{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:03:01Z","timestamp":1766066581334},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,8,1]]},"DOI":"10.1109\/tkde.2016.2555310","type":"journal-article","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T18:24:27Z","timestamp":1461176667000},"page":"2187-2200","source":"Crossref","is-referenced-by-count":35,"title":["Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms"],"prefix":"10.1109","volume":"28","author":[{"given":"Meng","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Alex","family":"Beutel","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"Hooi","sequence":"additional","affiliation":[]},{"given":"Shiqiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330110"},{"key":"ref38","first-page":"1047","article-title":"Haten2: Billion-scale tensor decompositions","author":"inah","year":"0","journal-title":"Proc IEEE 31st Int Conf Data Eng"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1409620.1409621"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577306"},{"key":"ref31","first-page":"2633","article-title":"Social spammer detection in microblogging","author":"hu","year":"0","journal-title":"Proc 23rd Int Joint Conf Artif Intell"},{"key":"ref30","first-page":"620","article-title":"Detecting spammers and content promoters in online video social networks","author":"benevenuto","year":"0","journal-title":"Proc 32nd Int ACM SIGIR Conf Res Develop Inf Retrieval"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1999.1062"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/090764189"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.89"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009982220290"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081898"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.271"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685298"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502551"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1824777.1824780"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6045-0_10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/S0895479896305696"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401933"},{"key":"ref28","first-page":"15","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"0","journal-title":"Proc 9th USENIX Conf Netw Syst Des Implementation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-44436-X_10","article-title":"Greedy approximation algorithms for finding dense comoponents in a graph","author":"charikar","year":"0","journal-title":"Proceedings of the 5th International Workshop on Approximation Algorithms for Combinatorial Optimization"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.80"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"ref9","article-title":"Opinion fraud detection in online reviews by network effects","author":"akoglu","year":"2013","journal-title":"Proc Int Conf Weblogs and Social Media (ICWSM 07)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"ref22","first-page":"418","article-title":"Neighborhood formation and anomaly detection in bipartite graphs","author":"sun","year":"0","journal-title":"Proc 5th IEEE Int Conf Data Mining"},{"key":"ref21","article-title":"The pagerank citation ranking: Bringing order to the web","author":"page","year":"1999"},{"key":"ref24","first-page":"576","article-title":"Combating web spam with trustrank","author":"gyogyi","year":"0","journal-title":"Proc 13th Int Conf Very Large Data Bases"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2009.103"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135792"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7505473\/07454738.pdf?arnumber=7454738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:11:42Z","timestamp":1642003902000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7454738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,1]]},"references-count":40,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2555310","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2016,8,1]]}}}