{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:22:52Z","timestamp":1768011772256,"version":"3.49.0"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Ministerio Espa?ol de Ciencia e Innovaci?n","award":["PDC2022-133900-I00"],"award-info":[{"award-number":["PDC2022-133900-I00"]}]},{"name":"Ministerio Espa?ol de Ciencia e Innovaci?n","award":["TED2021-129938B-I0"],"award-info":[{"award-number":["TED2021-129938B-I0"]}]},{"name":"Ministerio Espa?ol de Econom?a y Competitividad","award":["PID2020-113462RB-I00"],"award-info":[{"award-number":["PID2020-113462RB-I00"]}]},{"DOI":"10.13039\/501100011011","name":"Junta de Andaluc?a","doi-asserted-by":"publisher","award":["A-TIC-608-UGR20"],"award-info":[{"award-number":["A-TIC-608-UGR20"]}],"id":[{"id":"10.13039\/501100011011","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3293641","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:29:04Z","timestamp":1689017344000},"page":"72250-72271","source":"Crossref","is-referenced-by-count":10,"title":["A Multilingual Spam Reviews Detection Based on Pre-Trained Word Embedding and Weighted Swarm Support Vector Machines"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0414-3570","authenticated-orcid":false,"given":"Ala\u2019 M.","family":"Al-Zoubi","sequence":"first","affiliation":[{"name":"School of Computer Sciences and Telecommunications (ETSIIT), University of Granada, Granada, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1603-9105","authenticated-orcid":false,"given":"Antonio M.","family":"Mora","sequence":"additional","affiliation":[{"name":"Department of Signal Theory, Telematics and Communications, ETSIIT and CITIC-UGR, University of Granada, Granada, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4261-8127","authenticated-orcid":false,"given":"Hossam","family":"Faris","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Automatics and Robotics, ETSIIT and CITIC-UGR, University of Granada, Granada, Spain"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2014.2307227"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.029"},{"key":"ref56","author":"vapnik","year":"2013","journal-title":"The Nature of Statistical Learning Theory"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53817-4_4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.45"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.022"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.028"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2019.8936148"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19823-7_28"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-017-0768-3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/72.788640"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2015.85014"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"cortes","year":"1995","journal-title":"Mach Learn"},{"key":"ref17","first-page":"352","article-title":"&#x2018;A Passage to India&#x2019;: Pre-trained word embeddings for Indian languages","author":"kumar","year":"2020","journal-title":"Proc 1st Joint Workshop Spoken Lang Technol Under-Resourced Lang (SLTU) Collaboration Comput Under-Resourced Lang (CCURL)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0947-6_76"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96133-0_15"},{"key":"ref18","first-page":"241","article-title":"Pre-trained word embeddings for Arabic aspect-based sentiment analysis of airline tweets","author":"ashi","year":"2018","journal-title":"Proc Int Conf Adv Intell Syst Inform"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04757-2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3055635.3056647"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106556"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102286"},{"key":"ref48","article-title":"Military dog based optimizer and its application to fake review","author":"tripathi","year":"2019","journal-title":"arXiv 1909 11890"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/0002764219878238"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979226"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa164"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101186"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68133-3_10"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1504\/IJWBC.2018.096245"},{"key":"ref8","author":"mauldin","year":"2021","journal-title":"Global Internet Traffic and Capacity"},{"key":"ref7","author":"phaneuf","year":"2021","journal-title":"Ecommerce Statistics Industry Benchmarks and Growth"},{"key":"ref9","author":"muller","year":"2021","journal-title":"How COVID-19 Changed Online Reviews"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/IJCHM-10-2017-0671"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2018.01.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-008-0041-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10602-y"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS50568.2020.9268772"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65785-7_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59605-7_9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113517"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3439307"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10811-5"},{"key":"ref33","article-title":"E-BERT: Efficient-yet-effective entity embeddings for BERT","author":"poerner","year":"2019","journal-title":"arXiv 1911 03681"},{"key":"ref32","article-title":"Fact or factitious? Contextualized opinion spam detection","author":"kennedy","year":"2020","journal-title":"arXiv 2010 15296"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<351::AID-ASI5>3.0.CO;2-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app12073634"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-021-00503-w"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-020-09413-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AEEICB.2017.7972369"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00204-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IGEHT.2017.8094094"},{"key":"ref25","first-page":"288","article-title":"Fake review detection in big data using parallel BBO","volume":"2","author":"tripathi","year":"2019","journal-title":"Int J Inf Syst Manag Sci"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8389522"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6046-5_12"},{"key":"ref63","author":"porter","year":"2001","journal-title":"Snowball A Language for Stemming Algorithms"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8857570"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/int.22946"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778"},{"key":"ref65","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv 1810 04805"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.072"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.07.013"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref62","first-page":"1930","article-title":"A comparative study of stemming algorithms","volume":"2","author":"jivani","year":"2011","journal-title":"Int J Comput Tech Appl"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.120"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177176.pdf?arnumber=10177176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:24:46Z","timestamp":1691432686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3293641","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}