{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:07:47Z","timestamp":1764688067805,"version":"3.37.3"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T00:00:00Z","timestamp":1690588800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T00:00:00Z","timestamp":1690588800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007927","name":"Shandong Jianzhu University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007927","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,29]]},"DOI":"10.1109\/icnc-fskd59587.2023.10281054","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T17:43:48Z","timestamp":1697651028000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Research on Spam Review Detection: A Survey"],"prefix":"10.1109","author":[{"given":"Yuejun","family":"Li","sequence":"first","affiliation":[{"name":"Shandong Jianzhu University,School of Computer Science and Technology,Jinan,China"}]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong Jianzhu University,School of Computer Science and Technology,Jinan,China"}]},{"given":"Chong","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong University of Finance and Economics,School of Business Administration,Jinan,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2675361"},{"key":"ref12","first-page":"84","article-title":"Comment Target Extraction and Sentiment Classification","volume":"24","author":"liu","year":"2010","journal-title":"Journal of Chinese Information Processing"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1142-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3819-y"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1034"},{"key":"ref14","first-page":"317","article-title":"Detecting spam reviews utilizing semantic and emotion model","author":"li","year":"2016","journal-title":"Proceedings of the 3rd International Conference on Information Science and Control Engineering"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00277"},{"key":"ref31","first-page":"409","article-title":"What yelp spam review filter might be doing?","author":"mukherjee","year":"2013","journal-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2337542.2337546"},{"key":"ref11","first-page":"497","article-title":"Negative deceptive opinion spam","author":"ott","year":"2013","journal-title":"Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies (NAACL-HLT)"},{"key":"ref33","first-page":"91","article-title":"Capturing word choice patterns with LDA for spam review detection in sentiment analysis","author":"lee","year":"2016","journal-title":"Proceeding seedings of the 6th International Conference on Web Intelligence Mining and Semantics"},{"key":"ref10","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume":"1","author":"ott","year":"2011","journal-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00693-w"},{"journal-title":"China Internet Network Information Center 2009 China Online Shopping Market Research Report[EB\/OL]","first-page":"39","year":"2009","key":"ref2"},{"journal-title":"China Internet Network Information Center The 44th Statistical Report on Internet Development in China in 2019[EB\/OL]","year":"2019","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_11"},{"key":"ref39","first-page":"1884","article-title":"An attribute enhanced domain adaptive model for cold-start spam review detection","author":"you","year":"2018","journal-title":"Proceedings of 27th International Conference on Computational Linguistics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.9.8.2065-2072"},{"key":"ref38","first-page":"2787","article-title":"Translating Embeddings for Modeling Multi-relational Data","volume":"2","author":"bordes","year":"2013","journal-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems"},{"key":"ref19","first-page":"254","article-title":"Research on product review spammer detection based on users&#x2019; behavior","volume":"38","author":"qiu","year":"2012","journal-title":"Computer Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1083"},{"key":"ref23","first-page":"2","article-title":"Opinion fraud detection in online reviews by network effects","author":"akoglu","year":"2013","journal-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.07.013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"ref41","first-page":"140","article-title":"Deceptive opinion spam detection using neural network","author":"ren","year":"2016","journal-title":"Proceedings of COLING 2016 26th International Conference on Computational Linguistics technical papers"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028588"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv068"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1068-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2070710.2070716"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2523429.2523437"},{"key":"ref9","first-page":"2488","article-title":"Learning to identify review spam","author":"li","year":"2011","journal-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence"},{"key":"ref4","first-page":"946","article-title":"Survey on fake review detection research","volume":"4","author":"li","year":"2018","journal-title":"Chinese Journal of Computers"},{"key":"ref3","first-page":"175","article-title":"Exploiting burstiness in reviews for review spammer detection","author":"fei","year":"2013","journal-title":"Proceedings of the 7th International AAAI Conference on Weblogs and Social Media"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16148-4_18"}],"event":{"name":"2023 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2023,7,29]]},"location":"Harbin, China","end":{"date-parts":[[2023,7,31]]}},"container-title":["2023 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10280770\/10280781\/10281054.pdf?arnumber=10281054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T19:01:13Z","timestamp":1699297273000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10281054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,29]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icnc-fskd59587.2023.10281054","relation":{},"subject":[],"published":{"date-parts":[[2023,7,29]]}}}