{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:26:00Z","timestamp":1742401560471,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/icde.2011.5767910","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T16:45:21Z","timestamp":1305650721000},"page":"912-923","source":"Crossref","is-referenced-by-count":32,"title":["Spectrum based fraud detection in social networks"],"prefix":"10.1109","author":[{"given":"Xiaowei","family":"Ying","sequence":"first","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Barbara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453947"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref12","first-page":"209","article-title":"Spectral methods for analyzing and visualizing networks: an introduction","author":"seary","year":"2003","journal-title":"National Research Council Dynamic Social Network Modelling and Analysis Workshop Summary and Pa-pers"},{"journal-title":"Matrix Perturbation Theory","year":"1990","author":"stewart","key":"ref13"},{"journal-title":"Matrix Computations","year":"1996","author":"golub","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.61"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.218"},{"key":"ref17","article-title":"The political blogosphere and the 2004 us election: divided they blog","author":"adamic","year":"2005","journal-title":"Proc WWW Workshop Weblogging Ecosystem"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699531"},{"key":"ref19","first-page":"290","article-title":"On random graphs i","volume":"6","author":"erdos","year":"1959","journal-title":"Publicationes Mathemat-icae"},{"key":"ref4","first-page":"2673","article-title":"Spam Filtering Using Statistical Data Compression Models","volume":"7","author":"bratko","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"ref5","first-page":"576","article-title":"Combating web spam with trustrank","author":"gyongyi","year":"2004","journal-title":"VLDB"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"ref1","first-page":"103","article-title":"Detecting fraudulent personalities in networks of online auctioneers","author":"chau","year":"2006","journal-title":"PKDD"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"ref20","first-page":"84","article-title":"Greedy approximation algorithms for finding dense components in a graph","author":"charikar","year":"2000","journal-title":"APPROX"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"year":"2007","key":"ref21","article-title":"Web spam challenge"}],"event":{"name":"2011 IEEE International Conference on Data Engineering (ICDE 2011)","start":{"date-parts":[[2011,4,11]]},"location":"Hannover, Germany","end":{"date-parts":[[2011,4,16]]}},"container-title":["2011 IEEE 27th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5765035\/5767827\/05767910.pdf?arnumber=5767910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T17:18:10Z","timestamp":1632417490000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5767910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icde.2011.5767910","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}