{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:27:46Z","timestamp":1774024066377,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572215"],"award-info":[{"award-number":["61572215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019kfyXKJC021"],"award-info":[{"award-number":["2019kfyXKJC021"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019kfyXJJS091"],"award-info":[{"award-number":["2019kfyXJJS091"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11280-019-00717-6","type":"journal-article","created":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T02:02:36Z","timestamp":1566525756000},"page":"693-714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Misinformation-oriented expert finding in social networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Guohui","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Fuming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jiansen","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Congyuan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Nguyen Quoc Viet","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Phan Thanh","family":"Cong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8639-4570","authenticated-orcid":false,"given":"Bolong","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"717_CR1","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, A., Becchetti, L., Fazzone, A., Mele, I., Riondato, M.: The importance of being expert: efficient max-finding in crowdsourcing. In: SIGMOD Conference, pp. 983\u2013998. ACM (2015)","DOI":"10.1145\/2723372.2723722"},{"key":"717_CR2","doi-asserted-by":"crossref","unstructured":"Antoniadis, S., Litou, I., Kalogeraki, V.: A model for identifying misinformation in online social networks. In: OTM Conferences, volume 9415 of Lecture Notes in Computer Science, pp. 473\u2013482. Springer (2015)","DOI":"10.1007\/978-3-319-26148-5_32"},{"key":"717_CR3","doi-asserted-by":"crossref","unstructured":"Balog, K., Azzopardi, L., de Rijke, M.: Formal models for expert finding in enterprise corpora. In: SIGIR, pp. 43\u201350. ACM (2006)","DOI":"10.1145\/1148170.1148181"},{"key":"717_CR4","doi-asserted-by":"crossref","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. In: NIPS, pp. 601\u2013608. MIT Press (2001)","DOI":"10.7551\/mitpress\/1120.003.0082"},{"key":"717_CR5","doi-asserted-by":"crossref","unstructured":"Bozzon, A., Brambilla, M., Ceri, S., Silvestri, M., Vesci, G.: Choosing the right crowd: expert finding in social networks. In: EDBT, pp. 637\u2013648. ACM (2013)","DOI":"10.1145\/2452376.2452451"},{"issue":"2","key":"717_CR6","first-page":"263","volume":"19","author":"PF Brown","year":"1993","unstructured":"Brown, P.F., Pietra, S.D., Pietra, V.J., Mercer, R.L.: Della The mathematics of statistical machine translation: Parameter estimation. Comput. Linguist. 19(2), 263\u2013311 (1993)","journal-title":"Comput. Linguist."},{"key":"717_CR7","doi-asserted-by":"crossref","unstructured":"Campbell, C.S., Maglio, P.P., Cozzi, A., Dom, B.: Expertise identification using email communications. In: CIKM, pp. 528\u2013531. ACM (2003)","DOI":"10.1145\/956863.956965"},{"key":"717_CR8","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: WWW, pp. 675\u2013684. ACM (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"717_CR9","unstructured":"Chang, J., Blei, D.M.: Relational topic models for document networks. In: AISTATS, volume 5 of JMLR Proceedings, pp. 81\u201388. JMLR.org (2009)"},{"key":"717_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Caverlee, J., Barthwal, H., Bachani, V.: Finding local experts on twitter. In: WWW (Companion Volume), pp. 241\u2013242. ACM (2014)","DOI":"10.1145\/2567948.2577354"},{"key":"717_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Caverlee, J., Barthwal, H., Bachani, V.: Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter. In: SIGIR, pages 335\u2013344. ACM (2014)","DOI":"10.1145\/2600428.2609580"},{"issue":"2","key":"717_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/S0306-4573(99)00017-5","volume":"36","author":"CLA Clarke","year":"2000","unstructured":"Clarke, C.L.A., Cormack, G.V., Tudhope, E.A.s: Relevance ranking for one to three term queries. Inf Process. Manage. 36(2), 291\u2013311 (2000)","journal-title":"Inf Process. Manage."},{"key":"717_CR13","doi-asserted-by":"crossref","unstructured":"Craswell, N., de Vries, A.P., Soboroff, I.: Overview of the TREC 2005 enterprise track. In: TREC, volume Special Publication 500-266. National Institute of Standards and Technology (NIST) (2005)","DOI":"10.6028\/NIST.SP.500-266.enterprise-overview"},{"key":"717_CR14","doi-asserted-by":"crossref","unstructured":"Dom, B., Eiron, I., Cozzi, A., Yi, Z.: Graph-Based Ranking Algorithms for E-Mail Expertise Analysis. In: DMKD, pp. 42\u201348. ACM (2003)","DOI":"10.1145\/882082.882093"},{"key":"717_CR15","doi-asserted-by":"crossref","unstructured":"Fang, H., Zhai, C.: Probabilistic Models for Expert Finding. In: ECIR, volume 4425 of Lecture Notes in Computer Science, pp. 418\u2013430. Springer (2007)","DOI":"10.1007\/978-3-540-71496-5_38"},{"issue":"3","key":"717_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIS.2011.52","volume":"26","author":"H Gao","year":"2011","unstructured":"Gao, H., Barbier, G., Goolsby, R.: Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intell. Syst. 26(3), 10\u201314 (2011)","journal-title":"IEEE Intell. Syst."},{"key":"717_CR17","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Sharma, N.K., Benevenuto, F., Ganguly, N., Gummadi Krishna P.: Cognos: crowdsourcing search for topic experts in microblogs. In: SIGIR, pp. 575\u2013590. ACM (2012)","DOI":"10.1145\/2348283.2348361"},{"key":"717_CR18","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1007\/978-1-4614-6170-8_296","volume-title":"Encyclopedia of Social Network Analysis and Mining","author":"Aditi Gupta","year":"2014","unstructured":"Gupta, A., Kumaraguru, P.: Misinformation in social networks, analyzing twitter during crisis events. In: Encyclopedia of Social Network Analysis and Mining, pp. 922\u2013931 (2014)"},{"key":"717_CR19","doi-asserted-by":"crossref","unstructured":"Gupta, P., Goel, A., Lin, J.J., Sharma, A., Wang, D., Zadeh, R.: WTF: the who to follow service at twitter. In: WWW, International World Wide Web Conferences Steering Committee, pp. 505\u2013514. ACM (2013)","DOI":"10.1145\/2488388.2488433"},{"key":"717_CR20","unstructured":"Hernacki, B., Bennett, J.: Detecting network evasion and misinformation, December 7 2010. US Patent 7,848,235"},{"key":"717_CR21","unstructured":"Hofmann, T.: Probabilistic latent semantic analysis. CoRR, arXiv: 1301.6705 (2013)"},{"key":"717_CR22","doi-asserted-by":"crossref","unstructured":"Jain, S., Sharma, V., Kaushal, R.: Towards automated real-time detection of misinformation on twitter. In: ICACCI, pp. 2015\u20132020. IEEE (2016)","DOI":"10.1109\/ICACCI.2016.7732347"},{"key":"717_CR23","doi-asserted-by":"crossref","unstructured":"Lehmann, J., Castillo, C., Lalmas, M., Zuckerman, E.: Finding news curators in twitter. In: WWW (Companion Volume), pages 863\u2013870. International World Wide Web Conferences Steering Committee \/ ACM (2013)","DOI":"10.1145\/2487788.2488068"},{"issue":"3","key":"717_CR24","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s00778-018-0499-4","volume":"27","author":"L Li","year":"2018","unstructured":"Li, L., Zheng, K., Wang, S., Hua, W., Zhou, X.: Go slow to go fast: minimal on-road time route scheduling with parking facilities using historical trajectory. VLDB J. 27(3), 321\u2013345 (2018)","journal-title":"VLDB J."},{"key":"717_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., Ma, S., Zhang, Y., Huang, R.: Expertise network discovery via topic and link analysis in online communities. In: ICALT, pp. 311\u2013315. IEEE Computer Society (2012)","DOI":"10.1109\/ICALT.2012.80"},{"issue":"3","key":"717_CR26","doi-asserted-by":"publisher","first-page":"33:1","DOI":"10.1145\/3182166","volume":"36","author":"D Lian","year":"2018","unstructured":"Lian, D., Zheng, K., Ge, Y., Cao, L., Chen, E., Xie, X.: Geomf++:, Scalable location recommendation via joint geographical modeling and matrix factorization. ACM Trans. Inf. Syst. 36(3), 33:1\u201333:29 (2018)","journal-title":"ACM Trans. Inf. Syst."},{"key":"717_CR27","unstructured":"Liang, C., Liu, Z., Sun, M.: Expert Finding for Microblog Misinformation Identification. In: COLING (Posters), pp. 703\u2013712. Indian Institute of Technology Bombay (2012)"},{"issue":"5","key":"717_CR28","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11390-017-1772-5","volume":"32","author":"L An","year":"2017","unstructured":"An, L., Li, Z., Liu, G., Zheng, K., Zhang, M., Li, Q., Zhang, X.: Privacy-preserving task assignment in spatial crowdsourcing. J. Comput. Sci Technol. 32(5), 905\u2013918 (2017)","journal-title":"J. Comput. Sci Technol."},{"issue":"2","key":"717_CR29","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10707-017-0305-2","volume":"22","author":"L An","year":"2018","unstructured":"An, L., Wang, W., Shang, S., Li, Q., Zhang, X.: Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica 22 (2), 335\u2013362 (2018)","journal-title":"GeoInformatica"},{"issue":"6","key":"717_CR30","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TKDE.2017.2785824","volume":"30","author":"G Liu","year":"2018","unstructured":"Liu, G., Yi, L., Zheng, K., An, L., Li, Z., Wang, Y., Zhou, X.: MCS-GPM: Multi-constrained simulation based graph pattern matching in contextual social graphs. IEEE Trans. Knowl. Data Eng. 30(6), 1050\u20131064 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"717_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Niculescu-mizil, A., Gryc, W.: Topic-Link LDA: Joint Models of Topic and Author Community. In: ICML, volume 382 of ACM International Conference Proceeding Series, pp. 665\u2013672. ACM (2009)","DOI":"10.1145\/1553374.1553460"},{"key":"717_CR32","doi-asserted-by":"crossref","unstructured":"Macdonald, C., Ounis, I.: Expertise drift and query expansion in expert search. In: CIKM, pp. 341\u2013350. ACM (2007)","DOI":"10.1145\/1321440.1321490"},{"key":"717_CR33","doi-asserted-by":"crossref","unstructured":"Manku, G.S., Jain, A., Sarma, A.D.: Detecting near-duplicates for Web crawling. In: WWW, pp. 141\u2013150. ACM (2007)","DOI":"10.1145\/1242572.1242592"},{"key":"717_CR34","doi-asserted-by":"crossref","unstructured":"McDonald, D.W., Ackerman, M.S.: Just talk to me: a field study of expertise location. In: CSCW, pp. 315\u2013324. ACM (1998)","DOI":"10.1145\/289444.289506"},{"key":"717_CR35","doi-asserted-by":"crossref","unstructured":"Mei, Q., Cai, D., Zhang, D., Zhai, C.X.: Topic modeling with network regularization. In: WWW, pp. 101\u2013110. ACM (2008)","DOI":"10.1145\/1367497.1367512"},{"key":"717_CR36","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we rt? In SOMA@KDD, pp. 71\u201379. ACM (2010)","DOI":"10.1145\/1964858.1964869"},{"key":"717_CR37","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: ICLR (Workshop) (2013)"},{"issue":"2","key":"717_CR38","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1006\/jcss.2000.1711","volume":"61","author":"CH Papadimitriou","year":"2000","unstructured":"Papadimitriou, C.H., Raghavan, P., Tamaki, H., Vempala, S.: Latent semantic indexing: a probabilistic analysis. J. Comput. Syst. Sci. 61(2), 217\u2013235 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"717_CR39","doi-asserted-by":"crossref","unstructured":"Ramage, D., Hall, D., Nallapati, R., Manning, C.D.: Labeled LDA: a supervised topic model for credit attribution in multi-labeled corpora. In: EMNLP, pp. 248\u2013256. ACL (2009)","DOI":"10.3115\/1699510.1699543"},{"key":"717_CR40","doi-asserted-by":"crossref","unstructured":"Seo, E., Mohapatra, P., Abdelzaher, T.: Identifying rumors and their sources in social networks. In: Ground\/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR III, vol. 8389, p. 83891I. International Society for Optics and Photonics (2012)","DOI":"10.1117\/12.919823"},{"key":"717_CR41","doi-asserted-by":"crossref","unstructured":"Serdyukov, P., Feng, L., van Bunningen, A.H., Evers, S., van Heerde, H, Apers, P.M.G., Fokkinga, M.M., Hiemstra, D.: The right expert at the right time and place. In: PAKM, volume 5345 of Lecture Notes in Computer Science, pages 38\u201349. Springer (2008)","DOI":"10.1007\/978-3-540-89447-6_6"},{"key":"717_CR42","doi-asserted-by":"crossref","unstructured":"Serdyukov, P., Rode, H., Hiemstra, D.: University of twente at the TREC 2007 enterprise track: Modeling relevance propagation for the expert search task. In: TREC, volume Special Publication 500-274. National Institute of Standards and Technology (NIST) (2007)","DOI":"10.6028\/NIST.SP.500-274.enterprise-twenteu.serdyuko"},{"key":"717_CR43","doi-asserted-by":"crossref","unstructured":"Smirnova, E.: A model for expert finding in social networks. In: SIGIR, pp. 1191\u20131192. ACM (2011)","DOI":"10.1145\/2009916.2010114"},{"key":"717_CR44","unstructured":"Vosoughi, S.: Automatic Detection and Verification of Rumors on Twitter. PhD thesis, sMassachusetts Institute of Technology (2015)"},{"issue":"7","key":"717_CR45","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/TKDE.2016.2539166","volume":"28","author":"W Wei","year":"2016","unstructured":"Wei, W., Cong, G., Miao, C., Zhu, F., Li, G.: Learning to find topic experts in twitter via different relations. IEEE Trans. Knowl Data Eng. 28(7), 1764\u20131778 (2016)","journal-title":"IEEE Trans. Knowl Data Eng."},{"key":"717_CR46","doi-asserted-by":"crossref","unstructured":"Xiao, M., Ma, K., An, L., Zhao, H., Li, Z., Zheng, K., Zhou, X.: Sra: secure reverse auction for task assignment in spatial crowdsourcing. IEEE Transactions on Knowledge and Data Engineering (2019)","DOI":"10.1109\/TKDE.2019.2893240"},{"key":"717_CR47","unstructured":"Zheng, X u, Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Transactions on Cloud Computing (2016)"},{"issue":"5","key":"717_CR48","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1007\/s11280-018-0638-2","volume":"22","author":"D Zhai","year":"2019","unstructured":"Zhai, D., Sun, Y., An, L., Li, Z., Liu, G., Zhao, L., Zheng, K.: Towards secure and truthful task assignment in spatial crowdsourcing. World Wide Web 22(5), 2017\u20132040 (2019)","journal-title":"World Wide Web"},{"key":"717_CR49","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zheng, K., Li, Y., Han, S., Liu, J., Zhou, X.: Destination-aware task assignment in spatial crowdsourcing: A worker decomposition approach. IEEE Transactions on Knowledge and Data Engineering (2019)","DOI":"10.1109\/TKDE.2019.2922604"},{"issue":"9","key":"717_CR50","doi-asserted-by":"publisher","first-page":"1846","DOI":"10.1109\/TKDE.2017.2703848","volume":"29","author":"B Zheng","year":"2017","unstructured":"Zheng, B., Han, S., Hua, W., Zheng, K., Zhou, X., Li, G.: Efficient clue-based route search on road networks. IEEE Trans. Knowl Data Eng. 29(9), 1846\u20131859 (2017)","journal-title":"IEEE Trans. Knowl Data Eng."},{"key":"717_CR51","doi-asserted-by":"crossref","unstructured":"Zheng, K., Zhao, Y., Lian, D., Zheng, B., Liu, G., Zhou, X.: Reference-based framework for spatio-temporal trajectory compression and query processing. IEEE Transactions on Knowledge and Data Engineering (2019)","DOI":"10.1109\/TKDE.2019.2914449"},{"issue":"8","key":"717_CR52","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/TKDE.2013.160","volume":"26","author":"K Zheng","year":"2014","unstructured":"Zheng, K., Zheng, Y., Yuan, N.J., Shang, S., Zhou, X.: Online discovery of gathering patterns over trajectories. IEEE Trans. Knowl Data Eng. 26(8), 1974\u20131988 (2014)","journal-title":"IEEE Trans. Knowl Data Eng."}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00717-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-019-00717-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00717-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T12:28:03Z","timestamp":1721651283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-019-00717-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["717"],"URL":"https:\/\/doi.org\/10.1007\/s11280-019-00717-6","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"29 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}