{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:10:11Z","timestamp":1772302211527,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Strategic Priority Research Program of the Chinese Academy of Sciences","award":["Y9W0016405"],"award-info":[{"award-number":["Y9W0016405"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Audio Speech Lang. Process."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/taslp.2022.3221008","type":"journal-article","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T20:37:31Z","timestamp":1668112651000},"page":"152-162","source":"Crossref","is-referenced-by-count":8,"title":["Mining Weak Relations Between Reviews for Opinion Spam Detection"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8838-7606","authenticated-orcid":false,"given":"Yingrui","family":"Xu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hao","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6648-324X","authenticated-orcid":false,"given":"Jingguo","family":"Ge","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaodan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-898X","authenticated-orcid":false,"given":"Jingyuan","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0801-8443","authenticated-orcid":false,"given":"Yulei","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Environment, Science and Economy, University of Exeter, Exeter, U.K."}]},{"given":"Honglei","family":"Lv","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hongbin","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3622-3970","authenticated-orcid":false,"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"179","article-title":"Addressing the curse of imbalanced training sets: One-sided selection","author":"kubat","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6436"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/506"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5354"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1032"},{"key":"ref37","first-page":"1322","article-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"0","journal-title":"Proc Int Joint Conf Neural Netw"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007326"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6359"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313562"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441746"},{"key":"ref2","first-page":"87","article-title":"Detecting deceptive opinion spam using human computation","author":"harris","year":"0","journal-title":"Proc Workshop AAAI Conf Artif Intell"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1083"},{"key":"ref21","first-page":"1341","article-title":"Using deep linguistic features for finding deceptive opinion spam","author":"xu","year":"0","journal-title":"Proc Int Conf Comput Linguistics"},{"key":"ref24","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref23","article-title":"Spectral networks and locally connected networks on graphs","author":"bruna","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref26","article-title":"Graph attention networks","author":"veli?kovi?","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref25","first-page":"1024","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"0","journal-title":"Proc Adv Neural Inf Proces Syst"},{"key":"ref50","article-title":"Pairnorm: Tackling oversmoothing in GNNs","author":"zhao","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref51","article-title":"Fake review detection: Classification and analysis of real and pseudo reviews","author":"mukherjee","year":"2013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"ref52","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"0","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73618-1_76"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/723"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00188"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357820"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741085"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449920"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1034"},{"key":"ref18","first-page":"1884","article-title":"An attribute enhanced domain adaptive model for cold-start spam review detection","author":"you","year":"0","journal-title":"Proc 27th Int Conf Comput Linguistics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727770"},{"key":"ref4","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","author":"ott","year":"0","journal-title":"Proc Annu Meeting Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref3","first-page":"171","article-title":"Syntactic stylometry for deception detection","author":"feng","year":"0","journal-title":"Proc 32nd Ann Meeting Assoc for Computational Linguistics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"ref7","first-page":"2488","article-title":"Learning to identify review spam","author":"li","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref49","article-title":"Dropedge: Towards deep graph convolutional networks on node classification","author":"rong","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref9","first-page":"140","article-title":"Deceptive opinion spam detection using neural network","author":"ren","year":"0","journal-title":"Proc 26th Int Conf Comput Linguistics Tech Papers"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883087"},{"key":"ref45","author":"bird","year":"2010","journal-title":"Natural Language Processing with Python Analyzing Text with the Natural Language Toolkit"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/398"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2832629"},{"key":"ref41","first-page":"1565","article-title":"Learning imbalanced datasets with label-distribution-aware margin loss","author":"cao","year":"0","journal-title":"Proc Adv Neural Inf Proces Syst"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"}],"container-title":["IEEE\/ACM Transactions on Audio, Speech, and Language Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570655\/9970249\/09944915.pdf?arnumber=9944915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:28:47Z","timestamp":1672082927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9944915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/taslp.2022.3221008","relation":{},"ISSN":["2329-9290","2329-9304"],"issn-type":[{"value":"2329-9290","type":"print"},{"value":"2329-9304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}