{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:03:57Z","timestamp":1775743437426,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T00:00:00Z","timestamp":1404345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141410095"],"award-info":[{"award-number":["N000141410095"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["#025071"],"award-info":[{"award-number":["#025071"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,3]]},"DOI":"10.1145\/2600428.2609632","type":"proceedings-article","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T12:20:11Z","timestamp":1404822011000},"page":"547-556","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Leveraging knowledge across media for spammer detection in microblogging"],"prefix":"10.1145","author":[{"given":"Xia","family":"Hu","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, USA"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of IJCNLP","author":"Baldwin T.","year":"2013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9109-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press 2004.   S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press 2004.","DOI":"10.1017\/CBO9780511804441"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1996.tb00336.x"},{"key":"e_1_3_2_1_8_1","volume-title":"Amer Mathematical Society","author":"Chung F.","year":"1997"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.277"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2229-2-6"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of NAACL-HLT","author":"Eisenstein J.","year":"2013"},{"key":"e_1_3_2_1_12_1","unstructured":"J. Friedman T. Hastie and R. Tibshirani. The elements of statistical learning 2008.  J. Friedman T. Hastie and R. Tibshirani. The elements of statistical learning 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166191"},{"key":"e_1_3_2_1_15_1","unstructured":"M. A. Halliday and C. M. Matthiessen. An introduction to functional grammar. 2004.  M. A. Halliday and C. M. Matthiessen. An introduction to functional grammar. 2004."},{"key":"e_1_3_2_1_16_1","volume-title":"Project Gutenberg","author":"Hart M.","year":"1971"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646071"},{"key":"e_1_3_2_1_19_1","volume-title":"AAAI","author":"Hu X.","year":"2014"},{"key":"e_1_3_2_1_20_1","volume-title":"IJCAI","author":"Hu X.","year":"2013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433465"},{"key":"e_1_3_2_1_22_1","unstructured":"K. Lee J. Caverlee and S. Webb. Uncovering social spammers: social honeypots  K. Lee J. Caverlee and S. Webb. Uncovering social spammers: social honeypots"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of SIGIR","year":"2010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1687878.1687914"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244410"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of CEAS","author":"Metsis V.","year":"2006"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of ICWSM","author":"O'Callaghan D.","year":"2012"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_29_1","first-page":"556","volume-title":"NIPS","author":"Seung D.","year":"2001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"e_1_3_2_1_31_1","unstructured":"R. Wardhaugh. An introduction to sociolinguistics volume 28. Wiley. com 2011.  R. Wardhaugh. An introduction to sociolinguistics volume 28. Wiley. com 2011."},{"key":"e_1_3_2_1_32_1","volume-title":"CEAS","author":"Webb S.","year":"2006"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"S. J. Yates. Oral and written linguistic aspects of computer conferencing. Pragmatics and beyond New Series 1996.  S. J. Yates. Oral and written linguistic aspects of computer conferencing. Pragmatics and beyond New Series 1996.","DOI":"10.1075\/pbns.39.05yat"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of AAAI","author":"Zhu Y.","year":"2012"}],"event":{"name":"SIGIR '14: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Gold Coast Queensland Australia","acronym":"SIGIR '14","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 37th international ACM SIGIR conference on Research &amp; development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600428.2609632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:27Z","timestamp":1750230087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,3]]},"references-count":35,"alternative-id":["10.1145\/2600428.2609632","10.1145\/2600428"],"URL":"https:\/\/doi.org\/10.1145\/2600428.2609632","relation":{},"subject":[],"published":{"date-parts":[[2014,7,3]]},"assertion":[{"value":"2014-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}