{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:31:03Z","timestamp":1759937463153},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,4,10]],"date-time":"2014-04-10T00:00:00Z","timestamp":1397088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13278-014-0189-1","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T11:00:15Z","timestamp":1397041215000},"source":"Crossref","is-referenced-by-count":16,"title":["SPADE: a social-spam analytics and detection framework"],"prefix":"10.1007","volume":"4","author":[{"given":"De","family":"Wang","sequence":"first","affiliation":[]},{"given":"Danesh","family":"Irani","sequence":"additional","affiliation":[]},{"given":"Calton","family":"Pu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,10]]},"reference":[{"key":"189_CR1","doi-asserted-by":"crossref","unstructured":"Becchetti L, Castillo C, Donato D, Baeza-Yates R, Leonardi S (2008) Link analysis for web spam detection. ACM Trans Web 2(1):42. Art No. 2","DOI":"10.1145\/1326561.1326563"},{"key":"189_CR2","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Proceedings of the seventh annual collaboration, electronic messaging, antiabuse and spam conference (CEAS 2010)"},{"key":"189_CR3","doi-asserted-by":"crossref","unstructured":"Bosma M, Meij E, Weerkamp W (2012) A framework for unsupervised spam detection in social networking sites. In: ECIR 2012 34th European conference on information retrieval, Barcelona, pp 364\u2013375","DOI":"10.1007\/978-3-642-28997-2_31"},{"key":"189_CR4","unstructured":"Byun B, Lee C, Webb S, Irani D, Pu C (2009) An anti-spam filter combination framework for text-and-image emails through incremental learning. In: Proceedings of the sixth conference on email and anti-spam (CEAS 2009)"},{"key":"189_CR5","unstructured":"Carreras X, Marquez L (2001) Boosting trees for anti-spam email filtering. Arxiv preprint"},{"key":"189_CR6","doi-asserted-by":"crossref","unstructured":"Caverlee J, Liu L, Webb S (2008) Socialtrust: tamper-resilient trust establishment in online communities. In: Proceedings of the 8th ACM\/IEEE-CS joint conference on digital libraries","DOI":"10.1145\/1378889.1378908"},{"key":"189_CR7","unstructured":"Caverlee J, Webb S (2008) A large-scale study of MySpace: observations and implications for online social networks. Proceedings of the international conference on weblogs and social media 8"},{"issue":"5","key":"189_CR8","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker H, Wu D, Vapnik V (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5):1048\u20131054","journal-title":"IEEE Trans Neural Netw"},{"issue":"3","key":"189_CR9","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s13278-011-0017-9","volume":"1","author":"M Fazeen","year":"2011","unstructured":"Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1(3):241\u2013254","journal-title":"Soc Netw Anal Min"},{"key":"189_CR10","doi-asserted-by":"crossref","unstructured":"Fetterly D, Manasse M, Najork M (2003) On the evolution of clusters of near-duplicate web pages. In: Proceedings of the first conference on Latin American web congress, LA-WEB \u201903","DOI":"10.1109\/LAWEB.2003.1250280"},{"key":"189_CR11","doi-asserted-by":"crossref","unstructured":"Fetterly D, Manasse M, Najork M (2004) Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. In: Proceedings of the 7th international workshop on the web and databases: colocated with ACM SIGMOD\/PODS 2004, WebDB \u201904","DOI":"10.1145\/1017074.1017077"},{"key":"189_CR12","doi-asserted-by":"crossref","unstructured":"Fetterly D, Manasse M, Najork M (2005) Detecting phrase-level duplication on the world wide web. In: Proceedings of the 28th annual international ACM SIGIR conference on research and development in information retrieval, SIGIR \u201905","DOI":"10.1145\/1076034.1076066"},{"issue":"2","key":"189_CR13","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting. Ann Stat 28(2):337\u2013407","journal-title":"Ann Stat"},{"key":"189_CR14","unstructured":"Google opensocial API (2011). http:\/\/code.google.com\/apis\/opensocial\/"},{"key":"189_CR15","unstructured":"Gosier G (2009) Social networks as an attack platform: Facebook case study. In: Proceedings of the eighth international conference on networks"},{"key":"189_CR16","unstructured":"Gyongyi Z, Garcia-Monlina H, Pedersen J (2004) Combating web spam with trustrank. In: Proceeding of the thirtieth international conference on very large data bases, vol 30"},{"issue":"1","key":"189_CR17","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten I (2009) The WEKA data mining software. ACM SIGKDD Explor Newsl 11(1):10\u201318","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"189_CR18","unstructured":"Han B, Baldwin T (2011) Lexical normalisation of short text messages: makn sens a #twitter. In: Proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies, vol 1. HLT \u201911 association for computational linguistics, Stroudsburg, pp 368\u2013378"},{"key":"189_CR19","unstructured":"Han JS, Park BJ (2012) Efficient detection of content polluters in social networks. In: ICITCS, pp 991\u2013996"},{"key":"189_CR20","unstructured":"Hao S, Syed NA, Feamster N, Gray AG, Krasser S (2009) Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine. In: Proceedings of the 18th conference on USENIX security symposium., SSYM\u201909CA, Berkeley, pp 101\u2013118"},{"key":"189_CR21","doi-asserted-by":"crossref","unstructured":"He Q, Zhuang F, Li J, Shi Z (2010) Parallel implementation of classification algorithms based on MapReduce. Rough set and knowledge technology. Lecture notes in computer science vol 6401, pp 655\u2013662","DOI":"10.1007\/978-3-642-16248-0_89"},{"issue":"1\u20136","key":"189_CR22","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S1389-1286(00)00063-3","volume":"33","author":"J Hirai","year":"2000","unstructured":"Hirai J, Raghavan S, Garcia-Molina H, Paepcke A (2000) WebBase: a repository of web pages. Comput Netw 33(1\u20136):277\u2013293","journal-title":"Comput Netw"},{"key":"189_CR23","unstructured":"HOOTSUITE social media dashboard (2011). http:\/\/hootsuite.com\/"},{"key":"189_CR24","doi-asserted-by":"crossref","unstructured":"Irani D, Webb S, Giffin J, Pu C (2008) Evolutionary study of phishing. In: eCrime researchers summit, pp 1\u201310","DOI":"10.1109\/ECRIME.2008.4696967"},{"key":"189_CR25","doi-asserted-by":"crossref","unstructured":"Irani D, Webb S, Pu C (2010) Study of static classification of social spam profiles in myspace. In: Proceedings of the international AAAI conference on weblogs and social media","DOI":"10.1609\/icwsm.v4i1.14017"},{"key":"189_CR26","unstructured":"Irani D, Webb S, Pu C, Li K (2010) Study of trend-stuffing on twitter through text classification. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS 2010)ACM, New York, pp 112\u2013117"},{"key":"189_CR27","doi-asserted-by":"crossref","unstructured":"Jensen D, Neville J, Gallagher B (2004) Why collective inference improves relational classification. In: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, KDD \u201904, pp 593\u2013598","DOI":"10.1145\/1014052.1014125"},{"key":"189_CR28","doi-asserted-by":"crossref","unstructured":"Jin X, Lin CX, Luo J, Han J (2011) Socialspamguard: a data mining-based spam detection system for social media networks. In: Proceedings of the international conference on very large data bases","DOI":"10.14778\/3402755.3402795"},{"key":"189_CR29","unstructured":"Kreibich C, Kanich C, Levchenko K, Enright B, Voelker G, Paxson V, Savage S (2008) On the spam campaign trail. In: Proceedings of the 1st usenix workshop on large-scale exploits and emergent threats, USENIX association, pp 1\u20139"},{"key":"189_CR30","unstructured":"Learmonth M (2010) Twitter getting serious about spam issue. http:\/\/adage.com\/article\/digital\/digital-marketing-twitter-spam-issue\/142800\/"},{"key":"189_CR31","doi-asserted-by":"crossref","unstructured":"Lee K, Caverlee J, Kamath KY, Cheng Z (2012) Detecting collective attention spam. In: Proceedings of the 2nd joint WICOW\/AIRWeb workshop on web quality, WebQuality \u201912NY, New York, pp 48\u201355","DOI":"10.1145\/2184305.2184316"},{"issue":"1","key":"189_CR32","first-page":"36","volume":"1","author":"E Lex","year":"2010","unstructured":"Lex E, Seifert C, Granitzer M, Juffinger A (2010) Efficient cross-domain classification of weblogs. Int J Intell Comput Res 1(1):36\u201345","journal-title":"Int J Intell Comput Res"},{"key":"189_CR33","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang M, Ma S, Ru L (2008) User behavior oriented web spam detection. In: Proceedings of the 17th international conference on world wide web, WWW \u201908","DOI":"10.1145\/1367497.1367645"},{"key":"189_CR34","doi-asserted-by":"crossref","unstructured":"Ma Y, Wang L, Li L (2010) A parallel and convergent support vector machine based on MapReduce. In: Computer engineering and networking, Lecture notes in electrical engineering, vol 277. Springer International Publishing, pp 585\u2013592","DOI":"10.1007\/978-3-319-01766-2_67"},{"key":"189_CR35","doi-asserted-by":"crossref","unstructured":"Modi S (2013) Relational classification using multiple view approach with voting. Int J Comput Appl 70(16):31\u201336. Published by Foundation of Computer Science, New York","DOI":"10.5120\/12153-8126"},{"key":"189_CR36","doi-asserted-by":"crossref","unstructured":"Ntoulas A, Najork M, Manasse M, Fetterly D (2006) Detecting spam web pages through content analysis. In: Proceedings of the 15th international conference on world wide web, WWW \u201906","DOI":"10.1145\/1135777.1135794"},{"key":"189_CR37","doi-asserted-by":"crossref","unstructured":"Pan SJ, Ni X, Sun JT, Yang Q, Chen Z (2010) Cross-domain sentiment classification via spectral feature alignment. In: Proceedings of the 19th international conference on World wide web, WWW \u201910, pp 751\u2013760","DOI":"10.1145\/1772690.1772767"},{"key":"189_CR38","unstructured":"Pu C, Webb S (2006) Observed trends in spam construction techniques: a case study of spam evolution. In: Proceedings of the third conference on email and anti-spam (CEAS 2006)"},{"key":"189_CR39","doi-asserted-by":"crossref","unstructured":"Pu C, Webb S, Kolesnikov O, Lee W, Lipton R (2006) Towards the integration of diverse spam filtering techniques. In: Proceedings of the IEEE international conference on granular computing (GrC06), pp 17\u201320","DOI":"10.1109\/GRC.2006.1635746"},{"key":"189_CR40","unstructured":"Radlinski F (2007) Addressing malicious noise in clickthrough data. In: Proceedings of the 3rd international workshop on adversarial information retrieval on the web (AIRWeb)."},{"issue":"1","key":"189_CR41","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s13278-010-0011-7","volume":"1","author":"D Rosen","year":"2011","unstructured":"Rosen D, Barnett GA, Kim JH (2011) Social networks and online environments: when science and practice co-evolve. Soc Netw Anal Min 1(1):27\u201342","journal-title":"Soc Netw Anal Min"},{"key":"189_CR42","unstructured":"Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In: Learning for text categorization: papers from the 1998 workshop, vol 62, AAAI Technical, Report WS-98-05, Madison, pp 98\u201305"},{"key":"189_CR43","doi-asserted-by":"crossref","unstructured":"Sebastiani F (2005) Text categorization. In: Text mining and its applications to intelligence, CRM and knowledge management, WIT Press, pp 109\u2013129","DOI":"10.2495\/978-1-85312-995-7\/04"},{"issue":"2","key":"189_CR44","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/2207243.2207252","volume":"13","author":"N Spirin","year":"2012","unstructured":"Spirin N, Han J (2012) Survey on web spam detection: principles and algorithms. SIGKDD Explor Newsl 13(2):50\u201364","journal-title":"SIGKDD Explor Newsl"},{"key":"189_CR45","doi-asserted-by":"crossref","unstructured":"Stein T, Chen E, Mangla K (2011) Facebook immune system. In: Proceedings of the forth ACM EuroSys workshop on social network systems (SNS2011)","DOI":"10.1145\/1989656.1989664"},{"key":"189_CR46","doi-asserted-by":"crossref","unstructured":"Thomas K, Grier C, Ma J, Paxson V, Song D (2011) Design and evaluation of a real-time url spam filtering service. In: Proceedings of the IEEE symposium on security and privacy","DOI":"10.1109\/SP.2011.25"},{"key":"189_CR47","unstructured":"Tweetdeck by twitter (2011). http:\/\/tweetdeck.com\/"},{"key":"189_CR48","unstructured":"Voorhees E, Harman D, U.S. National Institute of Standards and Technology (2005) TREC: experiment and evaluation in information retrieval, MIT press, USA"},{"key":"189_CR49","doi-asserted-by":"crossref","unstructured":"Wang D (2014) Analysis and detection of low quality information in social networks. In: Proceedings of Ph.D. symposium at 30th IEEE international conference on data engineering (ICDE 2014), Chicago","DOI":"10.1109\/ICDEW.2014.6818354"},{"key":"189_CR50","doi-asserted-by":"crossref","unstructured":"Wang D, Irani D, Pu C (2011) A social-spam detection framework. In: Proceedings of the annual collaboration, electronic messaging, antiabuse and spam conference (CEAS 2011), pp 46\u201354","DOI":"10.1145\/2030376.2030382"},{"key":"189_CR51","doi-asserted-by":"crossref","unstructured":"Wang D, Irani D, Pu C (2012) Evolutionary study of web spam: Webb spam corpus 2011 versus webb spam corpus 2006. In: Proceedings of 8th IEEE international conference on collaborative computing: networking, applications and worksharing (CollaborateCom), pp 40\u201349","DOI":"10.4108\/icst.collaboratecom.2012.250689"},{"key":"189_CR52","doi-asserted-by":"crossref","unstructured":"Wang D, Navathe SB, Liu L, Irani D, Tamersoy A, Pu C (2013) Click traffic analysis of short url spam on twitter. In: Proceedings of 9th IEEE international conference on collaborative computing: networking, applications and worksharing (CollaborateCom), pp 250\u2013259","DOI":"10.4108\/icst.collaboratecom.2013.254084"},{"issue":"1","key":"189_CR53","first-page":"36","volume":"9","author":"P Wang","year":"2008","unstructured":"Wang P, Domeniconi C, Hu J (2008) Cross-domain text classification using wikipedia. IEEE Intell Inf Bull 9(1):36\u201345","journal-title":"IEEE Intell Inf Bull"},{"key":"189_CR54","unstructured":"Webb S, Caverlee J, Pu C (2006) Introducing the webb spam corpus: using email spam to identify web spam automatically. In: Proceedings of the third conference on email and anti-spam (CEAS 2006)"},{"key":"189_CR55","unstructured":"Webb S, Caverlee J, Pu C (2007) Characterizing web spam using content and http session analysis. In: Proceedings of the fourth conference on email and anti-spam (CEAS 2007), pp 84\u201389"},{"key":"189_CR56","doi-asserted-by":"crossref","unstructured":"Webb S, Caverlee J, Pu C (2008) Predicting web spam with http session information. In: Proceedings of the seventeenth conference on information and knowledge management (CIKM 2008)","DOI":"10.1145\/1458082.1458129"},{"key":"189_CR57","unstructured":"Webb S, Caverlee J, Pu C (2008) Social honeypots: making friends with a spammer near you. In: Proceedings of the fifth conference on email and anti-spam (CEAS 2008)"},{"issue":"1","key":"189_CR58","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s13278-010-0014-4","volume":"1","author":"AW Wolfe","year":"2011","unstructured":"Wolfe AW (2011) Anthropologist view of social network analysis and data mining. Soc Netw Anal Min 1(1):3\u201319","journal-title":"Soc Netw Anal Min"},{"key":"189_CR59","doi-asserted-by":"crossref","unstructured":"Zhen Y, Li C (2008) Cross-domain knowledge transfer using semi-supervised classification. In: AI 2008: advances in artificial intelligence, vol 5360. Lecture notes in computer science, Springer, Berlin, pp 362\u2013371","DOI":"10.1007\/978-3-540-89378-3_36"},{"key":"189_CR60","doi-asserted-by":"crossref","unstructured":"Zou M, Wang T, Li H, Yang D (2010) A general multi-relational classification approach using feature generation and selection. In: Cao L, Zhong J, Feng Y (eds) Advanced data mining and applications, vol 6441. Lecture notes in computer science, Springer, Berlin, pp 21\u201333","DOI":"10.1007\/978-3-642-17313-4_3"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0189-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0189-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0189-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T23:51:50Z","timestamp":1689119510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0189-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,10]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["189"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0189-1","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,10]]},"article-number":"189"}}