{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:55:35Z","timestamp":1732035335516,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921622","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:12:38Z","timestamp":1413994358000},"page":"435-442","source":"Crossref","is-referenced-by-count":3,"title":["Influence inflation in online social networks"],"prefix":"10.1109","author":[{"given":"Jianjun","family":"Xie","sequence":"first","affiliation":[]},{"given":"Chuang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1509\/jm.10.0088"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1509\/jm.10.0377"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/988672.988739"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1145\/1557019.1557108"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/2503792.2503797"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1103\/PhysRevE.63.066117"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/1718487.1718518"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1016\/j.tics.2009.08.002"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1086\/226707"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/MALWARE.2010.5665793"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1038\/srep02980"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1866307.1866396"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1145\/2068816.2068840"},{"key":"11","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-642-31284-7_27","article-title":"Detecting social spam campaigns on twitter","author":"chu","year":"2012","journal-title":"Applied Cryptography and Network Security"},{"key":"38","article-title":"Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse","author":"thomas","year":"2013","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1016\/j.nonrwa.2007.06.004"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1002\/mar.20119"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1145\/2187980.2188164"},{"key":"40","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-642-13739-6_25","article-title":"Detecting spam bots in online social networking sites: A machine learning approach","volume":"24","author":"wang","year":"2010","journal-title":"Data and Applications Security and Privacy"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/956750.956769"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1002\/pa.1470"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/1282100.1282157"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1509\/jmkg.74.2.71"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1145\/1281192.1281239"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1007\/s13278-014-0162-z"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1073\/pnas.1008636108"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1007\/BF01588971"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/2124295.2124368"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1566374.1566421"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1557019.1557047"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/2229012.2229027"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"7","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","article-title":"Measuring user influence in twitter: The million follower fallacy","volume":"10","author":"cha","year":"2010","journal-title":"ICWSM"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1017\/CBO9780511804441"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1073\/pnas.0601602103"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.socnet.2005.11.005"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1103\/PhysRevE.66.016128"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1038\/nature11421"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1835804.1835934"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1835804.1835934"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2014,8,17]]},"location":"China","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921622.pdf?arnumber=6921622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T09:42:27Z","timestamp":1689586947000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921622","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}