{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:19:21Z","timestamp":1768591161824,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":36,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Natural Science Foundation","award":["61622208 61732008 61532011"],"award-info":[{"award-number":["61622208 61732008 61532011"]}]},{"name":"Alibaba Group through Alibaba Innovative Research (AIR) Program"},{"name":"National Key Basic Research Program","award":["2015CB358700"],"award-info":[{"award-number":["2015CB358700"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3186079","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"1673-1682","source":"Crossref","is-referenced-by-count":17,"title":["Detecting Crowdturfing \"Add to Favorites\" Activities in Online Shopping"],"prefix":"10.1145","author":[{"given":"Ning","family":"Su","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yiqun","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Yuli","family":"Liu","sequence":"additional","affiliation":[{"name":"Qinghai University, Qinghai, China"}]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Shaoping","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3178876.3186079-1","unstructured":"Prudhvi Ratna Badri Satya, Kyumin Lee, Dongwon Lee, Thanh Tran, and Jason Jiasheng Zhang. 2016. Uncovering fake likers in online social networks. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. ACM, 2365--2370."},{"key":"key-10.1145\/3178876.3186079-2","doi-asserted-by":"crossref","unstructured":"Antoaneta Baltadzhieva. 2015. Question Quality in Community Question Answering Forums:a survey. Acm Sigkdd Explorations Newsletter Vol. 17, 1 (2015), 8--13.","DOI":"10.1145\/2830544.2830547"},{"key":"key-10.1145\/3178876.3186079-3","doi-asserted-by":"crossref","unstructured":"Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. 2013. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. Vol. 33, 9 (2013), 119--130.","DOI":"10.1145\/2488388.2488400"},{"key":"key-10.1145\/3178876.3186079-4","doi-asserted-by":"crossref","unstructured":"Cheng Cao, James Caverlee, Kyumin Lee, Hancheng Ge, and Jinwook Chung. 2015. Organic or Organized?: Exploring URL Sharing Behavior ACM International on Conference on Information and Knowledge Management. 513--522.","DOI":"10.1145\/2806416.2806572"},{"key":"key-10.1145\/3178876.3186079-5","unstructured":"Cheng Chen, Kui Wu, V Srinivasan, and K Bharadwaj, R. 2012. The best answers? Think twice: Online detection of commercial campaigns in the CQA forums. (2012), 458--465."},{"key":"key-10.1145\/3178876.3186079-6","doi-asserted-by":"crossref","unstructured":"Amir Fayazi, Kyumin Lee, James Caverlee, and Anna Squicciarini. 2015. Uncovering Crowdsourced Manipulation of Online Reviews International ACM SIGIR Conference on Research and Development in Information Retrieval. 233--242.","DOI":"10.1145\/2766462.2767742"},{"key":"key-10.1145\/3178876.3186079-7","unstructured":"Song Feng, Longfei Xing, Anupam Gogar, and Yejin Choi. 2012. Distributional Footprints of Deceptive Product Reviews."},{"key":"key-10.1145\/3178876.3186079-8","doi-asserted-by":"crossref","unstructured":"David Mandell Freeman. 2017. Can You Spot the Fakes?: On the Limitations of User Feedback in Online Social Networks. In International Conference on World Wide Web. 1093--1102.","DOI":"10.1145\/3038912.3052706"},{"key":"key-10.1145\/3178876.3186079-9","doi-asserted-by":"crossref","unstructured":"Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Data Mining. ACM, 219--230.","DOI":"10.1145\/1341531.1341560"},{"key":"key-10.1145\/3178876.3186079-10","doi-asserted-by":"crossref","unstructured":"Kyumin Lee, James Caverlee, Zhiyuan Cheng, and Daniel Z. Sui. 2014. Campaign extraction from social media. Acm Transactions on Intelligent Systems &#38; Technology Vol. 5, 1 (2014), 1--28.","DOI":"10.1145\/2542182.2542191"},{"key":"key-10.1145\/3178876.3186079-11","unstructured":"Kyumin Lee, Brian David Eoff, and James Caverlee. 2006. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. (2006)."},{"key":"key-10.1145\/3178876.3186079-12","unstructured":"Kyumin Lee, Prithivi Tamilarasan, and James Caverlee. 2013. Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media."},{"key":"key-10.1145\/3178876.3186079-13","doi-asserted-by":"crossref","unstructured":"Beibei Li, Anindya Ghose, and Panagiotis G Ipeirotis. 2011. Towards a theory model for product search. In Proceedings of the 20th international conference on World wide web. ACM, 327--336.","DOI":"10.1145\/1963405.1963453"},{"key":"key-10.1145\/3178876.3186079-14","doi-asserted-by":"crossref","unstructured":"Baichuan Li, Tan Jin, Michael R. Lyu, Irwin King, and Barley Mak. 2012. Analyzing and predicting question quality in community question answering services. In International Conference on World Wide Web. 775--782.","DOI":"10.1145\/2187980.2188200"},{"key":"key-10.1145\/3178876.3186079-15","unstructured":"Xin Li, Yiqun Liu, Min Zhang, Shaoping Ma, Xuan Zhu, and Jiashen Sun. 2015. Detecting Promotion Campaigns in Community Question Answering. IJCAI. 2348--2354."},{"key":"key-10.1145\/3178876.3186079-16","doi-asserted-by":"crossref","unstructured":"Ee Peng Lim, Viet An Nguyen, Nitin Jindal, Bing Liu, and Hady Wirawan Lauw. 2010. Detecting product review spammers using rating behaviors ACM International Conference on Information and Knowledge Management. 939--948.","DOI":"10.1145\/1871437.1871557"},{"key":"key-10.1145\/3178876.3186079-17","doi-asserted-by":"crossref","unstructured":"Yuli Liu, Yiqun Liu, Ke Zhou, Min Zhang, and Shaoping Ma. 2017. Detecting Collusive Spamming Activities in Community Question Answering The International Conference. 1073--1082.","DOI":"10.1145\/3038912.3052594"},{"key":"key-10.1145\/3178876.3186079-18","unstructured":"Bo Long, Jiang Bian, Anlei Dong, and Yi Chang. 2012. Enhancing product search by best-selling prediction in e-commerce Proceedings of the 21st ACM international conference on Information and knowledge management. ACM, 2479--2482."},{"key":"key-10.1145\/3178876.3186079-19","unstructured":"Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, and Livia Polanyi. 2010. Exploiting social context for review quality prediction. (2010), 691--700."},{"key":"key-10.1145\/3178876.3186079-20","doi-asserted-by":"crossref","unstructured":"Yuqing Lu, Lei Zhang, Yudong Xiao, and Yangguang Li. 2013. Simultaneously detecting fake reviews and review spammers using factor graph model ACM Web Science Conference. 225--233.","DOI":"10.1145\/2464464.2464470"},{"key":"key-10.1145\/3178876.3186079-21","doi-asserted-by":"crossref","unstructured":"Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spotting fake reviewer groups in consumer reviews. In International Conference on World Wide Web. 191--200.","DOI":"10.1145\/2187836.2187863"},{"key":"key-10.1145\/3178876.3186079-22","unstructured":"Kevin Murphy, Yair Weiss, and Michael I. Jordan. 2013. Loopy Belief Propagation for Approximate Inference: An Empirical Study. (2013), 467--475."},{"key":"key-10.1145\/3178876.3186079-23","unstructured":"Myle Ott, Claire Cardie, and Jeff Hancock. 2012. Estimating the prevalence of deception in online review communities. (2012), 201--210."},{"key":"key-10.1145\/3178876.3186079-24","unstructured":"Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. 2011. Finding deceptive opinion spam by any stretch of the imagination. Vol. 1 (2011), 309--319."},{"key":"key-10.1145\/3178876.3186079-25","doi-asserted-by":"crossref","unstructured":"Vlad Sandulescu and Martin Ester. 2015. Detecting Singleton Review Spammers Using Semantic Similarity. (2015).","DOI":"10.1145\/2740908.2742570"},{"key":"key-10.1145\/3178876.3186079-26","doi-asserted-by":"crossref","unstructured":"Chirag Shah and Jefferey Pomerantz. 2010. Evaluating and predicting answer quality in community QA International ACM SIGIR Conference on Research and Development in Information Retrieval. 411--418.","DOI":"10.1145\/1835449.1835518"},{"key":"key-10.1145\/3178876.3186079-27","doi-asserted-by":"crossref","unstructured":"Neil Shah. 2017. FLOCK: Combating Astroturfing on Livestreaming Platforms The International Conference. 1083--1091.","DOI":"10.1145\/3038912.3052617"},{"key":"key-10.1145\/3178876.3186079-28","unstructured":"Shankar S Siva. 2014. Survey Paper for WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream. International Journal of Advanced Trends in Computer Science &#38; Engineering Vol. 3, 5 (2014), 2319--7242."},{"key":"key-10.1145\/3178876.3186079-29","doi-asserted-by":"crossref","unstructured":"Wenbin Tang, Honglei Zhuang, and Jie Tang. 2011. Learning to Infer Social Ties in Large Networks. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 381--397.","DOI":"10.1007\/978-3-642-23808-6_25"},{"key":"key-10.1145\/3178876.3186079-30","doi-asserted-by":"crossref","unstructured":"Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, and Tong Zhang. 2015. Crowd fraud detection in internet advertising. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1100--1110.","DOI":"10.1145\/2736277.2741136"},{"key":"key-10.1145\/3178876.3186079-31","doi-asserted-by":"crossref","unstructured":"Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, and Ben Y. Zhao. 2012. Serf and turf: crowdturfing for fun and profit. In International Conference on World Wide Web. 679--688.","DOI":"10.1145\/2187836.2187928"},{"key":"key-10.1145\/3178876.3186079-32","doi-asserted-by":"crossref","unstructured":"Fangzhao Wu, Jinyun Shu, Yongfeng Huang, and Zhigang Yuan. 2015. Social spammer and spam message co-detection in microblogging with social context regularization. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 1601--1610.","DOI":"10.1145\/2806416.2806560"},{"key":"key-10.1145\/3178876.3186079-33","doi-asserted-by":"crossref","unstructured":"Chang Xu and Jie Zhang. 2016. Towards Collusive Fraud Detection in Online Reviews IEEE International Conference on Data Mining. 1051--1056.","DOI":"10.1109\/ICDM.2015.62"},{"key":"key-10.1145\/3178876.3186079-34","unstructured":"Chang Xu, Jie Zhang, Kuiyu Chang, and Chong Long. 2013. Uncovering collusive spammers in chinese review websites Proceedings of the 22nd ACM international conference on Conference on information &#38; knowledge management. ACM, 979--988."},{"key":"key-10.1145\/3178876.3186079-35","doi-asserted-by":"crossref","unstructured":"Junting Ye and Leman Akoglu. 2015. Discovering Opinion Spammer Groups by Network Footprints Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 267--282.","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"key-10.1145\/3178876.3186079-36","unstructured":"Kyung Hyan Yoo and Ulrike Gretzel. 2009. Comparison of Deceptive and Truthful Travel Reviews Information and Communication Technologies in Tourism, Enter 2009, Proceedings of the International Conference in Amsterdam, the Netherlands. 37--47."}],"event":{"name":"the 2018 World Wide Web Conference","location":"Lyon, France","acronym":"WWW '18","number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3186079","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186079&ftid=1957354&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:27:42Z","timestamp":1751563662000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3186079"}},"subtitle":[],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1145\/3178876.3186079","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}