{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:17:27Z","timestamp":1775067447469,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Science and Technology Development Plan of Jilin Province","award":["20190303107SF"],"award-info":[{"award-number":["20190303107SF"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3028588","type":"journal-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T21:06:43Z","timestamp":1601932003000},"page":"182625-182639","source":"Crossref","is-referenced-by-count":59,"title":["Fake Review Detection Based on Multiple Feature Fusion and Rolling Collaborative Training"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7037-951X","authenticated-orcid":false,"given":"Jingdong","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6493-4668","authenticated-orcid":false,"given":"Haitao","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Fanqi","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7079-4182","authenticated-orcid":false,"given":"Qizi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Genhua","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1317-7820","authenticated-orcid":false,"given":"Xixi","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref38","first-page":"41","article-title":"A comparison of event models for naive Bayes text classification","volume":"752","author":"mccallum","year":"1998","journal-title":"Proc AAAI Workshop Learn Text Categorization"},{"key":"ref33","article-title":"Unknown examples & machine learning model generalization","author":"chung","year":"2018","journal-title":"arXiv 1808 08294"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_19"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.03.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8662912"},{"key":"ref37","author":"breiman","year":"1984","journal-title":"Classification Regression Trees"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref35","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref34","first-page":"1","article-title":"The effect of perceived usefulness of online reviews on hotel booking intentions","volume":"14","author":"de castro oliveira","year":"2020","journal-title":"Revista Brasileira Pesquisa Turismo"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01761-w"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23281-8_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918196"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2014.12.004"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.13189\/aeb.2013.010101","article-title":"Importance of online product reviews from a consumer&#x2019;s perspective","volume":"1","author":"lackermair","year":"2013","journal-title":"Adv Econ Bus"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.03.036"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1068-7"},{"key":"ref26","first-page":"866","article-title":"Detecting deceptive review spam via attention-based neural networks","author":"wang","year":"2017","journal-title":"Proc Conf Natural Lang Process Chin Comput"},{"key":"ref25","first-page":"639","article-title":"Deceptive reviews detection based on positive and unlabeled learning","volume":"52","author":"yafeng","year":"2015","journal-title":"J Comput Res Develop"},{"key":"ref50","first-page":"1884","article-title":"An attribute enhanced domain adaptive model for cold-start spam review detection","author":"you","year":"2018","journal-title":"Proc 27th Int Conf Comput Linguistics"},{"key":"ref51","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"dem\u0161ar","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-211-93971-0_4"},{"key":"ref11","article-title":"Finding deceptive opinion spam by any stretch of the imagination","author":"ott","year":"2011","journal-title":"arXiv 1107 4557"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-013-9268-8"},{"key":"ref13","first-page":"171","article-title":"Syntactic stylometry for deception detection","volume":"2","author":"feng","year":"2012","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref14","first-page":"81","article-title":"Research on product review attribute-based of emotion evaluate review spam detection","volume":"30","author":"yanfang","year":"2014","journal-title":"Data Analysis and Knowledge Discovery"},{"key":"ref15","first-page":"217","article-title":"Topicspam: A topic-model based approach for spam detection","volume":"2","author":"li","year":"2013","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322792"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.007"},{"key":"ref4","first-page":"2498","article-title":"Deceptive reviews detection of technology products based on behavior and content","volume":"36","author":"deng","year":"2015","journal-title":"J Chin Comput Syst"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/JPBM-05-2014-0611"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00195"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SPIT.2018.8350457"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741085"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2655032"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref47","first-page":"409","article-title":"What yelp fake review filter might be doing?","author":"mukherjee","year":"2013","journal-title":"Proc ICWSM"},{"key":"ref42","first-page":"1","article-title":"Linear discriminant analysis-a brief tutorial","volume":"18","author":"balakrishnama","year":"1998","journal-title":"Inst Signal Inf Process"},{"key":"ref41","first-page":"217","article-title":"Logistic regression","author":"wright","year":"1995","journal-title":"Reading and understanding multivariate statistics"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2017.8102442"},{"key":"ref43","first-page":"468","article-title":"A sophisticate&#x2019;s introduction to database normalization theory","author":"beeri","year":"1989","journal-title":"Readings in Artificial Intelligence and Databases"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09212374.pdf?arnumber=9212374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T06:12:26Z","timestamp":1669097546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9212374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3028588","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}