{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:43:42Z","timestamp":1768679022651,"version":"3.49.0"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Quan Cheng Laboratory","award":["QCLZD202301"],"award-info":[{"award-number":["QCLZD202301"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2024.3516573","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:09:06Z","timestamp":1734030546000},"page":"651-664","source":"Crossref","is-referenced-by-count":3,"title":["Signed Latent Factors for Spamming Activity Detection"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8268-6792","authenticated-orcid":false,"given":"Yuli","family":"Liu","sequence":"first","affiliation":[{"name":"Quan Cheng Laboratory, Jinan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2615569.2615688"},{"key":"ref2","first-page":"3789","article-title":"Pay me and I\u2019ll follow you: Detection of crowdturfing following activities in microblog environment","volume-title":"Proc. IJCAI","author":"Liu"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1928601"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451986"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835518"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742570"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806551"},{"key":"ref15","first-page":"140","article-title":"Deceptive opinion spam detection using neural network","volume-title":"Proc. 26th Int. Conf. Comput. Linguistics","author":"Ren"},{"key":"ref16","first-page":"799","article-title":"Credibility assessment in the news: Do we need to read","volume-title":"Proc. MIS2 Workshop Held Conjuction 11th Int. Conf. Web Search Data Mining","author":"Fairbanks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-2048"},{"key":"ref18","first-page":"2408","article-title":"Catch the black sheep: Unified framework for shilling attack detection based on fraudulent action propagation","volume-title":"Proc. 24th Int. Joint Conf. Artif. Intell.","author":"Zhang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102140"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316704"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411900"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3584862"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2547865"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00084"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052594"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767742"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3819-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00183"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00089"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19278"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103399"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3441947"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3420262"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372771"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330850"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186079"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.10.2756"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/279232.279236"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3339363.3339370"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557100"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464470"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741085"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"ref51","first-page":"1","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Defferrard"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531875"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482325"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5455"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357820"},{"key":"ref56","first-page":"1","article-title":"Partitioning message passing for graph fraud detection","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Zhuo"},{"key":"ref57","first-page":"907","article-title":"Singular value decomposition (SVD) and generalized singular value decomposition","author":"Abdi","year":"2007","journal-title":"Encyclopedia of Measurement and Statistics"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9167"},{"key":"ref59","first-page":"41","article-title":"Negative-aware collaborative filtering","volume-title":"Proc. RecSys (Late-Breaking Results)","author":"Lin"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983709"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052617"},{"key":"ref64","article-title":"Modeling review spam using temporal patterns and co-bursting behaviors","author":"Li","year":"2016","journal-title":"arXiv:1611.06625"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505700"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840593"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120282"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.2172\/1878725"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96308-8_96"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.42"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2956185"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10795232.pdf?arnumber=10795232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T20:03:12Z","timestamp":1736366592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10795232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3516573","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}