{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:53:47Z","timestamp":1776394427800,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2187836.2187863","type":"proceedings-article","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T18:41:27Z","timestamp":1335292887000},"page":"191-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":469,"title":["Spotting fake reviewer groups in consumer reviews"],"prefix":"10.1145","author":[{"given":"Arjun","family":"Mukherjee","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Bing","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Natalie","family":"Glance","sequence":"additional","affiliation":[{"name":"Google Inc., Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fast algorithms for mining association rules. VLDB","author":"Agrawal R.","year":"1994","unstructured":"Agrawal , R. and Srikant , R . Fast algorithms for mining association rules. VLDB . 1994 . Agrawal, R. and Srikant, R. Fast algorithms for mining association rules. VLDB. 1994."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572047"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000021"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189702.1189703"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099671"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_9_1","volume-title":"Multi-interval discretization of continuous-valued attributes for classification learning. IJCAI","author":"Fayyad U. M.","year":"1993","unstructured":"Fayyad , U. M. and Irani , K. B . Multi-interval discretization of continuous-valued attributes for classification learning. IJCAI . 1993 . Fayyad, U. M. and Irani, K. B. Multi-interval discretization of continuous-valued attributes for classification learning. IJCAI. 1993."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_11_1","volume-title":"An efficient boosting algorithm for combining preference. JMLR","author":"Freund Y.","year":"2003","unstructured":"Freund , Y. , Iyer , R. , Schapire , R. and Singer , Y . An efficient boosting algorithm for combining preference. JMLR . 2003 . Freund, Y., Iyer, R., Schapire, R. and Singer, Y. An efficient boosting algorithm for combining preference. JMLR. 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Scientific Computing: An Introductory Survey. McGrawHill","author":"Heath M. T.","year":"2002","unstructured":"Heath , M. T. , Scientific Computing: An Introductory Survey. McGrawHill , New York . Second edition. 2002 . Heath, M. T., Scientific Computing: An Introductory Survey. McGrawHill, New York. Second edition. 2002."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287899"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_3_2_1_16_1","volume-title":"Making large-scale support vector machine learning practical. Advances in Kernel Methods","author":"Joachims T.","year":"1999","unstructured":"Joachims , T. Making large-scale support vector machine learning practical. Advances in Kernel Methods . MIT Press . 1999 . Joachims, T. Making large-scale support vector machine learning practical. Advances in Kernel Methods. MIT Press. 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_3_2_1_18_1","volume-title":"Automatically assessing review helpfulness. EMNLP","author":"Kim S.M.","year":"2006","unstructured":"Kim , S.M. , Pantel , P. , Chklovski , T. and Pennacchiotti , M . Automatically assessing review helpfulness. EMNLP . 2006 . Kim, S.M., Pantel, P., Chklovski, T. and Pennacchiotti, M. Automatically assessing review helpfulness. EMNLP. 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"ACM-SIAM SODA","author":"Kleinberg J. M.","year":"1998","unstructured":"Kleinberg , J. M. Authoritative sources in a hyperlinked environment . ACM-SIAM SODA , 1998 . Kleinberg, J. M. Authoritative sources in a hyperlinked environment. ACM-SIAM SODA, 1998."},{"key":"e_1_3_2_1_20_1","volume-title":"Detecting Spam Blogs: A Machine Learning Approach. AAAI","author":"Kolari P.","year":"2006","unstructured":"Kolari , P. , Java , A. , Finin , T. , Oates , T. , Joshi , A. Detecting Spam Blogs: A Machine Learning Approach. AAAI . 2006 . Kolari, P., Java, A., Finin, T., Oates, T., Joshi, A. Detecting Spam Blogs: A Machine Learning Approach. AAAI. 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244420"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5591\/978-1-57735-516-8\/IJCAI11-414"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_3_2_1_25_1","volume-title":"EMNLP","author":"Liu J.","year":"2007","unstructured":"Liu , J. , Cao , Y. , Lin , C. , Huang , Zhou, M. Low-quality product review detection in opinion summarization . EMNLP , 2007 . Liu, J., Cao, Y., Lin, C., Huang, Zhou, M. Low-quality product review detection in opinion summarization. EMNLP, 2007."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531924"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531920"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963240"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_31_1","volume-title":"Finding Deceptive Opinion Spam by Any Stretch of the Imagination. ACL","author":"Ott M.","year":"2011","unstructured":"Ott , M. , Choi , Y. , Cardie , C. Hancock , J. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. ACL . 2011 . Ott, M., Choi, Y., Cardie, C. Hancock, J. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. ACL. 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242612"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Wu G. Greene D. Smyth B. and Cunningham P. 2010. Distortion as a validation criterion in the identification of suspicious reviews. Technical report UCD-CSI-2010-04 University College Dublin.  Wu G. Greene D. Smyth B. and Cunningham P. 2010. Distortion as a validation criterion in the identification of suspicious reviews. Technical report UCD-CSI-2010-04 University College Dublin.","DOI":"10.1145\/1964858.1964860"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135792"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2008.38"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183626"}],"event":{"name":"WWW 2012: 21st World Wide Web Conference 2012","location":"Lyon France","acronym":"WWW 2012","sponsor":["Univ. de Lyon Universite de Lyon","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 21st international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2187836.2187863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:34Z","timestamp":1750241194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":37,"alternative-id":["10.1145\/2187836.2187863","10.1145\/2187836"],"URL":"https:\/\/doi.org\/10.1145\/2187836.2187863","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}