{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T11:10:08Z","timestamp":1751713808586,"version":"3.41.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370208"],"award-info":[{"award-number":["61370208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1527303"],"award-info":[{"award-number":["CNS-1527303"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OAC-1642124"],"award-info":[{"award-number":["OAC-1642124"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Wireless Communications Technology"},{"name":"Collaborative Innovation Center of Social Safety Science and Technology"},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"Key Laboratory of Computer Network and Information Integration of Ministry of Education of China","award":["93K-9"],"award-info":[{"award-number":["93K-9"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772133,61472081"],"award-info":[{"award-number":["61772133,61472081"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61320106007"],"award-info":[{"award-number":["61320106007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11280-018-0613-y","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T07:41:51Z","timestamp":1530085311000},"page":"2953-2975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of and defense against crowd-retweeting based spam in social networks"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5209-9063","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zeyang","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Junzhou","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jiuxin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Benyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"issue":"1","key":"613_CR1","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.1145\/1326561.1326563","volume":"2","author":"L Becchetti","year":"2008","unstructured":"Becchetti, L., Castillo, C., Donato, D., Baeza-YATES, R., Leonardi, S.: Link analysis for Web spam detection. ACM Trans. Web 2(1), 2:1\u20132:42 (2008)","journal-title":"ACM Trans. Web"},{"key":"613_CR2","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (2010)"},{"key":"613_CR3","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.future.2016.05.036","volume":"72","author":"C Chen","year":"2017","unstructured":"Chen, C., Wen, S., Zhang, J., Xiang, Y., Oliver, J., Alelaiwi, A., Hassan, M.M.: Investigating the deceptive information in twitter spam. Futur. Gener. Comput. Syst. 72, 319\u2013326 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"613_CR4","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. In: Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM \u201913, pp. 116\u2013120 (2013)","DOI":"10.1145\/2492517.2492637"},{"key":"613_CR5","unstructured":"Crawler4j: https:\/\/github.com\/yasserg\/crawler4j (2017)"},{"key":"613_CR6","unstructured":"Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium(NDSS), San Diego, 8th February - 11th February (2009)"},{"key":"613_CR7","doi-asserted-by":"crossref","unstructured":"Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp. 233\u2013242. ACM (2015)","DOI":"10.1145\/2766462.2767742"},{"key":"613_CR8","unstructured":"Fielding, N., Cobain, L.: Revealed: Us spy operation that manipulates social media http:\/\/www.guardian.co.uk\/technology\/2011\/mar\/17\/us-spy-operation-social-networks (2011)"},{"key":"613_CR9","unstructured":"Freelancer.com: https:\/\/www.freelancer.com\/about (2017)"},{"key":"613_CR10","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st international conference on World Wide Web, WWW \u201912, pp. 61\u201370 (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"613_CR11","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/B978-012088469-8\/50052-8","volume-title":"Proceedings 2004 VLDB Conference","author":"Zolt\u00e1n Gy\u00f6ngyi","year":"2004","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating Web spam with trustrank In: Proceedings of the Thirtieth international conference on very large data bases, vol. 30, VLDB \u201904, pp. 576\u2013587 (2004)"},{"key":"613_CR12","doi-asserted-by":"crossref","unstructured":"Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI \u201908, pp. 453\u2013456 (2008)","DOI":"10.1145\/1357054.1357127"},{"issue":"5","key":"613_CR13","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604\u2013632 (1999)","journal-title":"J. ACM"},{"key":"613_CR14","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media?. In: Proceedings of the 19th international conference on World Wide Web, WWW \u201910, pp. 591\u2013600 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"613_CR15","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval, SIGIR \u201910, pp. 435\u2013442 (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"613_CR16","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Z., Mukherjee, A., Liu, B., Shao, J.: Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In: ICWSM, pp. 634\u2013637 (2015)","DOI":"10.1609\/icwsm.v9i1.14652"},{"key":"613_CR17","unstructured":"Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X.: On crowd-retweeting spamming campaign in social networks. In: IEEE international conference on communications (ICC), 2016., pp. 1\u20136. IEEE (2016)"},{"key":"613_CR18","unstructured":"Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay Me and I\u2019ll follow you: detection of crowdturfing following activities in microblog environment. In: International joint conference on artificial intelligence (IJCAI) (2016)"},{"key":"613_CR19","unstructured":"Lunden, I.: Twitter vulnerability allows cyber criminals to spread spam. http:\/\/www.one.com (2012)"},{"key":"613_CR20","doi-asserted-by":"crossref","unstructured":"Matthias, H., Tobias, H., Tran-Gia, P.: Anatomy of a crowdsourcing platform - using the example of microworkers.com. In: Proceedings of the 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, IMIS \u201911, pp. 322\u2013329 (2011)","DOI":"10.1109\/IMIS.2011.89"},{"key":"613_CR21","unstructured":"Microworkers.com: https:\/\/ttv.microworkers.com\/index\/template (2017)"},{"key":"613_CR22","unstructured":"Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: Dirty jobs: the role of freelance labor in Web service abuse. In: Proceedings of the 20th USENIX conference on security, SEC\u201911, pp. 14\u201314 (2011)"},{"key":"613_CR23","unstructured":"Sandaha: http:\/\/www.sandaha.com\/ (2017)"},{"key":"613_CR24","unstructured":"Scrapy: https:\/\/github.com\/scrapy\/scrapy (2017)"},{"key":"613_CR25","unstructured":"SDK, S.W.O.: http:\/\/open.weibo.com\/wiki\/SDK (2017)"},{"key":"613_CR26","unstructured":"Smith, C.: 61 amazing weibo statistics and facts. Digital Statistics and Gadgets 2017-03-18. http:\/\/expandedramblings.com\/index.php\/weibo-user-statistics\/ (2017)"},{"key":"613_CR27","unstructured":"Sparks, D.: How many users does twitter have? The Motley Fool (2017)"},{"key":"613_CR28","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC \u201911, pp. 243\u2013258 (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"613_CR29","unstructured":"Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, NSDI\u201909, pp. 15\u201328 (2009)"},{"key":"613_CR30","unstructured":"Turk, A.M.: https:\/\/requester.mturk.com\/ (2017)"},{"key":"613_CR31","unstructured":"Twitter: http:\/\/www.twitter.com\/ (2017)"},{"issue":"4","key":"613_CR32","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"41","author":"B Viswanath","year":"2010","unstructured":"Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev 41(4), 363\u2013374 (2010)","journal-title":"SIGCOMM Comput. Commun. Rev"},{"key":"613_CR33","doi-asserted-by":"crossref","unstructured":"Wang, A.H.: Don\u2019T follow me - spam detection in twitter. In: Proc. of IEEE SECRYPT, pp. 142\u2013151 (2010)","DOI":"10.5220\/0002996201420151"},{"key":"613_CR34","doi-asserted-by":"crossref","unstructured":"Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., Zhao, B.Y.: Serf and turf: Crowdturfing for fun and profit. In: Proceedings of the 21st International conference on World Wide Web, WWW \u201912, pp. 679\u2013688 (2012)","DOI":"10.1145\/2187836.2187928"},{"key":"613_CR35","unstructured":"Weibo, S.: http:\/\/weibo.com\/ (2017)"},{"key":"613_CR36","unstructured":"Wikipedia: Internet water army http:\/\/en.wikipedia.org\/wiki\/Internet_Water_Army (2015)"},{"key":"613_CR37","doi-asserted-by":"crossref","unstructured":"Xue, J., Yang, Z., Yang, X., Wang, X., Chen, L., Dai, Y.: Votetrust: leveraging friend invitation graph to defend against social network sybils. In: Proceeding of the 32Nd IEEE international conference on computer communications, INFOCOM \u20192013 (2013)","DOI":"10.1109\/INFCOM.2013.6567045"},{"key":"613_CR38","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web, WWW \u201912, pp. 71\u201380 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"613_CR39","first-page":"318","volume-title":"Lecture Notes in Computer Science","author":"Chao Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th international conference on recent advances in intrusion detection, RAID\u201911, pp. 318\u2013337 (2011)"},{"key":"613_CR40","doi-asserted-by":"crossref","unstructured":"Yang, X., Yang, Q., Wilson, C.: Penny for your thoughts: searching for the 50 cent party on Sina Weibo. In: ICWSM, pp. 694\u2013697 (2015)","DOI":"10.1609\/icwsm.v9i1.14649"},{"key":"613_CR41","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC \u201911, pp. 259\u2013268 (2011)","DOI":"10.1145\/2068816.2068841"},{"issue":"3","key":"613_CR42","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"H Yu","year":"2010","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. IEEE\/ACM Trans. Netw. 18(3), 885\u2013898 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"613_CR43","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM \u201906, pp. 267\u2013278 (2006)","DOI":"10.1145\/1159913.1159945"},{"key":"613_CR44","unstructured":"Zhubajie: http:\/\/www.zhubajie.com\/ (2017)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0613-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-018-0613-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0613-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T10:46:53Z","timestamp":1751712413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-018-0613-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["613"],"URL":"https:\/\/doi.org\/10.1007\/s11280-018-0613-y","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"6 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}