{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:48:26Z","timestamp":1774374506974,"version":"3.50.1"},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"],"award-info":[{"award-number":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000089","name":"Office of International Science and Engineering","doi-asserted-by":"publisher","award":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"],"award-info":[{"award-number":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"]}],"id":[{"id":"10.13039\/100000089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000153","name":"Division of Biological Infrastructure","doi-asserted-by":"publisher","award":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"],"award-info":[{"award-number":["IIS-0905215OISE-0968341DBI-0960443IIS-1111092"]}],"id":[{"id":"10.13039\/100000153","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2012,9]]},"abstract":"<jats:p>Online shopping reviews provide valuable information for customers to compare the quality of products, store services, and many other aspects of future purchases. However, spammers are joining this community trying to mislead consumers by writing fake or unfair reviews to confuse the consumers. Previous attempts have used reviewers\u2019 behaviors such as text similarity and rating patterns, to detect spammers. These studies are able to identify certain types of spammers, for instance, those who post many similar reviews about one target. However, in reality, there are other kinds of spammers who can manipulate their behaviors to act just like normal reviewers, and thus cannot be detected by the available techniques.<\/jats:p>\n                  <jats:p>In this article, we propose a novel concept of review graph to capture the relationships among all reviewers, reviews and stores that the reviewers have reviewed as a heterogeneous graph. We explore how interactions between nodes in this graph could reveal the cause of spam and propose an iterative computation model to identify suspicious reviewers. In the review graph, we have three kinds of nodes, namely, reviewer, review, and store. We capture their relationships by introducing three fundamental concepts, the trustiness of reviewers, the honesty of reviews, and the reliability of stores, and identifying their interrelationships: a reviewer is more trustworthy if the person has written more honesty reviews; a store is more reliable if it has more positive reviews from trustworthy reviewers; and a review is more honest if many other honest reviews support it. This is the first time such intricate relationships have been identified for spam detection and captured in a graph model. We further develop an effective computation method based on the proposed graph model. Different from any existing approaches, we do not use an review text information. Our model is thus complementary to existing approaches and able to find more difficult and subtle spamming activities, which are agreed upon by human judges after they evaluate our results.<\/jats:p>","DOI":"10.1145\/2337542.2337546","type":"journal-article","created":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T16:56:02Z","timestamp":1350060962000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["Identify Online Store Review Spammers via Social Review Graph"],"prefix":"10.1145","volume":"3","author":[{"given":"Guan","family":"Wang","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago"}]},{"given":"Sihong","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago"}]},{"given":"Bing","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago"}]}],"member":"320","published-online":{"date-parts":[[2012,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Barabasi A. and Albert R. 1999. Emergence of scaling in random networks. Science.","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 4th International Conference on Recent Advances in Natural Language Processing. 58--64","author":"Carreras X.","unstructured":"Carreras, X., Marquez, L. S., and Salgado, J. G. 2001. Boosting trees for anti-spam email filtering. In Proceedings of the 4th International Conference on Recent Advances in Natural Language Processing. 58--64."},{"key":"e_1_2_1_3_1","unstructured":"Consumerist. Resellerratings cracks down on thecellshop.net\u2019s review bribing. http:\/\/consumerist.com\/2008\/05\/reselleratings-cracks-down-on-thecellshopnets-review-bribing.html."},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Fleiss J. and Cohen J. 1973. The equivalence of weighted kappa and the intraclass correlation coefficient as measures of reliability. In Educational and Psychological Measurement.","DOI":"10.1177\/001316447303300309"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Workshop on Adversarial IR on the Web.","author":"Gyngyi Z.","unstructured":"Gyngyi, Z. and Garcia-Molina, H. 2005. Web spam taxonomy. In Proceedings of the Workshop on Adversarial IR on the Web."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014073"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Landis J. and Koch G. 1977. The measurement of observer agreement for categorical data. Biometrics.","DOI":"10.2307\/2529310"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150478"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.77"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_2_1_14_1","unstructured":"Liu B. 2010. Sentiment analysis and subjectivity. In Handbook of Natural Language Processing."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557155"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963240"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002512"},{"key":"e_1_2_1_18_1","unstructured":"Page L. Brin S. Motwani R. and Winograd T. 1998. The pagerank citation ranking: Bringing order to the web. Tech. rep. Stanford Digital Library Technologies Project."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Pearl R. and Reed L. 1920. On the rate of growth of the population of the united states since 1790 and its mathematical representation. Proc. Nat. Acad. Sci.","DOI":"10.1073\/pnas.6.6.275"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220618"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964860"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2337542.2337546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2337542.2337546","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2337542.2337546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:46:06Z","timestamp":1763459166000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2337542.2337546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["10.1145\/2337542.2337546"],"URL":"https:\/\/doi.org\/10.1145\/2337542.2337546","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9]]},"assertion":[{"value":"2010-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-05-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-09-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}