{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:19:53Z","timestamp":1765484393294,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s13198-023-02208-4","type":"journal-article","created":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T14:02:22Z","timestamp":1702994542000},"page":"1210-1230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Deceptive opinion spam detection using feature reduction techniques"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0838-2491","authenticated-orcid":false,"given":"Sushil Kumar","family":"Maurya","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Ashish Kumar","family":"Maurya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,19]]},"reference":[{"key":"2208_CR1","doi-asserted-by":"crossref","unstructured":"Algur SP, Patil AP, Hiremath PS, Shivashankar S (2010) Conceptual level similarity measure based review spam detection. In: 2010 International conference on signal and image processing, IEEE, pp 416\u2013423","DOI":"10.1109\/ICSIP.2010.5697509"},{"issue":"5","key":"2208_CR2","doi-asserted-by":"publisher","first-page":"3475","DOI":"10.1007\/s00500-019-04107-y","volume":"24","author":"MZ Asghar","year":"2020","unstructured":"Asghar MZ, Ullah A, Ahmad S, Khan A (2020) Opinion spam detection framework using hybrid classification scheme. Soft Comput 24(5):3475\u20133498","journal-title":"Soft Comput"},{"key":"2208_CR3","doi-asserted-by":"crossref","unstructured":"Barushka A, Hajek P (2019) Review spam detection using word embeddings and deep neural networks. In: Artificial intelligence applications and innovations: 15th IFIP WG 12.5 international conference, AIAI 2019, hersonissos, crete, greece, May 24\u201326, 2019, proceedings, vol 15. Springer International Publishing, pp 340\u2013350","DOI":"10.1007\/978-3-030-19823-7_28"},{"issue":"1","key":"2208_CR4","first-page":"100006","volume":"1","author":"J Batra","year":"2021","unstructured":"Batra J, Jain R, Tikkiwal VA, Chakraborty A (2021) A comprehensive study of spam detection in e-mails using bio-inspired optimization techniques. Int J Inf Manag Data Insights 1(1):100006","journal-title":"Int J Inf Manag Data Insights"},{"key":"2208_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.neucom.2019.10.118","volume":"408","author":"J Cervantes","year":"2020","unstructured":"Cervantes J, Garcia-Lamont F, Rodr\u00edguez-Mazahua L, Lopez A (2020) A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408:189\u2013215","journal-title":"Neurocomputing"},{"issue":"5","key":"2208_CR6","doi-asserted-by":"publisher","first-page":"4765","DOI":"10.1007\/s10462-022-10275-5","volume":"56","author":"VG Costa","year":"2023","unstructured":"Costa VG, Pedreira CE (2023) Recent advances in decision trees: an updated survey. Artif Intell Rev 56(5):4765\u20134800","journal-title":"Artif Intell Rev"},{"key":"2208_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.patrec.2018.07.013","volume":"132","author":"M Dong","year":"2020","unstructured":"Dong M, Yao L, Wang X, Benatallah B, Huang C, Ning X (2020) Opinion fraud detection via neural autoencoder decision forest. Pattern Recogn Lett 132:21\u201329","journal-title":"Pattern Recogn Lett"},{"key":"2208_CR8","first-page":"175","volume":"13","author":"G Fei","year":"2013","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. ICWSM 13:175\u2013184","journal-title":"ICWSM"},{"key":"2208_CR9","unstructured":"Feng S, Banerjee R, Choi Y (2012) Syntactic stylometry for deception detection. In: Proceedings of the 50th annual meeting of the association for computational linguistics, vol 2. Short Papers, pp 171\u2013175"},{"key":"2208_CR10","doi-asserted-by":"publisher","first-page":"73992","DOI":"10.1109\/ACCESS.2020.2988550","volume":"8","author":"Z Hameed","year":"2020","unstructured":"Hameed Z, Garcia-Zapirain B (2020) Sentiment classification using a single-layered bilstm model. IEEE Access 8:73992\u201374001","journal-title":"IEEE Access"},{"issue":"7","key":"2208_CR11","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari A, Ali-Tavakoli M, Salim N, Heydari Z (2015) Detection of review spam: a survey. Expert Syst Appl 42(7):3634\u20133642","journal-title":"Expert Syst Appl"},{"issue":"8","key":"2208_CR12","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"2208_CR13","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2007) Analyzing and detecting review spam. In: 7th IEEE international conference on data mining ICDM 2007, pp 547-552","DOI":"10.1109\/ICDM.2007.68"},{"key":"2208_CR14","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the 2008 international conference on web search and data mining, pp 219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"2208_CR15","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1201\/9781003010623-15","volume-title":"R for political data science","author":"C Labr\u00edn","year":"2020","unstructured":"Labr\u00edn C, Urdinez F (2020) Principal component analysis. R for political data science. Chapman and Hall\/CRC, Boca Raton, pp 375\u2013393"},{"key":"2208_CR16","unstructured":"Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: International conference on machine learning, PMLR, pp 1188\u20131196"},{"key":"2208_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.neucom.2016.10.080","volume":"254","author":"L Li","year":"2017","unstructured":"Li L, Qin B, Ren W, Liu T (2017) Document representation and feature combination for deceptive spam review detection. Neurocomputing 254:33\u201341","journal-title":"Neurocomputing"},{"issue":"1","key":"2208_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11036-020-01688-z","volume":"26","author":"Y Li","year":"2021","unstructured":"Li Y, Wang F, Zhang S, Niu X (2021) Detection of fake reviews using group model. Mob Netw Appl 26(1):91\u2013103","journal-title":"Mob Netw Appl"},{"key":"2208_CR19","doi-asserted-by":"crossref","unstructured":"Li J, Ott M, Cardie C, Hovy E (2014) Towards a general rule for identifying deceptive opinion spam. In: Proceedings of the 52nd annual meeting of the association for computational linguistics, vol 1. Long Papers, pp 1566\u20131576","DOI":"10.3115\/v1\/P14-1147"},{"issue":"3","key":"2208_CR20","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s00607-019-00763-y","volume":"102","author":"W Liu","year":"2020","unstructured":"Liu W, Jing W, Li Y (2020) Incorporating feature representation into bilstm for deceptive review detection. Computing 102(3):701\u2013715","journal-title":"Computing"},{"issue":"4","key":"2208_CR21","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TCSS.2018.2878852","volume":"5","author":"S Madisetty","year":"2018","unstructured":"Madisetty S, Desarkar MS (2018) A neural network-based ensemble approach for spam detection in twitter. IEEE Trans Comput Soc Syst 5(4):973\u2013984","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2208_CR22","doi-asserted-by":"publisher","first-page":"108246","DOI":"10.1016\/j.asoc.2021.108246","volume":"118","author":"L Malandri","year":"2022","unstructured":"Malandri L, Porcel C, Xing F, Serrano-Guerrero J, Cambria E (2022) Soft computing for recommender systems and sentiment analysis. Appl Soft Comput 118:108246","journal-title":"Appl Soft Comput"},{"issue":"2","key":"2208_CR23","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s10489-022-03427-1","volume":"53","author":"SK Maurya","year":"2023","unstructured":"Maurya SK, Singh D, Maurya AK (2023) Deceptive opinion spam detection approaches: a literature survey. Appl Intell 53(2):2189\u20132234","journal-title":"Appl Intell"},{"key":"2208_CR24","volume-title":"Materials today proceedings","author":"A Mewada","year":"2021","unstructured":"Mewada A, Dewang RK (2021) Deceptive reviewer detection by analyzing web data using HMM and similarity measures. Materials today proceedings. Elsevier, Amsterdam"},{"key":"2208_CR25","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, pp 3111\u20133119"},{"issue":"1","key":"2208_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1111\/coin.12397","volume":"37","author":"H Mohammadzadeh","year":"2021","unstructured":"Mohammadzadeh H, Gharehchopogh FS (2021) A novel hybrid whale optimization algorithm with flower pollination algorithm for feature selection: case study email spam detection. Comput Intell 37(1):176\u2013209","journal-title":"Comput Intell"},{"key":"2208_CR27","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on World Wide Web, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"2208_CR28","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013) Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"2208_CR29","doi-asserted-by":"crossref","unstructured":"Narayan R, Rout JK, Jena SK (2018) Review spam detection using opinion mining. In: Progress in intelligent computing techniques: theory, practice, and applications: proceedings of ICACNI 2016, vol 2. Springer, Singapore, pp 273\u2013279","DOI":"10.1007\/978-981-10-3376-6_30"},{"key":"2208_CR30","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint arXiv:1107.4557"},{"key":"2208_CR31","unstructured":"Ott M, Cardie C, Hancock JT (2013) Negative deceptive opinion spam. In: Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies, pp 497\u2013501"},{"key":"2208_CR32","doi-asserted-by":"crossref","unstructured":"Radovanovi\u00b4c D, Krstaji\u00b4c B (2018) Review spam detection using machine learning. In: 2018 23rd international scientific-professional conference on information technology (IT), IEEE, pp 1\u20134","DOI":"10.1109\/SPIT.2018.8350457"},{"key":"2208_CR33","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"key":"2208_CR34","unstructured":"Ren Y, Zhang Y (2016) Deceptive opinion spam detection using neural network. In: Proceedings of COLING 2016, the 26th international conference on computational linguistics: technical papers, pp 140\u2013150"},{"key":"2208_CR35","doi-asserted-by":"crossref","unstructured":"Sandulescu V, Ester M (2015) Detecting singleton review spammers using semantic similarity. In: Proceedings of the 24th international conference on World Wide Web, pp 971\u2013976","DOI":"10.1145\/2740908.2742570"},{"key":"2208_CR36","first-page":"1","volume":"22","author":"S Saumya","year":"2020","unstructured":"Saumya S, Singh JP et al (2020) Spam review detection using LSTM autoencoder: an unsupervised approach. Electron Commer Res 22:1\u201321","journal-title":"Electron Commer Res"},{"key":"2208_CR37","doi-asserted-by":"crossref","unstructured":"Shojaee S, Murad MAA, Azman AB, Sharef NM, Nadali S (2013) Detecting deceptive reviews using lexical and syntactic features. In: 2013 13th international conference on intellient systems design and applications, IEEE, pp 53\u201358","DOI":"10.1109\/ISDA.2013.6920707"},{"key":"2208_CR38","doi-asserted-by":"crossref","unstructured":"Shuai Q, Huang Y, Jin L, Pang L (2018) Sentiment analysis on Chinese hotel reviews with doc2vec and classifiers. In: 2018 IEEE 3rd advanced information technology, electronic and automation control conference (IAEAC), IEEE, pp 1171\u20131174","DOI":"10.1109\/IAEAC.2018.8577581"},{"issue":"1","key":"2208_CR39","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929\u20131958","journal-title":"J Mach Learn Res"},{"key":"2208_CR40","doi-asserted-by":"crossref","unstructured":"Sun H, Morales A, Yan X (2013) Synthetic review spamming and defense. In: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1088\u20131096","DOI":"10.1145\/2487575.2487688"},{"issue":"6","key":"2208_CR41","doi-asserted-by":"publisher","first-page":"102381","DOI":"10.1016\/j.ipm.2020.102381","volume":"57","author":"Y Tian","year":"2020","unstructured":"Tian Y, Mirzabagheri M, Tirandazi P, Bamakan SMH (2020) A non-convex semi-supervised approach to opinion spam detection by ramp-one class SVM. Inf Process Manag 57(6):102381","journal-title":"Inf Process Manag"},{"issue":"3","key":"2208_CR42","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Songmin Gu, Zhao X, Xiaowei Xu (2018b) Graph-based review spammer group detection. Knowl Inf Syst 55(3):571\u2013597","journal-title":"Knowl Inf Syst"},{"key":"2208_CR43","doi-asserted-by":"crossref","unstructured":"Wang C-C, Day M-Y, Chen C-C, Liou J-W (2018) Detecting spamming reviews using long short-term memory recurrent neural network framework. In: Proceedings of the 2nd international conference on E-commerce, E-Business and E-Government, pp 16\u201320","DOI":"10.1145\/3234781.3234794"},{"issue":"3","key":"2208_CR44","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s00500-020-05297-6","volume":"25","author":"I Wickramasinghe","year":"2021","unstructured":"Wickramasinghe I, Kalutarage H (2021) Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation. Soft Comput 25(3):2277\u20132293","journal-title":"Soft Comput"},{"key":"2208_CR45","doi-asserted-by":"crossref","unstructured":"Wu G, Greene D, Smyth B, Cunningham P (2010) Distortion as a validation criterion in the identification of suspicious reviews. In: Proceedings of the first workshop on social media analytics, pp 10\u201313","DOI":"10.1145\/1964858.1964860"},{"key":"2208_CR46","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-1-4419-9878-1_4","volume":"2013","author":"P Xanthopoulos","year":"2013","unstructured":"Xanthopoulos P, Pardalos PM, Trafalis TB, Xanthopoulos P, Pardalos PM, Trafalis TB (2013) Linear discriminant analysis. Robust Data Min 2013:27\u201333. https:\/\/doi.org\/10.1007\/978-1-4419-9878-1_4","journal-title":"Robust Data Min"},{"key":"2208_CR47","unstructured":"Xu Q, Zhao H (2012) Using deep linguistic features for finding deceptive opinion SPAM. In: Proceedings of COLING 2012: posters, pp 1341\u20131350"},{"issue":"2","key":"2208_CR48","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1080\/1540496X.2020.1825935","volume":"58","author":"L Yu","year":"2022","unstructured":"Yu L, Zhou R, Chen R, Lai KK (2022) Missing data preprocessing in credit classification: one-hot encoding or imputation? Emerg Mark Financ Trade 58(2):472\u2013482","journal-title":"Emerg Mark Financ Trade"},{"key":"2208_CR49","doi-asserted-by":"crossref","unstructured":"Zhang Y, Rao Z (2020) n-bilstm: bilstm with n-gram features for text classification. In: 2020 IEEE 5th information technology and mechatronics engineering conference (ITOEC), IEEE, pp 1056\u20131059","DOI":"10.1109\/ITOEC49072.2020.9141692"},{"key":"2208_CR50","doi-asserted-by":"crossref","unstructured":"Zou X, Hu Y, Tian Z, Shen K (2019) Logistic regression model optimization and case analysis. In: 2019 IEEE 7th international conference on computer science and network technology (ICCSNT), IEEE, pp 135\u2013139","DOI":"10.1109\/ICCSNT47585.2019.8962457"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02208-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-023-02208-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02208-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T07:21:42Z","timestamp":1710746502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-023-02208-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["2208"],"URL":"https:\/\/doi.org\/10.1007\/s13198-023-02208-4","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"28 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not involve human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animals participants"}},{"value":"There is no plagiarism.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}