{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:25:01Z","timestamp":1729650301711,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iske.2017.8258755","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:01Z","timestamp":1516056421000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Recital of supervised learning on review spam detection: An empirical analysis"],"prefix":"10.1109","author":[{"given":"Faisal","family":"Khurshid","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chubato Wondaferaw","family":"Yohannese","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fake review detection: Classification and analysis of real and pseudo reviews","author":"mukherjee","year":"2013","journal-title":"Technical Report UIC-CS-2013-03 University of Illinois at Chicago"},{"key":"ref11","first-page":"409","article-title":"What yelp fake review filter might be doing?","author":"mukherjee","year":"2013","journal-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media (ICWSM)"},{"journal-title":"Voting for Deceptive Opinion Spam Detection","year":"2014","author":"wang","key":"ref12"},{"key":"ref13","first-page":"501","article-title":"A linguistic framework to distinguish between genuine and deceptive online reviews","author":"banerjee","year":"2014","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists (IMECS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25207-0_43"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18117-2_21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.13053\/cys-18-3-2035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.47"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.68"},{"key":"ref6","first-page":"497","article-title":"Negative Deceptive Opinion Spam","author":"ott","year":"2013","journal-title":"Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies (HLT-NAACL)"},{"key":"ref5","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume":"1","author":"ott","year":"0","journal-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref8","first-page":"217","article-title":"TopicSpam: a Topic-Model based approach for spam detection","author":"li","year":"2013","journal-title":"Proceedings of the 38th Annual Meeting on Association for Computational Linguistics Association for Computational Linguistics"},{"key":"ref7","first-page":"171","article-title":"Syntactic stylometry for deception detection","volume":"2","author":"feng","year":"0","journal-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics Short Papers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1928601"},{"journal-title":"Aspect-based opinion extraction from customer reviews","year":"2014","author":"samha","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"647","DOI":"10.2991\/ijcis.2017.10.1.43","article-title":"A Combined-Learning Based Framework for Improved Software Fault Prediction","volume":"10","author":"chubato","year":"2017","journal-title":"International Journal of Computational Intelligence Systems"}],"event":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2017,11,24]]},"location":"Nanjing","end":{"date-parts":[[2017,11,26]]}},"container-title":["2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8246022\/8258711\/08258755.pdf?arnumber=8258755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T11:03:08Z","timestamp":1570618988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iske.2017.8258755","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}