{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:23:55Z","timestamp":1771064635581,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11227-024-06459-1","type":"journal-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:02:16Z","timestamp":1724958136000},"page":"27176-27203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Graph neural network-based attention mechanism to classify spam review over heterogeneous social networks"],"prefix":"10.1007","volume":"80","author":[{"given":"Monti Babulal","family":"Pal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sanjay","family":"Agrawal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"issue":"2","key":"6459_CR1","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s11227-020-03294-y","volume":"77","author":"R Kaliyar","year":"2021","unstructured":"Kaliyar R, Goswami A, Narang P (2021) DeepFakE: improving fake news detection using tensor decomposition-based deep neural network. J Supercomput 77(2):1015\u20131037","journal-title":"J Supercomput"},{"key":"6459_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-023-05381-2","volume":"79","author":"L Fu","year":"2023","unstructured":"Fu L, Peng H, Liu S (2023) KG-MFEND: an efficient knowledge graph-based model for multi-domain fake news detection. J Supercomput 79:1\u201328","journal-title":"J Supercomput"},{"key":"6459_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-023-05179-2","volume":"79","author":"G Tripathy","year":"2023","unstructured":"Tripathy G, Sharaff A (2023) AEGA: enhanced feature selection based on ANOVA and extended genetic algorithm for online customer review analysis. J Supercomput 79:1\u201330","journal-title":"J Supercomput"},{"key":"6459_CR4","first-page":"1","volume":"79","author":"L Xiang","year":"2022","unstructured":"Xiang L, You H, Guo G, Li Q (2022) Deep feature fusion for cold-start spam review detection. J Supercomput 79:1\u201316","journal-title":"J Supercomput"},{"key":"6459_CR5","first-page":"1","volume":"79","author":"L Xiang","year":"2022","unstructured":"Xiang L, You H, Guo G, Li Q (2022) Deep feature fusion for cold-start spam review detection. J Supercomput 79:1\u201316","journal-title":"J Supercomput"},{"key":"6459_CR6","doi-asserted-by":"crossref","unstructured":"Yang P, Zheng Z (2020) Fake account detection with attention-based graph convolution networks. In: 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), pp.\u00a0106\u2013110","DOI":"10.1109\/AUTEEE50969.2020.9315597"},{"key":"6459_CR7","doi-asserted-by":"crossref","unstructured":"Lin H, Zhang X, Fu X (2020) A graph convolutional encoder and decoder model for rumor detection. In: 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), pp.\u00a0300\u2013306","DOI":"10.1109\/DSAA49011.2020.00043"},{"key":"6459_CR8","doi-asserted-by":"publisher","first-page":"68140","DOI":"10.1109\/ACCESS.2019.2918196","volume":"7","author":"F Masood","year":"2019","unstructured":"Masood F, Ammad G, Almogren A, Abbas A, Khattak HA, Ud Din I, Guizani M, Zuair M (2019) Spammer detection and fake user identification on social networks. IEEE Access 7:68140\u201368152","journal-title":"IEEE Access"},{"key":"6459_CR9","doi-asserted-by":"crossref","unstructured":"Wang C, Yoshikane N, Tsuritani T (2021) Usage of a graph neural network for large-scale network performance evaluation. In: 2021 International Conference on Optical Network Design and Modeling (ONDM), pp.\u00a01\u20135","DOI":"10.23919\/ONDM51796.2021.9492331"},{"key":"6459_CR10","doi-asserted-by":"crossref","unstructured":"Sarma D, Alam W, Saha I, Alam MN, Alam MJ, Hossain S (2020) Bank fraud detection using community detection algorithm. In: 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), pp.\u00a0642\u2013646,","DOI":"10.1109\/ICIRCA48905.2020.9182954"},{"key":"6459_CR11","doi-asserted-by":"crossref","unstructured":"Patel NA, Patel R (2018) A survey on fake review detection using machine learning techniques. In: 2018 4th International Conference on Computing Communication and Automation (ICCCA), pp.\u00a01\u20136","DOI":"10.1109\/CCAA.2018.8777594"},{"key":"6459_CR12","doi-asserted-by":"crossref","unstructured":"Hassan R, Islam MR (2019) Detection of fake online reviews using semi-supervised and supervised learning. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp.\u00a01\u20135","DOI":"10.1109\/ECACE.2019.8679186"},{"key":"6459_CR13","doi-asserted-by":"crossref","unstructured":"Sihombing A, Fong A (2019) Fake review detection on yelp dataset using classification techniques in machine learning. In: 2019 International Conference on contemporary Computing and Informatics (IC3I), pp.\u00a064\u201368","DOI":"10.1109\/IC3I46837.2019.9055644"},{"key":"6459_CR14","doi-asserted-by":"publisher","first-page":"25555","DOI":"10.1109\/ACCESS.2022.3152806","volume":"10","author":"H Tufail","year":"2022","unstructured":"Tufail H, Ashraf MU, Alsubhi K, Aljahdali HM (2022) The effect of fake reviews on e-commerce during and after Covid-19 pandemic: SKL-based fake reviews detection. IEEE Access 10:25555\u201325564","journal-title":"IEEE Access"},{"key":"6459_CR15","doi-asserted-by":"publisher","first-page":"3765","DOI":"10.1109\/ACCESS.2020.3047947","volume":"9","author":"M Liu","year":"2021","unstructured":"Liu M, Shang Y, Yue Q, Zhou J (2021) Detecting fake reviews using multidimensional representations with fine-grained aspects plan. IEEE Access 9:3765\u20133773","journal-title":"IEEE Access"},{"issue":"7","key":"6459_CR16","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TIFS.2017.2675361","volume":"12","author":"S Shehnepoor","year":"2017","unstructured":"Shehnepoor S, Salehi M, Farahbakhsh R, Crespi N (2017) NetSpam: a network-based spam detection framework for reviews in online social media. IEEE Trans Info Foren Secur 12(7):1585\u20131595","journal-title":"IEEE Trans Info Foren Secur"},{"key":"6459_CR17","doi-asserted-by":"crossref","unstructured":"U\u00e7kun FA, \u00d6zer H, Nurba\u015f E, Onat E (2020) Direction finding using convolutional neural networks and convolutional recurrent neural networks. In: 2020 28th Signal Processing and Communications Applications Conference (SIU), pp.\u00a01\u20134","DOI":"10.1109\/SIU49456.2020.9302448"},{"key":"6459_CR18","doi-asserted-by":"crossref","unstructured":"Yang L, Zeng S, Zhou Y, Pan B, Feng Y, Li D (2019) Design of convolutional neural network based on tree fork module. In: 2019 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), pp.\u00a01\u20134","DOI":"10.1109\/DCABES48411.2019.00008"},{"key":"6459_CR19","doi-asserted-by":"crossref","unstructured":"Takamura K, Yamane S (2020) Proposal of quantized tree-LSTM and its experimental evaluation. In: 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), pp.\u00a0202\u2013204","DOI":"10.1109\/GCCE50665.2020.9291804"},{"key":"6459_CR20","doi-asserted-by":"publisher","first-page":"64927","DOI":"10.1109\/ACCESS.2018.2877934","volume":"6","author":"Y Dai","year":"2018","unstructured":"Dai Y, Guo W, Chen X, Zhang Z (2018) Relation classification via LSTMs based on sequence and tree structure. IEEE Access 6:64927\u201364937","journal-title":"IEEE Access"},{"key":"6459_CR21","doi-asserted-by":"crossref","unstructured":"Hu Y (2021) Research on city traffic flow forecast based on graph convolutional neural network. In: 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp.\u00a0269\u2013273","DOI":"10.1109\/ICBAIE52039.2021.9389951"},{"issue":"11","key":"6459_CR22","doi-asserted-by":"publisher","first-page":"5441","DOI":"10.1109\/TNNLS.2018.2803523","volume":"29","author":"M Bongini","year":"2018","unstructured":"Bongini M, Rigutini L, Trentin E (2018) Recursive neural networks for density estimation over generalized random graphs. IEEE Trans Neural Netw Learn Syst 29(11):5441\u20135458","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6459_CR23","doi-asserted-by":"crossref","unstructured":"Zhou X, Lu L (2020) Defect prediction via LSTM based on sequence and tree structure. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), pp.\u00a0366\u2013373","DOI":"10.1109\/QRS51102.2020.00055"},{"key":"6459_CR24","doi-asserted-by":"crossref","unstructured":"Ahmed M, Samee MR, Mercer RE (2019) Improving tree-LSTM with tree attention. In: 2019 IEEE 13th International Conference on Semantic Computing (ICSC), pp.\u00a0247\u2013254","DOI":"10.1109\/ICOSC.2019.8665673"},{"key":"6459_CR25","doi-asserted-by":"crossref","unstructured":"Shekhovtsov VA, Steinberger C, Kop C (2021) Model based coupling of context aware middleware and ambient assisted healthcare systems. In: 2021 ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), pp.\u00a0188\u2013196","DOI":"10.1109\/MODELS-C53483.2021.00033"},{"key":"6459_CR26","doi-asserted-by":"crossref","unstructured":"Anisi MH, Abdullah AH, Razak SA (2011) Evaluation of object-based and ontology-based models in context-aware systems. In: 2011 Fifth Asia Modelling Symposium, pp.\u00a051\u20135","DOI":"10.1109\/AMS.2011.21"},{"key":"6459_CR27","doi-asserted-by":"crossref","unstructured":"Liu H, Chen SM (2018) Multi-level fusion of classifiers through fuzzy ensemble learning. In: 2018 11th International Symposium on Computational Intelligence and Design (ISCID) 02, 19\u201322","DOI":"10.1109\/ISCID.2018.10106"},{"key":"6459_CR28","doi-asserted-by":"crossref","unstructured":"Mandloi L, Patel R (2020) Twitter sentiments analysis using machine learninig methods. In: 2020 International Conference for Emerging Technology (INCET), pp.\u00a01\u20135","DOI":"10.1109\/INCET49848.2020.9154183"},{"key":"6459_CR29","doi-asserted-by":"crossref","unstructured":"Dhawan S, Singh K, Chauhan P (2019) Sentiment analysis of twitter data in online social network. In: 2019 5th International Conference on Signal Processing, Computing and Control (ISPCC), pp.\u00a0255\u2013259","DOI":"10.1109\/ISPCC48220.2019.8988450"},{"key":"6459_CR30","doi-asserted-by":"publisher","first-page":"194166","DOI":"10.1109\/ACCESS.2020.3031217","volume":"8","author":"JZ Maitama","year":"2020","unstructured":"Maitama JZ, Idris N, Abdi A, Shuib L, Fauzi R (2020) A systematic review on implicit and explicit aspect extraction in sentiment analysis. IEEE Access 8:194166\u2013194191","journal-title":"IEEE Access"},{"issue":"2","key":"6459_CR31","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1109\/TNNLS.2020.2978942","volume":"32","author":"X Shu","year":"2021","unstructured":"Shu X, Zhang L, Sun Y, Tang J (2021) Host-parasite: graph LSTM-in-LSTM for group activity recognition. IEEE Trans Neural Netw Learn Syst 32(2):663\u2013674","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6459_CR32","doi-asserted-by":"publisher","first-page":"194166","DOI":"10.1109\/ACCESS.2020.3031217","volume":"8","author":"JZ Maitama","year":"2020","unstructured":"Maitama JZ, Idris N, Abdi A, Shuib L, Fauzi R (2020) A systematic review on implicit and explicit aspect extraction in sentiment analysis. IEEE Access 8:194166\u2013194191","journal-title":"IEEE Access"},{"key":"6459_CR33","doi-asserted-by":"crossref","unstructured":"Huang Y, Chung W, Tang X (2018) A temporal recurrent neural network approach to detecting market anomaly attacks. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp.\u00a0160\u2013162","DOI":"10.1109\/ISI.2018.8587397"},{"key":"6459_CR34","doi-asserted-by":"crossref","unstructured":"Tao G, Heng Z, Yanmin H, Yu L (2021) Contrastive multi-view self-supervised learning for heterogeneous information network. In: 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp.\u00a052\u201356","DOI":"10.1109\/ICCWAMTIP53232.2021.9674109"},{"issue":"4","key":"6459_CR35","doi-asserted-by":"publisher","first-page":"233","DOI":"10.26599\/BDMA.2021.9020008","volume":"4","author":"J Zhang","year":"2021","unstructured":"Zhang J, Xu Q (2021) Attention-aware heterogeneous graph neural network. Big Data Mining Anal 4(4):233\u2013241","journal-title":"Big Data Mining Anal"},{"issue":"6","key":"6459_CR36","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TCSS.2021.3085406","volume":"8","author":"P Rathore","year":"2021","unstructured":"Rathore P, Soni J, Prabakar N, Palaniswami M, Santi P (2021) Identifying groups of fake reviewers using a semisupervised approach. IEEE Trans Comput Social Syst 8(6):1369\u20131378","journal-title":"IEEE Trans Comput Social Syst"},{"key":"6459_CR37","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J (2015) Towards collusive fraud detection in online reviews. In: 2015 IEEE International Conference on Data Mining, pp.\u00a01051\u20131056","DOI":"10.1109\/ICDM.2015.62"},{"key":"6459_CR38","doi-asserted-by":"crossref","unstructured":"Li WZ, Huang L, Wang CD, Ye YX (2021) Stargat: Star-shaped hierarchical graph attentional network for heterogeneous network representation learning. In: 2021 IEEE International Conference on Data Mining (ICDM), pp.\u00a01198\u20131203","DOI":"10.1109\/ICDM51629.2021.00144"},{"key":"6459_CR39","doi-asserted-by":"crossref","unstructured":"Chivukula R, Lakshmi TJ (2021) Mining heterogeneous information networks: a review. In: 2021 IEEE Pune Section International Conference (PuneCon), pp.\u00a01\u20134","DOI":"10.1109\/PuneCon52575.2021.9686506"},{"key":"6459_CR40","doi-asserted-by":"crossref","unstructured":"Goularas D, Kamis S (2019) Evaluation of deep learning techniques in sentiment analysis from twitter data. In: 2019 International Conference on Deep Learning and Machine Learning in Emerging Applications (Deep-ML), pp.\u00a012\u201317","DOI":"10.1109\/Deep-ML.2019.00011"},{"key":"6459_CR41","doi-asserted-by":"crossref","unstructured":"Guobei C, Wenfu Y, Wei L, Xuan Z, Jian Y, Xiaoning Z (2019) Method for generating infrared big data for deep learning algorithm training by using small sample data. In: 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), pp.\u00a01\u20135","DOI":"10.1109\/ICSIDP47821.2019.9173440"},{"issue":"4","key":"6459_CR42","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/EMR.2019.2928964","volume":"47","author":"W Liu","year":"2019","unstructured":"Liu W, He J, Han S, Cai F, Yang Z, Zhu N (2019) A method for the detection of fake reviews based on temporal features of reviews and comments. IEEE Eng Manag Rev 47(4):67\u201379","journal-title":"IEEE Eng Manag Rev"},{"key":"6459_CR43","doi-asserted-by":"crossref","unstructured":"Deng H, Zhao L, Luo N, Liu Y, Guo G, Wang X, Tan Z, Wang S, Zhou F (2017) Semi-supervised learning based fake review detection. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC), pp.\u00a01278\u20131280","DOI":"10.1109\/ISPA\/IUCC.2017.00195"},{"key":"6459_CR44","doi-asserted-by":"crossref","unstructured":"Wang BC, Zhu WY, Chen LJ (2008) Improving the amazon review system by exploiting the credibility and time-decay of public reviews. In: 2008 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol.\u00a03, pp.\u00a0123\u2013126","DOI":"10.1109\/WIIAT.2008.30"},{"key":"6459_CR45","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Mukhopadhyay S, Panigrahi PK, Goswami S (2019) Utilization of oversampling for multiclass sentiment analysis on amazon review dataset. In: 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), pp.\u00a01\u20136","DOI":"10.1109\/ICAwST.2019.8923260"},{"key":"6459_CR46","doi-asserted-by":"crossref","unstructured":"Motevallian SN, Hossein\u00a0Hasheminejad SM (2021) Using trust statements and ratings by graphsage to alleviate cold start in recommender systems. In: 2021 12th International Conference on Information and Knowledge Technology (IKT), pp.\u00a0139\u2013143","DOI":"10.1109\/IKT54664.2021.9685137"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06459-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06459-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06459-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T09:13:35Z","timestamp":1728033215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06459-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":46,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6459"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06459-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,29]]},"assertion":[{"value":"13 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}