{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:31:23Z","timestamp":1725784283974},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icdew.2014.6818354","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:26:37Z","timestamp":1401459997000},"page":"350-354","source":"Crossref","is-referenced-by-count":18,"title":["Analysis and detection of low quality information in social networks"],"prefix":"10.1109","author":[{"given":"De","family":"Wang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2008.4696967"},{"journal-title":"A Study on the Evolution and Emergence of Web Spam","year":"2011","author":"chung","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775246"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458129"},{"key":"16","article-title":"An anti-spam filter combination framework for text-and-image emails through incremental learning","author":"byun","year":"2009","journal-title":"Proceedings of the the Sixth Conference on Email and Anti-Spam (CEAS 2009)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-011-0017-9"},{"key":"14","article-title":"Introducing the webb spam corpus: Using email spam to identify web spam automatically","author":"webb","year":"2006","journal-title":"Proceedings of the Third Conference on Email and Anti-Spam (CEAS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5860-5_119"},{"key":"12","article-title":"Socialspamguard: A data miningbased spam detection system for social media networks","author":"jin","year":"2011","journal-title":"Proceedings of the International Conference on Very Large Data Bases"},{"key":"21","article-title":"Detecting spammers on twitter","author":"benevenuto","year":"2010","journal-title":"Proceedings of the Annual Collaboration Electronic Messaging Anti-Abuse and Spam Conference"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"22","article-title":"Seven months with the devils: A long-term study of content polluters on twitter","author":"lee","year":"2011","journal-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19260-9_11","article-title":"Detecting and analyzing automated activity on twitter","author":"zhang","year":"2011","journal-title":"Proceedings of the Passive and Active Measurement Conference"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2309996.2310010"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030387"},{"key":"29","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1145\/2488388.2488463","article-title":"Two years of short urls internet measurement: Security threats and countermeasures","author":"maggi","year":"2013","journal-title":"Proceedings of the 22nd International Conference on World Wide Web Ser WWW 13 Republic and Canton of Geneva Switzerland International World Wide Web Conferences Steering Committee"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030382"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254084"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963505"},{"key":"10","first-page":"364","article-title":"A framework for unsupervised spam detection in social networking sites","author":"bosma","year":"2012","journal-title":"ECIR 2012 34th European Conference on Information Retrieval Barcelona"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"6","article-title":"Social networks as an attack platform: Facebook case study","author":"gosier","year":"2009","journal-title":"Eighth International Conference on Network"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.4108\/icst.collaboratecom.2013.254082","article-title":"A study on evolution of email spam over fifteen years","author":"wang","year":"2013","journal-title":"Proceedings of the 9th International Conference on Collaborative Computing Networking Applications and Work-sharing (CollaborateCom)"},{"key":"4","first-page":"40","article-title":"Evolutionary study of web spam: Webb spam corpus 2011 versus webb spam corpus 2006","author":"wang","year":"2012","journal-title":"Proceedings of the 8th International Conference on Collaborative Computing Networking Applications and Work-sharing (CollaborateCom)"},{"key":"9","article-title":"Detecting spammers on twitter","author":"benevenuto","year":"2010","journal-title":"Proceedings of the Seventh Annual Collaboration Electronic Messaging AntiAbuse and Spam Conference(CEAS 2010)"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v4i1.14017","article-title":"Study of static classification of social spam profiles in myspace","author":"irani","year":"2010","journal-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media"}],"event":{"name":"2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW)","start":{"date-parts":[[2014,3,31]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE 30th International Conference on Data Engineering Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811047\/6816871\/06818354.pdf?arnumber=6818354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T16:32:54Z","timestamp":1689265974000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6818354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icdew.2014.6818354","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}