{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T03:59:32Z","timestamp":1772337572831,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["SaTC-181649"],"award-info":[{"award-number":["SaTC-181649"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3358034","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"981-990","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Wide-Ranging Review Manipulation Attacks"],"prefix":"10.1145","author":[{"given":"Parisa","family":"Kaghazgaran","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Majid","family":"Alfifi","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"James","family":"Caverlee","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Roee Aharoni and etal 2014. Automatic detection of machine translated text and translation quality estimation. In ACL .  Roee Aharoni and et al. 2014. Automatic detection of machine translated text and translation quality estimation. In ACL .","DOI":"10.3115\/v1\/P14-2048"},{"key":"e_1_3_2_1_2_1","unstructured":"Ebru Arisoy Tara N Sainath Brian Kingsbury and Bhuvana Ramabhadran. 2012. Deep neural network language models. In NAACL-HLT. ACL.  Ebru Arisoy Tara N Sainath Brian Kingsbury and Bhuvana Ramabhadran. 2012. Deep neural network language models. In NAACL-HLT. ACL."},{"key":"e_1_3_2_1_3_1","unstructured":"Stefano Baccianella Andrea Esuli and Fabrizio Sebastiani. 2010. Sentiwordnet 3.0: an enhanced lexical resource for sentiment analysis and opinion mining.. In Lrec .  Stefano Baccianella Andrea Esuli and Fabrizio Sebastiani. 2010. Sentiwordnet 3.0: an enhanced lexical resource for sentiment analysis and opinion mining.. In Lrec ."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Amir Fayazi and etal 2015. Uncovering crowdsourced manipulation of online reviews. In SIGIR .  Amir Fayazi and et al. 2015. Uncovering crowdsourced manipulation of online reviews. In SIGIR .","DOI":"10.1145\/2766462.2767742"},{"key":"e_1_3_2_1_5_1","volume-title":"Maskgan: Better text generation via filling in the _. ICLR","author":"Fedus William","year":"2018","unstructured":"William Fedus and 2018 . Maskgan: Better text generation via filling in the _. ICLR (2018). William Fedus and et al. 2018. Maskgan: Better text generation via filling in the _. ICLR (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Daniela Gerz and etal 2018. On the Relation between Linguistic Typology and (Limitations of) Multilingual Language Modeling. In EMNLP .  Daniela Gerz and et al. 2018. On the Relation between Linguistic Typology and (Limitations of) Multilingual Language Modeling. In EMNLP .","DOI":"10.18653\/v1\/D18-1029"},{"key":"e_1_3_2_1_7_1","volume-title":"International Journal of Computer Applications","author":"Gomaa Wael H","year":"2013","unstructured":"Wael H Gomaa and Aly A Fahmy . 2013. A survey of text similarity approaches . International Journal of Computer Applications ( 2013 ). Wael H Gomaa and Aly A Fahmy. 2013. A survey of text similarity approaches. International Journal of Computer Applications (2013)."},{"key":"e_1_3_2_1_8_1","unstructured":"Ian Goodfellow and etal 2014. Generative adversarial nets. In NIPS .  Ian Goodfellow and et al. 2014. Generative adversarial nets. In NIPS ."},{"key":"e_1_3_2_1_9_1","volume-title":"Generating sequences with recurrent neural networks. arXiv","author":"Graves Alex","year":"2013","unstructured":"Alex Graves . 2013. Generating sequences with recurrent neural networks. arXiv ( 2013 ). Alex Graves. 2013. Generating sequences with recurrent neural networks. arXiv (2013)."},{"key":"e_1_3_2_1_10_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation ( 1997 ). Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation (1997)."},{"key":"e_1_3_2_1_11_1","volume-title":"Birdnest: Bayesian inference for ratings-fraud detection. In ICDM .","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi and 2016 . Birdnest: Bayesian inference for ratings-fraud detection. In ICDM . Bryan Hooi and et al. 2016. Birdnest: Bayesian inference for ratings-fraud detection. In ICDM ."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Dirk Hovy. 2016. The enemy in your own camp: How well can we detect statistically-generated fake reviews--An adversarial study. In ACL .  Dirk Hovy. 2016. The enemy in your own camp: How well can we detect statistically-generated fake reviews--An adversarial study. In ACL .","DOI":"10.18653\/v1\/P16-2057"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jeremy Howard and Sebastian Ruder. 2018. Universal language model fine-tuning for text classification. In ACL .  Jeremy Howard and Sebastian Ruder. 2018. Universal language model fine-tuning for text classification. In ACL .","DOI":"10.18653\/v1\/P18-1031"},{"key":"e_1_3_2_1_14_1","unstructured":"Hakan Inan and etal 2016. Tying word vectors and word classifiers: A loss framework for language modeling. arXiv (2016).  Hakan Inan and et al. 2016. Tying word vectors and word classifiers: A loss framework for language modeling. arXiv (2016)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. In WSDM .  Nitin Jindal and Bing Liu. 2008. Opinion spam and analysis. In WSDM .","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Mika Juuti and etal 2018. Stay on-topic: Generating context-specific fake restaurant reviews. In ESORICS .  Mika Juuti and et al. 2018. Stay on-topic: Generating context-specific fake restaurant reviews. In ESORICS .","DOI":"10.1007\/978-3-319-99073-6_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Parisa Kaghazgaran and etal 2017. Behavioral analysis of review fraud: Linking malicious crowdsourcing to amazon and beyond. In ICWSM .  Parisa Kaghazgaran and et al. 2017. Behavioral analysis of review fraud: Linking malicious crowdsourcing to amazon and beyond. In ICWSM .","DOI":"10.1609\/icwsm.v11i1.14953"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Parisa Kaghazgaran and etal 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In WSDM .  Parisa Kaghazgaran and et al. 2018. Combating crowdsourced review manipulators: A neighborhood-based approach. In WSDM .","DOI":"10.1145\/3159652.3159726"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Parisa Kaghazgaran and etal 2019. TOmCAT: Target-Oriented Crowd Review ATtacks and Countermeasures. In ICWSM .  Parisa Kaghazgaran and et al. 2019. TOmCAT: Target-Oriented Crowd Review ATtacks and Countermeasures. In ICWSM .","DOI":"10.1609\/icwsm.v13i01.3231"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Anjuli Kannan and etal 2016. Smart reply: Automated response suggestion for email. In KDD .  Anjuli Kannan and et al. 2016. Smart reply: Automated response suggestion for email. In KDD .","DOI":"10.1145\/2939672.2939801"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Andrej Karpathy and Li Fei-Fei. 2015. Deep visual-semantic alignments for generating image descriptions. In CVPR .  Andrej Karpathy and Li Fei-Fei. 2015. Deep visual-semantic alignments for generating image descriptions. In CVPR .","DOI":"10.1109\/CVPR.2015.7298932"},{"key":"e_1_3_2_1_22_1","volume-title":"False information on web and social media: A survey. Social Media Analytics: Advances and Applications","author":"Kumar Srijan","year":"2018","unstructured":"Srijan Kumar and Neil Shah . 2018. False information on web and social media: A survey. Social Media Analytics: Advances and Applications ( 2018 ). Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. Social Media Analytics: Advances and Applications (2018)."},{"key":"e_1_3_2_1_23_1","unstructured":"Shanshan Li and etal 2017. Crowdsourced App Review Manipulation. In SIGIR .  Shanshan Li and et al. 2017. Crowdsourced App Review Manipulation. In SIGIR ."},{"key":"e_1_3_2_1_24_1","unstructured":"Zachary C Lipton and etal 2015. Capturing meaning in product reviews with character-level generative text models. arXiv (2015).  Zachary C Lipton and et al. 2015. Capturing meaning in product reviews with character-level generative text models. arXiv (2015)."},{"key":"e_1_3_2_1_25_1","volume-title":"Fake it till you make it: Reputation, competition, and Yelp review fraud. Management Science","author":"Luca Michael","year":"2016","unstructured":"Michael Luca and Georgios Zervas . 2016. Fake it till you make it: Reputation, competition, and Yelp review fraud. Management Science ( 2016 ). Michael Luca and Georgios Zervas. 2016. Fake it till you make it: Reputation, competition, and Yelp review fraud. Management Science (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Visualizing data using t-SNE. Journal of machine learning research","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008. Visualizing data using t-SNE. Journal of machine learning research ( 2008 ). Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research (2008)."},{"key":"e_1_3_2_1_27_1","volume-title":"Last Access: 01\/28\/2019.","author":"Makadia Mitul","year":"2018","unstructured":"Mitul Makadia . 2018. What Are the Advantage of Natural Language Generation and Its Impact on Business Intelligence?, https:\/\/www.marutitech.com\/advantages-of-natural-language-generation\/ , Last Access: 01\/28\/2019. ( 2018 ). Mitul Makadia. 2018. What Are the Advantage of Natural Language Generation and Its Impact on Business Intelligence?, https:\/\/www.marutitech.com\/advantages-of-natural-language-generation\/, Last Access: 01\/28\/2019. (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Julian McAuley and etal 2015. Image-based recommendations on styles and substitutes. In SIGIR .  Julian McAuley and et al. 2015. Image-based recommendations on styles and substitutes. In SIGIR .","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_2_1_29_1","unstructured":"G\u00e1bor Melis and etal 2017. On the state of the art of evaluation in neural language models. ICLR (2017).  G\u00e1bor Melis and et al. 2017. On the state of the art of evaluation in neural language models. ICLR (2017)."},{"key":"e_1_3_2_1_30_1","unstructured":"Stephen Merity and etal 2017. Regularizing and optimizing LSTM language models. arXiv (2017).  Stephen Merity and et al. 2017. Regularizing and optimizing LSTM language models. arXiv (2017)."},{"key":"e_1_3_2_1_31_1","unstructured":"Stephen Merity and etal 2018. An Analysis of Neural Language Modeling at Multiple Scales. arXiv (2018).  Stephen Merity and et al. 2018. An Analysis of Neural Language Modeling at Multiple Scales. arXiv (2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"Tom\u00e1vs Mikolov and etal [n.d.]. Empirical evaluation and combination of advanced language modeling techniques.  Tom\u00e1vs Mikolov and et al. [n.d.]. Empirical evaluation and combination of advanced language modeling techniques."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Tom\u00e1vs Mikolov and etal 2010. Recurrent neural network based language model. In ISCA .  Tom\u00e1vs Mikolov and et al. 2010. Recurrent neural network based language model. In ISCA .","DOI":"10.21437\/Interspeech.2010-343"},{"key":"e_1_3_2_1_34_1","unstructured":"Tomas Mikolov and etal 2013. Distributed representations of words and phrases and their compositionality. In NIPS .  Tomas Mikolov and et al. 2013. Distributed representations of words and phrases and their compositionality. In NIPS ."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Sewon Min and etal 2017. Question answering through transfer learning from large fine-grained supervision data. arXiv (2017).  Sewon Min and et al. 2017. Question answering through transfer learning from large fine-grained supervision data. arXiv (2017).","DOI":"10.18653\/v1\/P17-2081"},{"key":"e_1_3_2_1_36_1","unstructured":"Arjun Mukherjee and etal 2013. What yelp fake review filter might be doing?. In ICWSM .  Arjun Mukherjee and et al. 2013. What yelp fake review filter might be doing?. In ICWSM ."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Hoang-Quoc Nguyen-Son and etal 2017. Identifying computer-generated text using statistical analysis. In APSIPA ASC .  Hoang-Quoc Nguyen-Son and et al. 2017. Identifying computer-generated text using statistical analysis. In APSIPA ASC .","DOI":"10.1109\/APSIPA.2017.8282270"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Matthew Peters and etal 2017. Semi-supervised sequence tagging with bidirectional language models. arXiv (2017).  Matthew Peters and et al. 2017. Semi-supervised sequence tagging with bidirectional language models. arXiv (2017).","DOI":"10.18653\/v1\/P17-1161"},{"key":"e_1_3_2_1_39_1","volume-title":"Peters","author":"Matthew E","year":"2018","unstructured":"Matthew E et al. Peters . 2018 . Deep contextualized word representations. arXiv (2018). Matthew E et al. Peters. 2018. Deep contextualized word representations. arXiv (2018)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Jakub Piskorski and etal 2008. Exploring linguistic features for web spam detection: a preliminary study. In AIRWeb .  Jakub Piskorski and et al. 2008. Exploring linguistic features for web spam detection: a preliminary study. In AIRWeb .","DOI":"10.1145\/1451983.1451990"},{"key":"e_1_3_2_1_41_1","unstructured":"Alec Radford and etal 2017. Learning to generate reviews and discovering sentiment. arXiv (2017).  Alec Radford and et al. 2017. Learning to generate reviews and discovering sentiment. arXiv (2017)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In KDD .  Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In KDD .","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Ehud Reiter and etal 2005. Choosing words in computer-generated weather forecasts. Artificial Intelligence (2005).  Ehud Reiter and et al. 2005. Choosing words in computer-generated weather forecasts. Artificial Intelligence (2005).","DOI":"10.1016\/j.artint.2005.06.006"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Rico Sennrich and etal 2015. Improving neural machine translation models with monolingual data. ACL (2015).  Rico Sennrich and et al. 2015. Improving neural machine translation models with monolingual data. ACL (2015).","DOI":"10.18653\/v1\/P16-1009"},{"key":"e_1_3_2_1_45_1","unstructured":"Iulian Vlad Serban and etal 2015. Hierarchical neural network generative models for movie dialogues. CoRR abs\/1507.04808 (2015).  Iulian Vlad Serban and et al. 2015. Hierarchical neural network generative models for movie dialogues. CoRR abs\/1507.04808 (2015)."},{"key":"e_1_3_2_1_46_1","volume-title":"Neural responding machine for short-text conversation. arXiv","author":"Shang Lifeng","year":"2015","unstructured":"Lifeng Shang , Zhengdong Lu , and Hang Li. 2015. Neural responding machine for short-text conversation. arXiv ( 2015 ). Lifeng Shang, Zhengdong Lu, and Hang Li. 2015. Neural responding machine for short-text conversation. arXiv (2015)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018676"},{"key":"e_1_3_2_1_48_1","unstructured":"Ilya Sutskever and etal 2011. Generating text with recurrent neural networks. In ICML .  Ilya Sutskever and et al. 2011. Generating text with recurrent neural networks. In ICML ."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Gang Wang and etal 2012. Serf and turf: crowdturfing for fun and profit. In WWW .  Gang Wang and et al. 2012. Serf and turf: crowdturfing for fun and profit. In WWW .","DOI":"10.1145\/2187836.2187928"},{"key":"e_1_3_2_1_50_1","unstructured":"Anbang Xu and etal 2017. A new chatbot for customer service on social media. In CHI .  Anbang Xu and et al. 2017. A new chatbot for customer service on social media. In CHI ."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Arun Kumar Yadav and Samir Kumar Borgohain. 2014. Sentence generation from a bag of words using N-gram model. In ICACCCT .  Arun Kumar Yadav and Samir Kumar Borgohain. 2014. Sentence generation from a bag of words using N-gram model. In ICACCCT .","DOI":"10.1109\/ICACCCT.2014.7019414"},{"key":"e_1_3_2_1_52_1","unstructured":"Yuanshun Yao and etal 2017. Automated crowdturfing attacks and defenses in online review systems. In CCS .  Yuanshun Yao and et al. 2017. Automated crowdturfing attacks and defenses in online review systems. In CCS ."},{"key":"e_1_3_2_1_53_1","unstructured":"Jason Yosinski and etal 2014. How transferable are features in deep neural networks?. In Advances in neural information processing systems .  Jason Yosinski and et al. 2014. How transferable are features in deep neural networks?. In Advances in neural information processing systems ."}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","location":"Beijing China","acronym":"CIKM '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3358034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3358034","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3358034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:18Z","timestamp":1750203858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3358034"}},"subtitle":["Model, Empirical Study, and Countermeasures"],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":53,"alternative-id":["10.1145\/3357384.3358034","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3358034","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}