{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:46:43Z","timestamp":1778082403679,"version":"3.51.4"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009100","name":"Universiti Brunei Darussalam","doi-asserted-by":"publisher","award":["UBD\/RSCH\/URC\/RG(b)\/2020\/023"],"award-info":[{"award-number":["UBD\/RSCH\/URC\/RG(b)\/2020\/023"]}],"id":[{"id":"10.13039\/100009100","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3399264","type":"journal-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T17:27:16Z","timestamp":1715362036000},"page":"143485-143499","source":"Crossref","is-referenced-by-count":22,"title":["Machine Learning-Based Opinion Spam Detection: A Systematic Literature Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3565-6355","authenticated-orcid":false,"given":"Atika","family":"Qazi","sequence":"first","affiliation":[{"name":"Centre for Lifelong Learning, Universiti Brunei Darussalam, Bandar Seri Begawan, Brunei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2108-6918","authenticated-orcid":false,"given":"Najmul","family":"Hasan","sequence":"additional","affiliation":[{"name":"BRAC Business School, BRAC University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1082-8755","authenticated-orcid":false,"given":"Rui","family":"Mao","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3461-5823","authenticated-orcid":false,"given":"Mohamed","family":"Elhag Mohamed Abo","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, The Future University, Khartoum, Sudan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7999-8576","authenticated-orcid":false,"given":"Samrat","family":"Kumar Dey","sequence":"additional","affiliation":[{"name":"School of Science and Technology (SST), Bangladesh Open University (BOU), Gazipur, Bangladesh"}]},{"given":"Glenn","family":"Hardaker","sequence":"additional","affiliation":[{"name":"Office of the Provost, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.02.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014073"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/872929"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/879323"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.160"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/b16014-19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951530"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICITDA55840.2022.9971397"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/jmv.25840"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105582"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i15.17596"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-04-2016-0086"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-022-09597-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102179"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e12705"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24340-0_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15384-6_41"},{"key":"ref20","first-page":"39","article-title":"Web spam taxonomy","volume-title":"Proc. 1st Int. Workshop Adversarial Inf. Web (AIRWeb)","author":"Gyongyi"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IC2PCT60090.2024.10486769"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.830"},{"key":"ref23","first-page":"136","article-title":"A survey of modern spam tools","volume-title":"Proc. CEAS","author":"Stern"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app9050987"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906402"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2015.04.041"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.07.013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v12n2p87"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.235"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9724-0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-021-00538-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10775-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/idm.2016.6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.00375"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9091-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11051-007-9266-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2010.47"},{"key":"ref41","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics, Human Lang. Technol.","author":"Ott"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"ref44","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/info10070243"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1161-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2655032"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3819-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03427-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2019.08.003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13702-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-023-02208-4"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3305258"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10602-y"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-022-05015-5"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840593"},{"key":"ref59","article-title":"Review spam detection: A network-based approach","author":"Fayazbakhsh","year":"2012"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216307"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77332-2_13"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963240"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0198884"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14380"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.62"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0035"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205907"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/11891321_6"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-021-00302-z"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.12.009"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.10765"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.005"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPIS.2017.8311593"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25816-4_32"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18117-2_21"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741085"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0341-8_1"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3325773.3325783"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8662912"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3376-6_30"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.06.028"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622582"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICTUS.2017.8286071"},{"key":"ref89","first-page":"725","article-title":"A unified model for unsupervised opinion spamming detection incorporating text generality","volume-title":"Proc. 24th Int. Joint Conf. Artif. Intell.","author":"Xu"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.019"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25207-0_43"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921594"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP.2010.5697509"},{"key":"ref94","first-page":"2488","article-title":"Learning to identify review spam","volume-title":"Proc. 22nd Int. Joint Conf. Artif. Intell. (IJCAI)","author":"Li"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964860"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-023-01028-5"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1017\/S193029750000334X"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00073"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783380"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102306"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10300-7"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101988"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-demo.12"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.544"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132925"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10528318.pdf?arnumber=10528318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:56:31Z","timestamp":1728496591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10528318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":107,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3399264","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}