{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:12:35Z","timestamp":1729631555097,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024692","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T20:26:54Z","timestamp":1504556814000},"page":"1225-1230","source":"Crossref","is-referenced-by-count":3,"title":["Spam comments detection with self-extensible dictionary and text-based features"],"prefix":"10.1109","author":[{"family":"Qiang Zhang","sequence":"first","affiliation":[]},{"family":"Chenwei Liu","sequence":"additional","affiliation":[]},{"family":"Shangru Zhong","sequence":"additional","affiliation":[]},{"family":"Kai Lei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501035"},{"key":"ref11","first-page":"273","article-title":"An approach to spam comment detection through domain-independent features","author":"kim","year":"2016","journal-title":"Big Data and Smart Computing (BigComp) 2016 InternationalConference on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511605"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925088"},{"key":"ref14","article-title":"Survey of review spam detection using machine learning techniques","volume":"23","author":"michael","year":"2015","journal-title":"Journal Of Big Data"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MFI.2014.6997687"},{"journal-title":"word2vec","year":"2014","author":"mikolov","key":"ref16"},{"key":"ref17","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"journal-title":"Combining language and vision with a multimodal skip-gram model","year":"0","author":"lazaridou","key":"ref18"},{"key":"ref4","first-page":"3111","article-title":"Identification of spam comments using natural language processing techniques","author":"rdulescu","year":"2013","journal-title":"Intelligent Computer Communication and Processing (ICCP)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","article-title":"Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers","author":"yang","year":"2011","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.14778\/3402755.3402795","article-title":"A data mining-based spam detection system for social media networks","volume":"4","author":"jin","year":"2011","journal-title":"Proceedings of the VLDB Endowment"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"135","DOI":"10.4156\/jcit.vol5.issue1.16","article-title":"Content mining and network analysis of microblog spam","volume":"5","author":"shen","year":"2010","journal-title":"Journal of Convergence Information Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2015.7259377"},{"key":"ref7","first-page":"1","article-title":"Don't follow me: Spam detection in twitter","author":"wang","year":"2010","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the 2010 InternationalConference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.135"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.03.036"},{"key":"ref9","first-page":"1","article-title":"Stringhini. Detecting spammers on social networks","year":"2010","journal-title":"Proceedings of the 26th annual computersecurity applications conference"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024692.pdf?arnumber=8024692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T02:50:38Z","timestamp":1602903038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024692","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}