{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:35:32Z","timestamp":1763037332300,"version":"3.41.0"},"reference-count":83,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS- 1422206, DGE-1565570"],"award-info":[{"award-number":["CNS- 1422206, DGE-1565570"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009505","name":"University of Kansas","doi-asserted-by":"publisher","award":["INS-0073037"],"award-info":[{"award-number":["INS-0073037"]}],"id":[{"id":"10.13039\/100009505","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["Science of Security Initiative"],"award-info":[{"award-number":["Science of Security Initiative"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2019,9,30]]},"abstract":"<jats:p>With the increasing popularity of online review systems, a large volume of user-generated content becomes available to help people make reasonable judgments about the quality of services and products from unknown providers. However, these platforms are frequently abused since fraudulent information can be freely inserted by potentially malicious users without validation. Consequently, online review systems become targets of individual and professional spammers, who insert deceptive reviews by manipulating the rating and\/or the content of the reviews.<\/jats:p>\n          <jats:p>In this work, we propose a review spamming detection scheme based on the deviation between the aspect-specific opinions extracted from individual reviews and the aggregated opinions on the corresponding aspects. In particular, we model the influence on the trustworthiness of the user due to his opinion deviations from the majority in the form of a deviation-based penalty, and integrate this penalty into a three-layer trust propagation framework to iteratively compute the trust scores for users, reviews, and review targets, respectively. The trust scores are effective indicators of spammers, since they reflect the overall deviation of a user from the aggregated aspect-specific opinions across all targets and all aspects. Experiments on the dataset collected from Yelp.com show that the proposed detection scheme based on aspect-specific content-aware trust propagation is able to measure users\u2019 trustworthiness based on opinions expressed in reviews.<\/jats:p>","DOI":"10.1145\/3305258","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T12:18:56Z","timestamp":1561033136000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Content-Aware Trust Propagation Toward Online Review Spam Detection"],"prefix":"10.1145","volume":"11","author":[{"given":"Hao","family":"Xue","sequence":"first","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"given":"Qiaozhi","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"given":"Hyunjin","family":"Seo","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Leman Akoglu Rishi Chandy and Christos Faloutsos. 2013. Opinion fraud detection in online reviews by network effects. In ICWSM.  Leman Akoglu Rishi Chandy and Christos Faloutsos. 2013. Opinion fraud detection in online reviews by network effects. In ICWSM."},{"key":"e_1_2_1_2_1","first-page":"2200","article-title":"SentiWordNet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining","volume":"10","author":"Baccianella Stefano","year":"2010","unstructured":"Stefano Baccianella , Andrea Esuli , and Fabrizio Sebastiani . 2010 . SentiWordNet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining . In LREC , Vol. 10. 2200 -- 2204 . Stefano Baccianella, Andrea Esuli, and Fabrizio Sebastiani. 2010. SentiWordNet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining. In LREC, Vol. 10. 2200--2204.","journal-title":"LREC"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004286"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1857999.1858121"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Zhiyuan Chen Arjun Mukherjee and Bing Liu. 2014. Aspect extraction with automated prior knowledge learning. In ACL (1). 347--358.  Zhiyuan Chen Arjun Mukherjee and Bing Liu. 2014. Aspect extraction with automated prior knowledge learning. In ACL (1). 347--358.","DOI":"10.3115\/v1\/P14-1033"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78","author":"dos Santos Cicero","year":"2014","unstructured":"Cicero dos Santos and Maira Gatti . 2014 . Deep convolutional neural networks for sentiment analysis of short texts . In Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78 . Cicero dos Santos and Maira Gatti. 2014. Deep convolutional neural networks for sentiment analysis of short texts. In Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the Symposium on Affective Language in Human and Machine (AISB\u201908)","author":"Fahrni Angela","year":"2008","unstructured":"Angela Fahrni and Manfred Klenner . 2008 . Old wine or warm beer: Target-specific sentiment analysis of adjectives . In Proceedings of the Symposium on Affective Language in Human and Machine (AISB\u201908) . 60--63. Angela Fahrni and Manfred Klenner. 2008. Old wine or warm beer: Target-specific sentiment analysis of adjectives. In Proceedings of the Symposium on Affective Language in Human and Machine (AISB\u201908). 60--63."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0015-2"},{"key":"e_1_2_1_9_1","unstructured":"Geli Fei Arjun Mukherjee Bing Liu Meichun Hsu Malu Castellanos and Riddhiman Ghosh. 2013. Exploiting burstiness in reviews for review spammer detection. In ICWSM.  Geli Fei Arjun Mukherjee Bing Liu Meichun Hsu Malu Castellanos and Riddhiman Ghosh. 2013. Exploiting burstiness in reviews for review spammer detection. In ICWSM."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"key":"e_1_2_1_11_1","volume-title":"Distributional footprints of deceptive product reviews ICWSM 12","author":"Feng Song","year":"2012","unstructured":"Song Feng , Longfei Xing , Anupam Gogar , and Yejin Choi . 2012. Distributional footprints of deceptive product reviews ICWSM 12 ( 2012 ), 98--105. Song Feng, Longfei Xing, Anupam Gogar, and Yejin Choi. 2012. Distributional footprints of deceptive product reviews ICWSM 12 (2012), 98--105."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 6th International Joint Conference on Natural Language Processing. 338--346","author":"Feng Vanessa Wei","year":"2013","unstructured":"Vanessa Wei Feng and Graeme Hirst . 2013 . Detecting deceptive opinions with profile compatibility . In Proceedings of the 6th International Joint Conference on Natural Language Processing. 338--346 . Vanessa Wei Feng and Graeme Hirst. 2013. Detecting deceptive opinions with profile compatibility. In Proceedings of the 6th International Joint Conference on Natural Language Processing. 338--346."},{"key":"e_1_2_1_13_1","first-page":"1","article-title":"Beyond the stars: Improving rating predictions using review text content","volume":"9","author":"Ganu Gayatree","year":"2009","unstructured":"Gayatree Ganu , Noemie Elhadad , and Am\u00e9lie Marian . 2009 . Beyond the stars: Improving rating predictions using review text content . In WebDB , Vol. 9. 1 -- 6 . Gayatree Ganu, Noemie Elhadad, and Am\u00e9lie Marian. 2009. Beyond the stars: Improving rating predictions using review text content. In WebDB, Vol. 9. 1--6.","journal-title":"WebDB"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959148"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912257"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.26"},{"volume-title":"Mathematical Structures of Language","author":"Harris Zellig Sabbettai","key":"e_1_2_1_17_1","unstructured":"Zellig Sabbettai Harris . 1968. Mathematical Structures of Language . Krieger Publishing Company . Zellig Sabbettai Harris. 1968. Mathematical Structures of Language. Krieger Publishing Company."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014073"},{"key":"e_1_2_1_19_1","volume-title":"Why Yelp Has A Review Filter. Retrieved on","author":"Yelp Inc. 2009.","year":"2018","unstructured":"Yelp Inc. 2009. Why Yelp Has A Review Filter. Retrieved on May 4, 2018 from https:\/\/www.yelpblog.com\/2009\/10\/why-yelp-has-a-review-filter. Yelp Inc. 2009. Why Yelp Has A Review Filter. Retrieved on May 4, 2018 from https:\/\/www.yelpblog.com\/2009\/10\/why-yelp-has-a-review-filter."},{"key":"e_1_2_1_20_1","volume-title":"Yelp\u2019s Recommendation Software Explained. Retrieved on","author":"Yelp Inc. 2010.","year":"2018","unstructured":"Yelp Inc. 2010. Yelp\u2019s Recommendation Software Explained. Retrieved on May 4, 2018 from https:\/\/www.yelpblog.com\/2010\/03\/yelp-review-filter-explained. Yelp Inc. 2010. Yelp\u2019s Recommendation Software Explained. Retrieved on May 4, 2018 from https:\/\/www.yelpblog.com\/2010\/03\/yelp-review-filter-explained."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1609067.1609111"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935932"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2006.00277.x"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/S14-2076"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075150"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists","volume":"1","author":"Konishi Takuya","year":"2012","unstructured":"Takuya Konishi , Taro Tezuka , Fuminori Kimura , and Akira Maeda . 2012 . Estimating aspects in online reviews using topic model with 2-level learning . In Proceedings of the International MultiConference of Engineers and Computer Scientists , Vol. 1 . 120--126. Takuya Konishi, Taro Tezuka, Fuminori Kimura, and Akira Maeda. 2012. Estimating aspects in online reviews using topic model with 2-level learning. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol. 1. 120--126."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.037"},{"key":"e_1_2_1_31_1","unstructured":"Huayi Li Zhiyuan Chen Arjun Mukherjee Bing Liu and Jidong Shao. 2015. Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In ICWSM. 634--637.  Huayi Li Zhiyuan Chen Arjun Mukherjee Bing Liu and Jidong Shao. 2015. Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In ICWSM. 634--637."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.40"},{"key":"e_1_2_1_36_1","first-page":"1291","article-title":"Automated rule selection for aspect extraction in opinion mining","volume":"15","author":"Liu Qian","year":"2015","unstructured":"Qian Liu , Zhiqiang Gao , Bing Liu , and Yuanlin Zhang . 2015 . Automated rule selection for aspect extraction in opinion mining . In IJCAI , Vol. 15. 1291 -- 1297 . Qian Liu, Zhiqiang Gao, Bing Liu, and Yuanlin Zhang. 2015. Automated rule selection for aspect extraction in opinion mining. In IJCAI, Vol. 15. 1291--1297.","journal-title":"IJCAI"},{"key":"e_1_2_1_37_1","volume-title":"Doo Soon Kim, and Zhiqiang Gao","author":"Liu Qian","year":"2016","unstructured":"Qian Liu , Bing Liu , Yuanlin Zhang , Doo Soon Kim, and Zhiqiang Gao . 2016 . Improving opinion aspect extraction using semantic similarity and aspect associations. In AAAI. 2986--2992. Qian Liu, Bing Liu, Yuanlin Zhang, Doo Soon Kim, and Zhiqiang Gao. 2016. Improving opinion aspect extraction using semantic similarity and aspect associations. In AAAI. 2986--2992."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2304"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.110"},{"key":"e_1_2_1_41_1","volume-title":"Dependency Syntax: Theory and Practice","author":"Mel\u2019\u010duk Igor\u2019 Aleksandrovi\u010d","year":"1988","unstructured":"Igor\u2019 Aleksandrovi\u010d Mel\u2019\u010duk . 1988 . Dependency Syntax: Theory and Practice . SUNY Press . Igor\u2019 Aleksandrovi\u010d Mel\u2019\u010duk. 1988. Dependency Syntax: Theory and Practice. SUNY Press."},{"key":"e_1_2_1_42_1","first-page":"3781","article-title":"Efficient estimation of word representations in vector space","volume":"1301","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013 . Efficient estimation of word representations in vector space . Arxiv : 1301 . 3781 . Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. Arxiv:1301.3781.","journal-title":"Arxiv"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.05.027"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390524.2390572"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963240"},{"key":"e_1_2_1_48_1","volume-title":"Glance","author":"Mukherjee Arjun","year":"2013","unstructured":"Arjun Mukherjee , Vivek Venkataraman , Bing Liu , and Natalie S . Glance . 2013 . What Yelp fake review filter might be doing? In ICWSM. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S. Glance. 2013. What Yelp fake review filter might be doing? In ICWSM."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46227-1_13"},{"volume-title":"Be Wary of Awesome and Scathing Online Reviews. Retrieved on","year":"2018","key":"e_1_2_1_50_1","unstructured":"nbcnews. 2014. Be Wary of Awesome and Scathing Online Reviews. Retrieved on May 4, 2018 from https:\/\/www.nbcnews.com\/business\/consumer\/be-wary-awesome-scathing-online-reviews-n72116. nbcnews. 2014. Be Wary of Awesome and Scathing Online Reviews. Retrieved on May 4, 2018 from https:\/\/www.nbcnews.com\/business\/consumer\/be-wary-awesome-scathing-online-reviews-n72116."},{"volume-title":"Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 497--501","author":"Ott Myle","key":"e_1_2_1_51_1","unstructured":"Myle Ott , Claire Cardie , and Jeffrey T. Hancock . 2013. Negative deceptive opinion spam . In Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 497--501 . Myle Ott, Claire Cardie, and Jeffrey T. Hancock. 2013. Negative deceptive opinion spam. In Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 497--501."},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies -","volume":"1","author":"Ott Myle","unstructured":"Myle Ott , Yejin Choi , Claire Cardie , and Jeffrey T. Hancock . {n. d.}. Finding deceptive opinion spam by any stretch of the imagination . In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 . Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. {n. d.}. Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3115\/1218955.1218990"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.9.8.2065-2072"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/S14-2004"},{"volume-title":"Natural Language Processing and Text Mining","author":"Popescu Ana-Maria","key":"e_1_2_1_59_1","unstructured":"Ana-Maria Popescu and Orena Etzioni . 2007. Extracting product features and opinions from reviews . In Natural Language Processing and Text Mining . Springer , 9--28. Ana-Maria Popescu and Orena Etzioni. 2007. Extracting product features and opinions from reviews. In Natural Language Processing and Text Mining. Springer, 9--28."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.06.009"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-5905"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00034"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, 45--50","author":"\u0158eh\u016f\u0159ek Radim","year":"2010","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka . 2010 . Software framework for topic modelling with large corpora . In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, 45--50 . Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software framework for topic modelling with large corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, 45--50."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.01.005"},{"key":"e_1_2_1_66_1","first-page":"2","article-title":"Automatic opinion polarity classification of movie","volume":"17","author":"Salvetti Franco","year":"2004","unstructured":"Franco Salvetti , Stephen Lewis , and Christoph Reichenbach . 2004 . Automatic opinion polarity classification of movie . Colorado Research in Linguistics 17 , 1 (2004), 2 . Franco Salvetti, Stephen Lewis, and Christoph Reichenbach. 2004. Automatic opinion polarity classification of movie. Colorado Research in Linguistics 17, 1 (2004), 2.","journal-title":"Colorado Research in Linguistics"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767830"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631793"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367513"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020567"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2337542.2337546"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/3056270.3056280"},{"key":"e_1_2_1_74_1","volume-title":"Daniel Dahlmeier, and Xiaokui Xiao.","author":"Wang Wenya","year":"2017","unstructured":"Wenya Wang , Sinno Jialin Pan , Daniel Dahlmeier, and Xiaokui Xiao. 2017 . Coupled multi-layer attentions for co-extraction of aspect and opinion terms. In AAAI. 3316--3322. Wenya Wang, Sinno Jialin Pan, Daniel Dahlmeier, and Xiaokui Xiao. 2017. Coupled multi-layer attentions for co-extraction of aspect and opinion terms. In AAAI. 3316--3322."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli.08-012-R1-06-90"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/1699648.1699700"},{"volume-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201912)","author":"Xie Sihong","key":"e_1_2_1_77_1","unstructured":"Sihong Xie , Guan Wang , Shuyang Lin , and Philip S. Yu . 2012. Review spam detection via temporal pattern discovery . In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201912) . ACM, New York, 823--831. Sihong Xie, Guan Wang, Shuyang Lin, and Philip S. Yu. 2012. Review spam detection via temporal pattern discovery. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201912). ACM, New York, 823--831."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_27"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.02.002"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. 1884--1895","author":"You Zhenni","year":"2018","unstructured":"Zhenni You , Tieyun Qian , and Bing Liu . 2018 . An attribute enhanced domain adaptive model for cold-start spam review detection . In Proceedings of the 27th International Conference on Computational Linguistics. 1884--1895 . Zhenni You, Tieyun Qian, and Bing Liu. 2018. An attribute enhanced domain adaptive model for cold-start spam review detection. In Proceedings of the 27th International Conference on Computational Linguistics. 1884--1895."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.001"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3305258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3305258","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3305258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:09Z","timestamp":1750208289000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3305258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,20]]},"references-count":83,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,30]]}},"alternative-id":["10.1145\/3305258"],"URL":"https:\/\/doi.org\/10.1145\/3305258","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"type":"print","value":"1936-1955"},{"type":"electronic","value":"1936-1963"}],"subject":[],"published":{"date-parts":[[2019,6,20]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}