{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:00:06Z","timestamp":1774540806364,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,7,23]],"date-time":"2007-07-23T00:00:00Z","timestamp":1185148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,7,23]]},"DOI":"10.1145\/1277741.1277814","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T11:59:52Z","timestamp":1221739192000},"page":"423-430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":177,"title":["Know your neighbors"],"prefix":"10.1145","author":[{"given":"Carlos","family":"Castillo","sequence":"first","affiliation":[{"name":"Yahoo! Research Barcelona, Catalunya, Spain"}]},{"given":"Debora","family":"Donato","sequence":"additional","affiliation":[{"name":"Yahoo! Research Barcelona, Catalunya, Spain"}]},{"given":"Aristides","family":"Gionis","sequence":"additional","affiliation":[{"name":"Yahoo! Research Barcelona, Catalunya, Spain"}]},{"given":"Vanessa","family":"Murdock","sequence":"additional","affiliation":[{"name":"Yahoo! Research Barcelona, Catalunya, Spain"}]},{"given":"Fabrizio","family":"Silvestri","sequence":"additional","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2007,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148254"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383035"},{"key":"e_1_3_2_1_3_1","volume-title":"Modern Information Retrieval","author":"Baeza-Yates R.","year":"1999","unstructured":"R. Baeza-Yates and B. Ribeiro-Neto . Modern Information Retrieval . Addison Wesley , May 1999 . R. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison Wesley, May 1999."},{"key":"e_1_3_2_1_4_1","volume-title":"AIRWeb","author":"Becchetti L.","year":"2006","unstructured":"L. Becchetti , C. Castillo , D. Donato , S. Leonardi , and R. Baeza-Yates . Link-based characterization and detection of Web Spam . In AIRWeb , 2006 . L. Becchetti, C. Castillo, D. Donato, S. Leonardi, and R. Baeza-Yates. Link-based characterization and detection of Web Spam. In AIRWeb, 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"ACM WebKDD","author":"Becchetti L.","year":"2006","unstructured":"L. Becchetti , C. Castillo , D. Donato , S. Leonardi , and R. Baeza-Yates . Using rank propagation and probabilistic counting for link-based spam detection . In ACM WebKDD , Pennsylvania, USA , August 2006 . L. Becchetti, C. Castillo, D. Donato, S. Leonardi, and R. Baeza-Yates. Using rank propagation and probabilistic counting for link-based spam detection. In ACM WebKDD, Pennsylvania, USA, August 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"AIRWeb","author":"Bencz\u00far A.","year":"2006","unstructured":"A. Bencz\u00far , K. Csalog\u00e1ny , and T. Sarl\u00f3s . Link-based similarity search to fight web spam . In AIRWeb , 2006 . A. Bencz\u00far, K. Csalog\u00e1ny, and T. Sarl\u00f3s. Link-based similarity search to fight web spam. In AIRWeb, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189702.1189703"},{"key":"e_1_3_2_1_8_1","volume-title":"Stacked graphical learning: approximating learning in markov random fields using very short inhomogeneous markov chains. Technical report","author":"Cohen W. W.","year":"2006","unstructured":"W. W. Cohen and Z. Kou . Stacked graphical learning: approximating learning in markov random fields using very short inhomogeneous markov chains. Technical report , 2006 . W. W. Cohen and Z. Kou. Stacked graphical learning: approximating learning in markov random fields using very short inhomogeneous markov chains. Technical report, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135793"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345597"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988714"},{"key":"e_1_3_2_1_13_1","volume-title":"VLDB","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Molina . Link spam alliances . In VLDB , 2005 . Z. Gy\u00f6ngyi and H. Garcia-Molina. Link spam alliances. In VLDB, 2005."},{"key":"e_1_3_2_1_14_1","volume-title":"AIRWeb","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Molina . Web spam taxonomy . In AIRWeb , 2005 . Z. Gy\u00f6ngyi and H. Garcia-Molina. Web spam taxonomy. In AIRWeb, 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"VLDB","author":"Gy\u00f6ngyi Z.","year":"2004","unstructured":"Z. Gy\u00f6ngyi , H. Garcia-Molina , and J. Pedersen . Combating Web spam with TrustRank . In VLDB , 2004 . Z. Gy\u00f6ngyi, H. Garcia-Molina, and J. Pedersen. Combating Web spam with TrustRank. In VLDB, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.352"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792553"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1997.1404"},{"key":"e_1_3_2_1_19_1","volume-title":"ICML Workshop on The Continuum from Labeled to Unlabeled Data","author":"Lu Q.","year":"2003","unstructured":"Q. Lu and L. Getoor . Link-based classification using labeled and unlabeled data . In ICML Workshop on The Continuum from Labeled to Unlabeled Data , Washington, DC , 2003 . Q. Lu and L. Getoor. Link-based classification using labeled and unlabeled data. In ICML Workshop on The Continuum from Labeled to Unlabeled Data, Washington, DC, 2003."},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Intelligence Analysis","author":"Macskassy S. A.","year":"2005","unstructured":"S. A. Macskassy and F. Provost . Suspicion scoring based on guilt-by-association, collective inference, and focused data access . In International Conference on Intelligence Analysis , 2005 . S. A. Macskassy and F. Provost. Suspicion scoring based on guilt-by-association, collective inference, and focused data access. In International Conference on Intelligence Analysis, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"AIRWeb","author":"Mishne G.","year":"2005","unstructured":"G. Mishne , D. Carmel , and R. Lempel . Blocking blog spam with language model disagreement . In AIRWeb , 2005 . G. Mishne, D. Carmel, and R. Lempel. Blocking blog spam with language model disagreement. In AIRWeb, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_23_1","volume-title":"The PageRank citation ranking: bringing order to the Web. Technical report","author":"Page L.","year":"1998","unstructured":"L. Page , S. Brin , R. Motwani , and T. Winograd . The PageRank citation ranking: bringing order to the Web. Technical report , Stanford Digital Library Technologies Project , 1998 . L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking: bringing order to the Web. Technical report, Stanford Digital Library Technologies Project, 1998."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183650"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.51"},{"key":"e_1_3_2_1_26_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"1999","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations . Morgan Kaufmann , 1999 . I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, 1999."},{"key":"e_1_3_2_1_27_1","volume-title":"AIRWeb","author":"Wu B.","year":"2005","unstructured":"B. Wu and B. D. Davison . Cloaking and redirection: A preliminary study . In AIRWeb , 2005 . B. Wu and B. D. Davison. Cloaking and redirection: A preliminary study. In AIRWeb, 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"e_1_3_2_1_29_1","volume-title":"MTW","author":"Wu B.","year":"2006","unstructured":"B. Wu , V. Goel , and B. D. Davison . Propagating trust and distrust to demote web spam . In MTW , May 2006 . B. Wu, V. Goel, and B. D. Davison. Propagating trust and distrust to demote web spam. In MTW, May 2006."},{"key":"e_1_3_2_1_30_1","series-title":"LNCS","first-page":"92","volume-title":"WAW","author":"Zhang H.","year":"2004","unstructured":"H. Zhang , A. Goel , R. Govindan , K. Mason , and B. Van Roy . Making eigenvector-based reputation systems robust to collusion . In WAW , volume 3243 of LNCS , pages 92 -- 104 , Rome, Italy , 2004 . Springer . H. Zhang, A. Goel, R. Govindan, K. Mason, and B. Van Roy. Making eigenvector-based reputation systems robust to collusion. In WAW, volume 3243 of LNCS, pages 92--104, Rome, Italy, 2004. Springer."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150510"},{"key":"e_1_3_2_1_32_1","first-page":"321","article-title":"Learning with local and global consistency","volume":"16","author":"Zhou D.","year":"2004","unstructured":"D. Zhou , O. Bousquet , T. N. Lal , J. Weston , and B. Scholkopf . Learning with local and global consistency . Advances in Neural Information Processing Systems , 16 : 321 -- 328 , 2004 . D. Zhou, O. Bousquet, T. N. Lal, J. Weston, and B. Scholkopf. Learning with local and global consistency. Advances in Neural Information Processing Systems, 16:321--328, 2004.","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"SIGIR07: The 30th Annual International SIGIR Conference","location":"Amsterdam The Netherlands","acronym":"SIGIR07","sponsor":["ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1277741.1277814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1277741.1277814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:14Z","timestamp":1750258694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1277741.1277814"}},"subtitle":["web spam detection using the web topology"],"short-title":[],"issued":{"date-parts":[[2007,7,23]]},"references-count":32,"alternative-id":["10.1145\/1277741.1277814","10.1145\/1277741"],"URL":"https:\/\/doi.org\/10.1145\/1277741.1277814","relation":{},"subject":[],"published":{"date-parts":[[2007,7,23]]},"assertion":[{"value":"2007-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}