{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:26Z","timestamp":1750306046880,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":6,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3054219","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"811-812","source":"Crossref","is-referenced-by-count":1,"title":["On Detecting Frauds in Comparison-Shopping Services"],"prefix":"10.1145","author":[{"given":"Sang-Chul","family":"Lee","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Dong-Kyu","family":"Chae","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, South Korea"}]},{"given":"Sang-Wook","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, South Korea"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3054219-1","doi-asserted-by":"crossref","unstructured":"D.-H. Bae et al. Outlier detection using centrality and center-proximity. In ACM CIKM, pages 2251--2254, 2012.","DOI":"10.1145\/2396761.2398613"},{"key":"key-10.1145\/3041021.3054219-2","doi-asserted-by":"crossref","unstructured":"G. Cho et al. An empirical study of click fraud in mobile advertising networks. In ARES, 2015.","DOI":"10.1109\/ARES.2015.62"},{"key":"key-10.1145\/3041021.3054219-3","doi-asserted-by":"crossref","unstructured":"M. Gupta et al. Characterizing comparison shopping behavior: A case study. In ICDEW, 2014.","DOI":"10.1109\/ICDEW.2014.6818314"},{"key":"key-10.1145\/3041021.3054219-4","doi-asserted-by":"crossref","unstructured":"M. Jiang et al. A general suspiciousness metric for dense blocks in multimodal data. In ICDM, 2015.","DOI":"10.1109\/ICDM.2015.61"},{"key":"key-10.1145\/3041021.3054219-5","unstructured":"H.-K. Oh et al. Can you trust online ratings? a mutual reinforcement model for trustworthy online rating systems. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 2015."},{"key":"key-10.1145\/3041021.3054219-6","doi-asserted-by":"crossref","unstructured":"H. Zhu et al. Discovery of ranking fraud for mobile apps. IEEE TKDE, 2015.","DOI":"10.1109\/TKDE.2014.2320733"}],"event":{"number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '17 Companion","name":"the 26th International Conference","start":{"date-parts":[[2017,4,3]]},"location":"Perth, Australia","end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3054219","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3054219&ftid=1865220&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:19Z","timestamp":1750215799000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3054219"}},"subtitle":[],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1145\/3041021.3054219","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}