{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T21:03:13Z","timestamp":1754600593681,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106464","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"863-868","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An ensemble method for the credibility assessment of user-generated content"],"prefix":"10.1145","author":[{"given":"Julien","family":"Fontanarava","sequence":"first","affiliation":[{"name":"Ecole polytechnique, Route de Saclay, Palaiseau Cedex, France"}]},{"given":"Gabriella","family":"Pasi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano-Bicocca \/ DISCo, Milano, Italy"}]},{"given":"Marco","family":"Viviani","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano-Bicocca \/ DISCo, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"volume-title":"Emergent Semantics in Distributed Knowledge Management","author":"Aiello Carola","key":"e_1_3_2_1_1_1","unstructured":"Carola Aiello , Tiziana Catarci , Paolo Ceravolo , Ernesto Damiani , Monica Scannapieco , and Marco Viviani . 2008. Emergent Semantics in Distributed Knowledge Management . Springer Berlin Heidelberg , Berlin, Heidelberg , 201--220. Carola Aiello, Tiziana Catarci, Paolo Ceravolo, Ernesto Damiani, Monica Scannapieco, and Marco Viviani. 2008. Emergent Semantics in Distributed Knowledge Management. Springer Berlin Heidelberg, Berlin, Heidelberg, 201--220."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918299"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35386-4_24"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2012-0095"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.04.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"volume-title":"Privacy in Social Collaboration","author":"Ferrari Elena","key":"e_1_3_2_1_7_1","unstructured":"Elena Ferrari and Marco Viviani . 2013. Privacy in Social Collaboration . Springer New York , New York, NY , 857--878. Elena Ferrari and Marco Viviani. 2013. Privacy in Social Collaboration. Springer New York, New York, NY, 857--878."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. 6th International Conference on Social Informatics (SocInfo)","author":"Gupta Aditi","year":"2014","unstructured":"Aditi Gupta , Ponnurangam Kumaraguru , Carlos Castillo , and Patrick Meier . 2014 . Tweetcred: A real-time Web-based system for assessing credibility of content on Twitter . In Proc. 6th International Conference on Social Informatics (SocInfo) . Barcelona, Spain. Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. Tweetcred: A real-time Web-based system for assessing credibility of content on Twitter. In Proc. 6th International Conference on Social Informatics (SocInfo). Barcelona, Spain."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.029"},{"key":"e_1_3_2_1_11_1","volume-title":"New Haven: Yale University Press.","author":"Hovland C. I.","year":"1953","unstructured":"C. I. Hovland , I. L. Janis , and H. H. Kelley . 1953 . Communication and persuasion. New Haven: Yale University Press. C. I. Hovland, I. L. Janis, and H. H. Kelley. 1953. Communication and persuasion. New Haven: Yale University Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"volume-title":"2010 IEEE 7th International Conference on E-Business Engineering. 1--8.","author":"Lai C. L.","key":"e_1_3_2_1_14_1","unstructured":"C. L. Lai , K. Q. Xu , R. Y. K. Lau , Y. Li , and L. Jing . 2010. Toward a Language Modeling Approach for Consumer Review Spam Detection . In 2010 IEEE 7th International Conference on E-Business Engineering. 1--8. C. L. Lai, K. Q. Xu, R. Y. K. Lau, Y. Li, and L. Jing. 2010. Toward a Language Modeling Approach for Consumer Review Spam Detection. In 2010 IEEE 7th International Conference on E-Business Engineering. 1--8."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070710.2070716"},{"key":"e_1_3_2_1_16_1","volume-title":"Spotting Fake Reviews using Positive-Unlabeled Learning. Computaci\u00f3n y Sistemas 18, 3","author":"Li Huayi","year":"2014","unstructured":"Huayi Li , Bing Liu , Arjun Mukherjee , and Jidong Shao . 2014. Spotting Fake Reviews using Positive-Unlabeled Learning. Computaci\u00f3n y Sistemas 18, 3 ( 2014 ), 467--475. Huayi Li, Bing Liu, Arjun Mukherjee, and Jidong Shao. 2014. Spotting Fake Reviews using Positive-Unlabeled Learning. Computaci\u00f3n y Sistemas 18, 3 (2014), 467--475."},{"key":"e_1_3_2_1_17_1","first-page":"587","article-title":"Learning to classify texts using positive and unlabeled data","volume":"3","author":"Li Xiaoli","year":"2003","unstructured":"Xiaoli Li and Bing Liu . 2003 . Learning to classify texts using positive and unlabeled data . In IJCAI , Vol. 3. 587 -- 592 . Xiaoli Li and Bing Liu. 2003. Learning to classify texts using positive and unlabeled data. In IJCAI, Vol. 3. 587--592.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2304"},{"key":"e_1_3_2_1_19_1","volume-title":"User generated content and credibility evaluation of online health information: A meta analytic study. Telematics and Informatics","author":"Ma Tao Jennifer","year":"2016","unstructured":"Tao Jennifer Ma and David Atkin . 2016. User generated content and credibility evaluation of online health information: A meta analytic study. Telematics and Informatics ( 2016 ). Tao Jennifer Ma and David Atkin. 2016. User generated content and credibility evaluation of online health information: A meta analytic study. Telematics and Informatics (2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"Ensemble of generative and discriminative techniques for sentiment analysis of movie reviews. arXiv preprint arXiv:1412.5335","author":"Mesnil Gr\u00e9goire","year":"2014","unstructured":"Gr\u00e9goire Mesnil , Tomas Mikolov , Marc'Aurelio Ranzato , and Yoshua Bengio . 2014. Ensemble of generative and discriminative techniques for sentiment analysis of movie reviews. arXiv preprint arXiv:1412.5335 ( 2014 ). Gr\u00e9goire Mesnil, Tomas Mikolov, Marc'Aurelio Ranzato, and Yoshua Bengio. 2014. Ensemble of generative and discriminative techniques for sentiment analysis of movie reviews. arXiv preprint arXiv:1412.5335 (2014)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2013.07.012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2003.11679029"},{"key":"e_1_3_2_1_24_1","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"Mikolov Tomas","year":"2010","unstructured":"Tomas Mikolov , Martin Karafi\u00e1t , Lukas Burget , Jan Cernock\u1ef3 , and Sanjeev Khudanpur . 2010 . Recurrent neural network based language model .. In Interspeech , Vol. 2. 3 . Tomas Mikolov, Martin Karafi\u00e1t, Lukas Burget, Jan Cernock\u1ef3, and Sanjeev Khudanpur. 2010. Recurrent neural network based language model.. In Interspeech, Vol. 2. 3.","journal-title":"Interspeech"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of ICWSM.","author":"Mukherjee Arjun","year":"2013","unstructured":"Arjun Mukherjee , Vivek Venkataraman , Bing Liu , and Natalie S Glance . 2013 . What Yelp fake review filter might be doing? . In Proceedings of ICWSM. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S Glance. 2013. What Yelp fake review filter might be doing?. In Proceedings of ICWSM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.614"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187864"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2004.tb02547.x"},{"key":"e_1_3_2_1_30_1","unstructured":"Yafeng Ren Donghong Ji and Hongbin Zhang. 2014. Positive Unlabeled Learning for Deceptive Reviews Detection.. In EMNLP. 488--498.  Yafeng Ren Donghong Ji and Hongbin Zhang. 2014. Positive Unlabeled Learning for Deceptive Reviews Detection.. In EMNLP. 488--498."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"e_1_3_2_1_32_1","volume-title":"An Integrated Approach to Communication Theory and Research","author":"Self Charles S.","unstructured":"Charles S. Self . 2008. Credibility . In An Integrated Approach to Communication Theory and Research , 2 nd Edition, Michael B. Salwen and Don W. Stacks (Eds.). Routledge, Taylor and Francis Group , 435--456. Charles S. Self. 2008. Credibility. In An Integrated Approach to Communication Theory and Research, 2nd Edition, Michael B. Salwen and Don W. Stacks (Eds.). Routledge, Taylor and Francis Group, 435--456.","edition":"2"},{"key":"e_1_3_2_1_33_1","volume-title":"International Journal of Intelligent Systems","author":"Viviani Marco","year":"2016","unstructured":"Marco Viviani and Gabriella Pasi . 2016. Quantifier Guided Aggregation for the Veracity Assessment of Online Reviews . International Journal of Intelligent Systems ( 2016 ). Marco Viviani and Gabriella Pasi. 2016. Quantifier Guided Aggregation for the Veracity Assessment of Online Reviews. International Journal of Intelligent Systems (2016)."},{"key":"e_1_3_2_1_34_1","volume-title":"Credibility in Social Media: Opinions, News, and Health Information - A Survey. WIREs Data Mining and Knowledge Discovery","author":"Viviani Marco","year":"2017","unstructured":"Marco Viviani and Gabriella Pasi . 2017. Credibility in Social Media: Opinions, News, and Health Information - A Survey. WIREs Data Mining and Knowledge Discovery ( 2017 ). Marco Viviani and Gabriella Pasi. 2017. Credibility in Social Media: Opinions, News, and Health Information - A Survey. WIREs Data Mining and Knowledge Discovery (2017)."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2. Association for Computational Linguistics, 90--94","author":"Wang Sida","year":"2012","unstructured":"Sida Wang and Christopher D Manning . 2012 . Baselines and bigrams: Simple, good sentiment and topic classification . In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2. Association for Computational Linguistics, 90--94 . Sida Wang and Christopher D Manning. 2012. Baselines and bigrams: Simple, good sentiment and topic classification. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2. Association for Computational Linguistics, 90--94."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10016"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"location":"Leipzig Germany","acronym":"WI '17"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:12Z","timestamp":1750217412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":35,"alternative-id":["10.1145\/3106426.3106464","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106464","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}