{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:35:13Z","timestamp":1729676113703,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icnc.2015.7377965","type":"proceedings-article","created":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T16:43:40Z","timestamp":1452530620000},"page":"52-57","source":"Crossref","is-referenced-by-count":0,"title":["An integrated model for detecting spam microblogs combining latent paragraph and user vector"],"prefix":"10.1109","author":[{"given":"Hongqiao","family":"Li","sequence":"first","affiliation":[]},{"family":"Ruifang Liu","sequence":"additional","affiliation":[]},{"family":"Zhaoxiong Bao","sequence":"additional","affiliation":[]},{"family":"Qinlong Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"The Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10193"},{"key":"ref12","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref13","first-page":"578","article-title":"Learning and Soft Computing, Support Vector Machines, Neural Networks, and Fuzzy Logic Models","volume":"47","author":"kecman","year":"2002"},{"article-title":"Data Mining with Computational Intelligence","year":"2005","author":"wang","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.906741"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772778"},{"key":"ref8","article-title":"Learning distributed representations of concepts","volume":"1","author":"hinton","year":"1986","journal-title":"Proceedings of the Eighth Annual Conference of the Cognitive Science Society"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2014.6934446"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1879141.1879147","article-title":"Detecting and characterizing social spam campaigns","author":"gao","year":"2010","journal-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement"},{"key":"ref1","first-page":"1","article-title":"Characterizing Botnets from Email Spam Records","volume":"8","author":"zhuang","year":"2008","journal-title":"LEET"},{"key":"ref9","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"}],"event":{"name":"The 2015 11th International Conference on Natural Computation","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 11th International Conference on Natural Computation (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7368256\/7377953\/07377965.pdf?arnumber=7377965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T07:06:39Z","timestamp":1654067199000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7377965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icnc.2015.7377965","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}