crossref","unstructured":"Zhang X, Lai H, Feng J (2018) Attention-aware deep adversarial hashing for cross-modal retrieval. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 591\u2013606","DOI":"10.1007\/978-3-030-01267-0_36"},{"key":"4685_CR24","first-page":"289","volume":"29","author":"J Lu","year":"2016","unstructured":"Lu J, Yang J, Batra D, Parikh D (2016) Hierarchical question-image co-attention for visual question answering. Adv Neural Inf Process Syst 29:289\u2013297","journal-title":"Adv Neural Inf Process Syst"},{"key":"4685_CR25","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013) Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"4685_CR26","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N et al (2013) Fake review detection: Classification and analysis of real and pseudo reviews. UIC-CS-03-2013. Technical Report"},{"key":"4685_CR27","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. arXiv preprint arXiv:1710.10903"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04685-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04685-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04685-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T23:58:05Z","timestamp":1727567885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04685-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,11]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["4685"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04685-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,11]]},"assertion":[{"value":"21 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}