{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:50:53Z","timestamp":1725580253006},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/ic3.2016.7880240","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T20:33:57Z","timestamp":1490042037000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Review ranking method for spam recognition"],"prefix":"10.1109","author":[{"given":"Gunjan","family":"Ansari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tanvir","family":"Ahmad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. N.","family":"Doja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.13053\/cys-18-3-2035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIOT.2015.7111547"},{"key":"ref6","first-page":"175","article-title":"Exploiting burstiness in reviews spammers detection","author":"fei","year":"2013","journal-title":"Seventh International AAAI Conference on Weblogs and Social Media"},{"key":"ref11","first-page":"2488","article-title":"Learning to identify review spam","author":"li","year":"2011","journal-title":"Int Joint Conference on Artificial Intelligence"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"ref12","first-page":"44","article-title":"Opinion spam recognition method for online reviews using ontological features","author":"long","year":"2014","journal-title":"T?p ch&#x00ED; Khoa hoc DHSP TPHCM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2337542.2337546"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.11.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"}],"event":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2016,8,11]]},"location":"Noida, India","end":{"date-parts":[[2016,8,13]]}},"container-title":["2016 Ninth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7875294\/7880185\/07880240.pdf?arnumber=7880240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T03:09:17Z","timestamp":1490670557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7880240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ic3.2016.7880240","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}