{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:23:48Z","timestamp":1764937428337,"version":"3.37.3"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702319"],"award-info":[{"award-number":["61702319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022110161"],"award-info":[{"award-number":["2022110161"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3186513","type":"journal-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:31:58Z","timestamp":1656361918000},"page":"4600-4614","source":"Crossref","is-referenced-by-count":12,"title":["MUSH: Multi-Stimuli Hawkes Process Based Sybil Attacker Detector for User-Review Social Networks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9280-7789","authenticated-orcid":false,"given":"Zheng","family":"Qu","sequence":"first","affiliation":[{"name":"School of Information Management and Engineering, Shanghai University of Finance and Economics, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4373-9898","authenticated-orcid":false,"given":"Chen","family":"Lyu","sequence":"additional","affiliation":[{"name":"School of Information Management and Engineering, Shanghai University of Finance and Economics, Shanghai, China"}]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[{"name":"Strategic Center for Research in Privacy-Preserving Technologies and Systems, Nanyang Technological University, Jurong West, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5220\/0006800602290236"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.084"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322118"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195572"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.117"},{"key":"ref7","first-page":"189","article-title":"Improving Sybil detection via graph pruning and regularization techniques","volume-title":"Proc. Asian Conf. Mach. Learn.","author":"Zhang"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.104"},{"key":"ref9","first-page":"1","article-title":"COMPA: Detecting compromised accounts on social networks","volume-title":"Proc. NDSS","author":"Egele"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2994141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.28"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3068307"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007458"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417254"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8257963"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SocialSens.2018.00016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417272"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567045"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877819"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2907542"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813661"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036889"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205907"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.72"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900542"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"ref33","first-page":"2488","article-title":"Learning to identify review spam","volume-title":"Proc. 22nd Int. Joint Conf. Artif. Intell.","author":"Li"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"issue":"3","key":"ref35","first-page":"938","article-title":"Exponential distribution model for review spam detection","volume":"8","author":"Algur","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.065"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/S095679251700033X"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2970601"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052650"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983868"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450094"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21149"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2020EDP7051"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113168"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/info10070243"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/20721420"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.12.120244"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2017.2902"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450104"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF02480272"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.19"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04757-2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1661089"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2357012"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09807355.pdf?arnumber=9807355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:29:50Z","timestamp":1706761790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9807355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3186513","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}