{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:53:15Z","timestamp":1730238795361,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icdim.2018.8846971","type":"proceedings-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T01:38:32Z","timestamp":1569548312000},"page":"51-56","source":"Crossref","is-referenced-by-count":2,"title":["Exploiting Function Words Feature in Classifying Deceptive and Truthful Reviews"],"prefix":"10.1109","author":[{"given":"Al Hafiz Akbar Maulana","family":"Siagian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masayoshi","family":"Aritsugi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18117-2_21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883087"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W15-2909"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"ref15","first-page":"87","article-title":"Detecting deceptive opinion spam using human computation","author":"harris","year":"2012","journal-title":"Proceedings of AAAI Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-0908"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20961"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref4","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","author":"ott","year":"2011","journal-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies - Volume 1 ser HLT &#x2019;11"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2304"},{"key":"ref6","first-page":"1933","article-title":"Identifying manipulated offerings on review portals","author":"li","year":"2013","journal-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing ser EMNLP 2013"},{"key":"ref5","first-page":"497","article-title":"Negative deceptive opinion spam","author":"ott","year":"2013","journal-title":"HLT-NAACL"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.11.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0674"},{"year":"2017","key":"ref1","article-title":"Why positive reviews are so valuable to small businesses"},{"key":"ref9","article-title":"What yelp fake review ?lter might be doing?","author":"mukherjee","year":"2013","journal-title":"International AAAI Conference on Web and Social Media ser ICWSM-2013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-5042"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques Second Edition (Morgan Kaufmann Series in Data Management Systems)","year":"2005","author":"witten","key":"ref22"},{"key":"ref21","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref23","first-page":"1","article-title":"C4.5, class imbalance, and cost sensitivity: Why under-sampling beats over-sampling","author":"drummond","year":"2003","journal-title":"Proc Workshop Learning from Imbalanced Data Sets"}],"event":{"name":"2018 Thirteenth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2018,9,24]]},"location":"Berlin, Germany","end":{"date-parts":[[2018,9,26]]}},"container-title":["2018 Thirteenth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8843511\/8846966\/08846971.pdf?arnumber=8846971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T06:14:13Z","timestamp":1569996853000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8846971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icdim.2018.8846971","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}