{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T22:28:33Z","timestamp":1762900113711,"version":"3.41.0"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T00:00:00Z","timestamp":1622678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772282"],"award-info":[{"award-number":["61772282"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2021,6,30]]},"abstract":"<jats:p>People\u2019s increasingly frequent online activity has generated a large number of reviews, whereas fake reviews can mislead users and harm their personal interests. In addition, it is not feasible to label reviews on a large scale because of the high cost of manual labeling. Therefore, to improve the detection performance by utilizing the unlabeled reviews, this article proposes a fake reviews detection model based on vertical ensemble tri-training and active learning (VETT-AL). The model combines the features of review text with the user behavior features as feature extraction. In the VETT-AL algorithm, the iterative process is divided into two parts: vertical integration within the group and horizontal integration among the groups. The intra-group integration is to integrate three original classifiers by using the previous iterative models of the classifiers. The inter-group integration is to adopt the active learning based on entropy to select the data with the highest confidence and label it, and as the result of that, the second generation classifiers are trained by the traditional process to improve the accuracy of the label. Experimental results show that the proposed model has a good classification performance.<\/jats:p>","DOI":"10.1145\/3450285","type":"journal-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T18:50:56Z","timestamp":1622746256000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Improved Fake Reviews Detection Model Based on Vertical Ensemble Tri-Training and Active Learning"],"prefix":"10.1145","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5764-2432","authenticated-orcid":false,"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China"}]},{"given":"Haoqi","family":"Cuan","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China"}]},{"given":"Yuhang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China"}]},{"given":"Zhichao","family":"Yin","sequence":"additional","affiliation":[{"name":"Nanjing Forestry University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2016.7746279"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 7th International AAAI Conference on Weblogs and Social Media.","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013 . Opinion fraud detection in online reviews by network effects . In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media. Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion fraud detection in online reviews by network effects. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.11.467"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0029-9"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.368"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788606"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.11.001"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.069"},{"volume-title":"Improved tri-training with unlabeled data. InSoftware Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing","author":"Guo Tao","key":"e_1_2_1_10_1","unstructured":"Tao Guo and Guiyang Li. 2012. Improved tri-training with unlabeled data. InSoftware Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing , Vol. 115 . Springer , 139\u2013147. Tao Guo and Guiyang Li. 2012. Improved tri-training with unlabeled data. InSoftware Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing, Vol. 115. Springer, 139\u2013147."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1187"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0029"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.029"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137114"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.014"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISKE.2017.8258755"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283696.2283811"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.080"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18032-8_14"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.06.028"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96133-0_15"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 7th International AAAI Conference on Weblogs and Social Media.","author":"Mukherjee Arjun","year":"2013","unstructured":"Arjun Mukherjee , Vivek Venkataraman , Bing Liu , and Natalie Glance . 2013 . What Yelp fake review filter might be doing? In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie Glance. 2013. What Yelp fake review filter might be doing? In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002512"},{"key":"e_1_2_1_27_1","first-page":"1","article-title":"Miniboosting decision trees","volume":"1998","author":"Quinlan J. Ross","year":"1998","unstructured":"J. Ross Quinlan . 1998 . Miniboosting decision trees . Journal of Artificial Intelligence Research 1998 (1998), 1 \u2013 15 . J. Ross Quinlan. 1998. Miniboosting decision trees. Journal of Artificial Intelligence Research 1998 (1998), 1\u201315.","journal-title":"Journal of Artificial Intelligence Research"},{"volume-title":"Proceedings of the 2017 3rd International Conference on Advances in Electrical, Electronics, Information, Communication, and Bio-Informatics (AEEICB \u201917)","author":"Rajamohana S. P.","key":"e_1_2_1_28_1","unstructured":"S. P. Rajamohana , K. Umamaheswari , and S. Vasantha Keerthana . 2017. An effective hybrid Cuckoo Search with Harmony search for review spam detection . In Proceedings of the 2017 3rd International Conference on Advances in Electrical, Electronics, Information, Communication, and Bio-Informatics (AEEICB \u201917) . IEEE, Los Alamitos, CA, 524\u2013527. S. P. Rajamohana, K. Umamaheswari, and S. Vasantha Keerthana. 2017. An effective hybrid Cuckoo Search with Harmony search for review spam detection. In Proceedings of the 2017 3rd International Conference on Advances in Electrical, Electronics, Information, Communication, and Bio-Informatics (AEEICB \u201917). IEEE, Los Alamitos, CA, 524\u2013527."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.01.015"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1055"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2655032"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.019"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2675361"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18590-9_38"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1083"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1034"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.20"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3382225.3382291"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. 1884\u20131895","author":"You Zhenni","year":"2018","unstructured":"Zhenni You , Tieyun Qian , and Bing Liu . 2018 . An attribute enhanced domain adaptive model for cold-start spam review detection . In Proceedings of the 27th International Conference on Computational Linguistics. 1884\u20131895 . Zhenni You, Tieyun Qian, and Bing Liu. 2018. An attribute enhanced domain adaptive model for cold-start spam review detection. In Proceedings of the 27th International Conference on Computational Linguistics. 1884\u20131895."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/info7010012"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42996-0_18"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.186"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:00Z","timestamp":1750193220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,3]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6,30]]}},"alternative-id":["10.1145\/3450285"],"URL":"https:\/\/doi.org\/10.1145\/3450285","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2021,6,3]]},"assertion":[{"value":"2020-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}