{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:18:56Z","timestamp":1772122736314,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970031","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting deceptive reviews using Argumentation"],"prefix":"10.1145","author":[{"given":"Oana","family":"Cocarascu","sequence":"first","affiliation":[{"name":"Imperial College London, United Kingdom, London"}]},{"given":"Francesca","family":"Toni","sequence":"additional","affiliation":[{"name":"Imperial College London, United Kingdom, London"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742575"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28460-6_1"},{"key":"e_1_3_2_1_3_1","volume-title":"The MIT Press","author":"Besnard P.","year":"2008"},{"key":"e_1_3_2_1_4_1","unstructured":"S. Bird E. Klein and E. Loper. Natural Language Processing with Python. O'Reilly Media 2009.   S. Bird E. Klein and E. Loper. Natural Language Processing with Python. O'Reilly Media 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-2107"},{"key":"e_1_3_2_1_6_1","first-page":"205","volume-title":"ECAI","volume":"242","author":"Cabrio E.","year":"2012"},{"key":"e_1_3_2_1_7_1","volume-title":"Joint Symposium on Semantic Processing (JSSP)","author":"Cabrio E.","year":"2013"},{"key":"e_1_3_2_1_8_1","volume-title":"Imperial College London","author":"Carstens L.","year":"2016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.185"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W15-0504"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11518655_33"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Sixth International Conference on Language Resources and Evaluation (LREC). European Language Resources Association (ELRA)","author":"Chris Reed G. R.","year":"2008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"key":"e_1_3_2_1_14_1","first-page":"2031","article-title":"Pattern for python","volume":"13","author":"De Smedt T.","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00041-X"},{"key":"e_1_3_2_1_16_1","first-page":"665","volume-title":"Encyclopedia of Language and Linguistics","author":"Fellbaum C.","year":"2005"},{"key":"e_1_3_2_1_17_1","first-page":"418","volume-title":"12th Americas Conference on Information Systems","author":"Fuller C. M."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.11.001"},{"key":"e_1_3_2_1_19_1","first-page":"333","volume-title":"ECAI","author":"Gao Y.","year":"2014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-2106"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.68"},{"key":"e_1_3_2_1_22_1","first-page":"515","volume-title":"Computational Models of Argument - Proceedings of COMMA","volume":"245","author":"Lawrence J.","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W15-0516"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283696.2283811"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_3_2_1_27_1","first-page":"163","volume-title":"Argument Mining: A Machine Learning Perspective. In The 2015 International Workshop on Theory and Applications of Formal Argument","author":"Lippi M.","year":"2015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1567281.1567335"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics","author":"Ott M.","year":"2013"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002512"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-010-9104-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-2105"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2013010101"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3032027.3032035"},{"key":"e_1_3_2_1_39_1","unstructured":"I. Rahwan and G. R. Simari. Argumentation in Artificial Intelligence. Springer Publishing Company Incorporated 1st edition 2009.   I. Rahwan and G. R. Simari. Argumentation in Artificial Intelligence. Springer Publishing Company Incorporated 1st edition 2009."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742570"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W15-0508"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2013.6920707"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","location":"The Hague Netherlands","acronym":"PrAISe '16"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":44,"alternative-id":["10.1145\/2970030.2970031","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970031","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}