{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:09:22Z","timestamp":1760710162196,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Army Research Office","award":["W911NF-19-1-0438"],"award-info":[{"award-number":["W911NF-19-1-0438"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1453080"],"award-info":[{"award-number":["1453080"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375744","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"29-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["DeepTrust"],"prefix":"10.1145","author":[{"given":"Edoardo","family":"Serra","sequence":"first","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Anu","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Francesca","family":"Spezzano","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Anna","family":"Squicciarini","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8--11, 2013."},{"key":"e_1_3_2_1_2_1","unstructured":"Jan K Chorowski Dzmitry Bahdanau Dmitriy Serdyuk Kyunghyun Cho and Yoshua Bengio. 2015. Attention-based models for speech recognition. In Advances in neural information processing systems. 577--585."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767742"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013","author":"Fei Geli","year":"2013","unstructured":"Geli Fei, Arjun Mukherjee, Bing Liu, Meichun Hsu, Mal\u00fa Castellanos, and Riddhiman Ghosh. 2013. Exploiting Burstiness in Reviews for Review Spammer Detection. In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8--11, 2013 ."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593032"},{"key":"e_1_3_2_1_6_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation , Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_7_1","volume-title":"Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos.","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi, Neil Shah, Alex Beutel, Stephan G\u00fc nnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. In Proceedings of the 2016 SIAM International Conference on Data Mining, Miami, Florida, USA, May 5--7, 2016. 495--503."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159726"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_2_1_11_1","volume-title":"Edge Weight Prediction in Weighted Signed Networks. In IEEE 16th International Conference on Data Mining, ICDM 2016, December 12--15","author":"Kumar Srijan","year":"2016","unstructured":"Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian, and Christos Faloutsos. 2016. Edge Weight Prediction in Weighted Signed Networks. In IEEE 16th International Conference on Data Mining, ICDM 2016, December 12--15, 2016, Barcelona, Spain . 221--230."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013","author":"Mukherjee Arjun","year":"2013","unstructured":"Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S. Glance. 2013b. What Yelp Fake Review Filter Might Be Doing?. In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8--11, 2013 ."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"volume-title":"International semantic Web conference","author":"Richardson Matthew","key":"e_1_3_2_1_17_1","unstructured":"Matthew Richardson, Rakesh Agrawal, and Pedro Domingos. 2003. Trust management for the semantic web. In International semantic Web conference. Springer, 351--368."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_6"},{"key":"e_1_3_2_1_19_1","first-page":"4","article-title":"2012. Identify Online Store Review Spammers via Social Review Graph","volume":"3","author":"Wang Guan","year":"2012","unstructured":"Guan Wang, Sihong Xie, Bing Liu, and Philip S. Yu. 2012. Identify Online Store Review Spammers via Social Review Graph. ACM TIST , Vol. 3, 4 (2012), 61:1--61:21.","journal-title":"ACM TIST"},{"key":"e_1_3_2_1_20_1","volume-title":"Applied Artificial Intelligence","volume":"14","author":"Zacharia Giorgos","year":"2000","unstructured":"Giorgos Zacharia and Pattie Maes. 2000. Trust management through reputation mechanisms. Applied Artificial Intelligence , Vol. 14, 9 (2000), 881--907."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3374664.3375744","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375744","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375744"}},"subtitle":["An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":20,"alternative-id":["10.1145\/3374664.3375744","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375744","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}