{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:10:07Z","timestamp":1774195807960,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,22]],"date-time":"2008-04-22T00:00:00Z","timestamp":1208822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ASTOR","award":["NKFP 2\/004\/05"],"award-info":[{"award-number":["NKFP 2\/004\/05"]}]},{"DOI":"10.13039\/501100003549","name":"Orsz\u00e1gos Tudom\u00e1nyos Kutat\u00e1si Alapprogramok","doi-asserted-by":"publisher","award":["NK 72845"],"award-info":[{"award-number":["NK 72845"]}],"id":[{"id":"10.13039\/501100003549","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,22]]},"DOI":"10.1145\/1451983.1451991","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T12:25:44Z","timestamp":1224678344000},"page":"29-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Latent dirichlet allocation in web spam filtering"],"prefix":"10.1145","author":[{"given":"Istv\u00e1n","family":"B\u00edr\u00f3","sequence":"first","affiliation":[{"name":"Computer and Automation Research Institute of the Hungarian Academy of Sciences"}]},{"given":"J\u00e1cint","family":"Szab\u00f3","sequence":"additional","affiliation":[{"name":"Computer and Automation Research Institute of the Hungarian Academy of Sciences"}]},{"given":"Andr\u00e1s A.","family":"Bencz\u00far","sequence":"additional","affiliation":[{"name":"Computer and Automation Research Institute of the Hungarian Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2008,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Abernethy J.","year":"2008","unstructured":"J. Abernethy , O. Chapelle , and C. Castillo . WITCH: A New Approach to Web Spam Detection . In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , 2008 . J. Abernethy, O. Chapelle, and C. Castillo. WITCH: A New Approach to Web Spam Detection. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/900051.900060"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.5"},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei D.","year":"2003","unstructured":"D. Blei , A. Ng , and M. Jordan . Latent Dirichlet allocation . Journal of Machine Learning Research , 3 ( 5 ): 993 -- 1022 , 2003 . D. Blei, A. Ng, and M. Jordan. Latent Dirichlet allocation. Journal of Machine Learning Research, 3(5):993--1022, 2003.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248644"},{"key":"e_1_3_2_1_6_1","volume-title":"DELIS -- Dynamically Evolving","author":"Castillo C.","year":"2006","unstructured":"C. Castillo , D. Donato , A. Gionis , V. Murdock , and F. Silvestri . Know your neighbors: Web spam detection using the web topology. Technical report , DELIS -- Dynamically Evolving , Large-Scale Information Systems , 2006 . C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. Technical report, DELIS -- Dynamically Evolving, Large-Scale Information Systems, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Cormack G.","year":"2007","unstructured":"G. Cormack . Content-based Web Spam Detection . In Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , 2007 . G. Cormack. Content-based Web Spam Detection. In Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.16"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017074.1017077"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076066"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Molina . Web spam taxonomy . In Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , Chiba, Japan , 2005 . Z. Gy\u00f6ngyi and H. Garcia-Molina. Web spam taxonomy. In Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), Chiba, Japan, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792553"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148195"},{"key":"e_1_3_2_1_17_1","volume-title":"Uncertainty in Artificial Intelligence (UAI)","author":"Minka T.","year":"2002","unstructured":"T. Minka and J. Lafferty . Expectation-propagation for the generative aspect model . Uncertainty in Artificial Intelligence (UAI) , 2002 . T. Minka and J. Lafferty. Expectation-propagation for the generative aspect model. Uncertainty in Artificial Intelligence (UAI), 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_19_1","unstructured":"X.-H. Phan. http:\/\/gibbslda.sourceforge.net\/.  X.-H. Phan. http:\/\/gibbslda.sourceforge.net\/."},{"key":"e_1_3_2_1_20_1","volume-title":"IBM Search and Collaboration Seminar","author":"Singhal A.","year":"2004","unstructured":"A. Singhal . Challenges in running a commercial search engine. In IBM Search and Collaboration Seminar 2004 . IBM Haifa Labs , 2004. A. Singhal. Challenges in running a commercial search engine. In IBM Search and Collaboration Seminar 2004. IBM Haifa Labs, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(96)00008-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.77"},{"key":"e_1_3_2_1_23_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann","author":"Witten I. H.","year":"2005","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann , second edition, June 2005 . I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, second edition, June 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.04.015"}],"event":{"name":"AIRWeb'08: AIRWeb '08, Third International Workshop on Adversarial Information Retrieval on the Web","location":"Beijing China","acronym":"AIRWeb'08"},"container-title":["Proceedings of the 4th international workshop on Adversarial information retrieval on the web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1451983.1451991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1451983.1451991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:05Z","timestamp":1750253405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1451983.1451991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,22]]},"references-count":23,"alternative-id":["10.1145\/1451983.1451991","10.1145\/1451983"],"URL":"https:\/\/doi.org\/10.1145\/1451983.1451991","relation":{},"subject":[],"published":{"date-parts":[[2008,4,22]]},"assertion":[{"value":"2008-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}