{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:05:35Z","timestamp":1774631135646,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,22]],"date-time":"2008-04-22T00:00:00Z","timestamp":1208822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,22]]},"DOI":"10.1145\/1451983.1451996","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T12:25:44Z","timestamp":1224678344000},"page":"45-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Identifying video spammers in online social networks"],"prefix":"10.1145","author":[{"given":"Fabricio","family":"Benevenuto","sequence":"first","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]},{"given":"Tiago","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]},{"given":"Virgilio","family":"Almeida","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]},{"given":"Jussara","family":"Almeida","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Polytechnic University, Brooklyn, NY"}]},{"given":"Keith","family":"Ross","sequence":"additional","affiliation":[{"name":"Polytechnic University, Brooklyn, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa. http:\/\/www.alexa.com.  Alexa. http:\/\/www.alexa.com."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.135"},{"key":"e_1_3_2_1_3_1","volume-title":"Modern Information Retrieval","author":"Baeza-Yates R.","year":"1999","unstructured":"R. Baeza-Yates and B. Ribeiro-Neto . Modern Information Retrieval . ACM Press \/ Addison-Wesley , 1999 . R. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. ACM Press \/ Addison-Wesley, 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297827"},{"key":"e_1_3_2_1_5_1","first-page":"423","volume-title":"Int'l ACM SIGIR","author":"Castillo C.","year":"2007","unstructured":"C. Castillo , D. Donato , A. Gionis , V. Murdock , and F. Silvestri . Know your neighbors: Web spam detection using the web topology . In Int'l ACM SIGIR , pages 423 -- 430 , 2007 . 10.1145\/1277741.1277814 C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. In Int'l ACM SIGIR, pages 423--430, 2007. 10.1145\/1277741.1277814"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298309"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198515906.001.0001","volume-title":"Evolution of Networks: from Biological Nets to the Internet and WWW","author":"Dorogovtsev S.","year":"2003","unstructured":"S. Dorogovtsev and J. Mendes . Evolution of Networks: from Biological Nets to the Internet and WWW . Oxford University Press , 2003 . S. Dorogovtsev and J. Mendes. Evolution of Networks: from Biological Nets to the Internet and WWW. Oxford University Press, 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"Working set selection using the second order information for training svm. Journal of Machine Learning Research (JMLR), 6:1889--1918","author":"Fan R.","year":"2005","unstructured":"R. Fan , P. Chen , and C. Lin . Working set selection using the second order information for training svm. Journal of Machine Learning Research (JMLR), 6:1889--1918 , 2005 . R. Fan, P. Chen, and C. Lin. Working set selection using the second order information for training svm. Journal of Machine Learning Research (JMLR), 6:1889--1918, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017074.1017077"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298310"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2006.11.001"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of SRUTI","author":"Gomes L.","year":"2005","unstructured":"L. Gomes , F. Castro , V. Almeida , J. Almeida , R. Almeida , and L. Bettencourt . Improving spam detection based on structural similarity . In Proc. of SRUTI , 2005 . L. Gomes, F. Castro, V. Almeida, J. Almeida, R. Almeida, and L. Bettencourt. Improving spam detection based on structural similarity. In Proc. of SRUTI, 2005."},{"key":"e_1_3_2_1_13_1","first-page":"576","volume-title":"Conf. on Very Large Data Bases","author":"Gy\u00f6ngyi Z.","year":"2004","unstructured":"Z. Gy\u00f6ngyi , H. Garcia-Molina , and J. Pedersen . Combating web spam with trustrank. In Int'l . Conf. on Very Large Data Bases , pages 576 -- 587 , 2004 . Z. Gy\u00f6ngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Int'l. Conf. on Very Large Data Bases, pages 576--587, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.125"},{"key":"e_1_3_2_1_15_1","volume-title":"Measurement, Simulation, and Modeling","author":"Jain R.","year":"1991","unstructured":"R. Jain . The Art of Computer Systems Performance Analysis: Techniques for Experimental Design , Measurement, Simulation, and Modeling . John Wiley and Sons , INC , 1991 . R. Jain. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley and Sons, INC, 1991."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/345966.345982"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244420"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284621.1284639"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of Conf. on Email and Anti-Spam (CEAS)","author":"Thomason A.","year":"2007","unstructured":"A. Thomason . Blog spam : A review . In Proc. of Conf. on Email and Anti-Spam (CEAS) , 2007 . A. Thomason. Blog spam: A review. In Proc. of Conf. on Email and Anti-Spam (CEAS), 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research (JMLR), 6:1453--1484","author":"Tsochantaridis I.","year":"2005","unstructured":"I. Tsochantaridis , T. Joachims , T. Hofmann , and Y. Altun . Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research (JMLR), 6:1453--1484 , 2005 . I. Tsochantaridis, T. Joachims, T. Hofmann, and Y. Altun. Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research (JMLR), 6:1453--1484, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"Morgan Kaufmann","author":"Witten I.","year":"2005","unstructured":"I. Witten and E. Frank . Data Mining: Practical machine learning tools and techniques . Morgan Kaufmann , 2005 . I. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2005."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of IEEE Int'l Conf. on Image Processing (ICIP)","author":"Wu C.","year":"2005","unstructured":"C. Wu , K. Cheng , Q. Zhu , and Y. Wu . Using visual features for anti-spam filtering . In Proc. of IEEE Int'l Conf. on Image Processing (ICIP) , 2005 . C. Wu, K. Cheng, Q. Zhu, and Y. Wu. Using visual features for anti-spam filtering. In Proc. of IEEE Int'l Conf. on Image Processing (ICIP), 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the Int'l Conf. on Machine Learning (ICML)","author":"Yang Y.","year":"1997","unstructured":"Y. Yang and J. Pedersen . A comparative study on feature selection in text categorization . In Proc. of the Int'l Conf. on Machine Learning (ICML) , 1997 . Y. Yang and J. Pedersen. A comparative study on feature selection in text categorization. In Proc. of the Int'l Conf. on Machine Learning (ICML), 1997."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014149"}],"event":{"name":"AIRWeb'08: AIRWeb '08, Third International Workshop on Adversarial Information Retrieval on the Web","location":"Beijing China","acronym":"AIRWeb'08"},"container-title":["Proceedings of the 4th international workshop on Adversarial information retrieval on the web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1451983.1451996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1451983.1451996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:05Z","timestamp":1750253405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1451983.1451996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,22]]},"references-count":24,"alternative-id":["10.1145\/1451983.1451996","10.1145\/1451983"],"URL":"https:\/\/doi.org\/10.1145\/1451983.1451996","relation":{},"subject":[],"published":{"date-parts":[[2008,4,22]]},"assertion":[{"value":"2008-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}