{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:58:20Z","timestamp":1771700300977,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icis.2017.7960003","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T21:18:28Z","timestamp":1498771108000},"page":"257-263","source":"Crossref","is-referenced-by-count":5,"title":["A PageRank-improved ranking algorithm based on cheating similarity and cheating relevance"],"prefix":"10.1109","author":[{"given":"Yuan","family":"Ziqian","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Wenhui","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Huijuan","sequence":"additional","affiliation":[]},{"given":"Tu","family":"Zhixiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"A survey of web spam and anti-spam techniques","volume":"46","author":"zhichao","year":"0","journal-title":"Journal of Shandong University (Natural Science)"},{"key":"ref11","first-page":"1983","article-title":"An algorithm of identify spam pages based on link similarity and spam rates","volume":"37","author":"zhao","year":"0","journal-title":"Computing in Science & Eng"},{"key":"ref12","first-page":"477","article-title":"Link farm spam detection based on its properties[C]","author":"yong","year":"2008","journal-title":"International Conference on Computational Intelligence and Security"},{"key":"ref13","first-page":"698","article-title":"Figghting link spam with a two-stage ranking strategy[C]","author":"geng","year":"2007","journal-title":"Proceedings of the European Conference on Information Retrieval ECIR"},{"key":"ref14","article-title":"Using rank propagation and probabilistic counting for link-based spam detection","author":"becchetti","year":"2006","journal-title":"Proc KDD 2006"},{"key":"ref15","first-page":"72","article-title":"Hilltop: A search engine based on expert documents","author":"bharat","year":"2000","journal-title":"Proceedings of the 9th International Conference on World Wide Web"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129091"},{"key":"ref4","article-title":"A Novel Page Ranking Algorithm Based on Analyzing the Diversity of Inbound Hyperlinks","volume":"130012","author":"bo","year":"0","journal-title":"Changchun Jilin University of Technology"},{"key":"ref3","article-title":"Generalized BadRank with graduated trust","author":"kolda","year":"2009","journal-title":"Albuqerque NM and Livermore Report SAND2009&#x2013;6670"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244415"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref7","first-page":"37","article-title":"Web spam detectionwith Anti-TrustRanki","author":"krishnann","year":"2006","journal-title":"Proceedings of the 2nd International Workshop on Adversarial Information Retrieval on the Web"},{"key":"ref2","first-page":"271","article-title":"Combating web spam with TrustRanki","author":"gyongyi","year":"2004","journal-title":"Proceedings of the 30th International Conference on Very Large Data Bases"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052942"},{"key":"ref9","article-title":"The PageRank citation ranking. Bringing order to the web[R]","year":"1998","journal-title":"Stanford Stanford University Computer Science Department"}],"event":{"name":"2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)","location":"Wuhan, China","start":{"date-parts":[[2017,5,24]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951674\/7959951\/07960003.pdf?arnumber=7960003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T04:00:40Z","timestamp":1499832040000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icis.2017.7960003","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}