{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:19:52Z","timestamp":1762017592112,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2184305.2184316","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"48-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Detecting collective attention spam"],"prefix":"10.1145","author":[{"given":"Kyumin","family":"Lee","sequence":"first","affiliation":[{"name":"Texas A&amp;M University College Station, TX"}]},{"given":"James","family":"Caverlee","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University College Station, TX"}]},{"given":"Krishna Y.","family":"Kamath","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University College Station, TX"}]},{"given":"Zhiyuan","family":"Cheng","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University College Station, TX"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572047"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460628"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13941"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.125"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963222"},{"key":"e_1_3_2_1_8_1","volume-title":"Detection of intrusions and malware, and vulnerability assessment (DIMVA)","author":"Irani D.","year":"2011","unstructured":"D. Irani , M. Balduzzi , D. Balzarotti , E. Kirda , and C. Pu . Reverse social engineering attacks in online social networks . In Detection of intrusions and malware, and vulnerability assessment (DIMVA) , 2011 . D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Detection of intrusions and malware, and vulnerability assessment (DIMVA), 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Anti-Abuse and Spam Conference (CEAS)","author":"Irani D.","year":"2010","unstructured":"D. Irani , S. Webb , C. Pu , and K. Li . Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS) , 2010 . D. Irani, S. Webb, C. Pu, and K. Li. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409220.1409225"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063658"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_14_1","volume-title":"ICWSM","author":"Lee K.","year":"2011","unstructured":"K. Lee , B. D. Eoff , and J. Caverlee . Seven months with the devils: A long-term study of content polluters on twitter . In ICWSM , 2011 . K. Lee, B. D. Eoff, and J. Caverlee. Seven months with the devils: A long-term study of content polluters on twitter. In ICWSM, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"ICWSM","author":"Lerman K.","year":"2010","unstructured":"K. Lerman and R. Ghosh . Information contagion: An empirical study of the spread of news on digg and twitter social networks . In ICWSM , 2010 . K. Lerman and R. Ghosh. Information contagion: An empirical study of the spread of news on digg and twitter social networks. In ICWSM, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963240"},{"key":"e_1_3_2_1_18_1","volume-title":"ICWSM","author":"Ratkiewicz J.","year":"2011","unstructured":"J. Ratkiewicz , M. Conover , M. Meiss , B. Gon\u00e7alves , A. Flammini , and F. Menczer . Detecting and tracking political abuse in social media . In ICWSM , 2011 . J. Ratkiewicz, M. Conover, M. Meiss, B. Gon\u00e7alves, A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In ICWSM, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963503"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0704916104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964860"}],"event":{"name":"WebQuality '12: Joint WICOW\/AIRWeb Workshop on Web Quality","acronym":"WebQuality '12","location":"Lyon France"},"container-title":["Proceedings of the 2nd Joint WICOW\/AIRWeb Workshop on Web Quality"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184305.2184316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184305.2184316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:24:10Z","timestamp":1750267450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184305.2184316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":21,"alternative-id":["10.1145\/2184305.2184316","10.1145\/2184305"],"URL":"https:\/\/doi.org\/10.1145\/2184305.2184316","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}