{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:28:00Z","timestamp":1774456080712,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T00:00:00Z","timestamp":1743724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T00:00:00Z","timestamp":1743724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01130-9","type":"journal-article","created":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T03:07:21Z","timestamp":1743822441000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attention-based BiLSTM with positional embeddings for fake review detection"],"prefix":"10.1186","volume":"12","author":[{"given":"Jindong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhichao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,4]]},"reference":[{"issue":"4","key":"1130_CR1","first-page":"57","volume":"36","author":"S Xu","year":"2024","unstructured":"Xu S, Cuan H, Yin ZC, et al. A hybridized approach for enhanced fake review detection. IEEE Trans Comput Soc Syst. 2024;36(4):57\u201361.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1130_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116207","author":"W Ning","year":"2022","unstructured":"Ning W, Jun Y, Xuefeng K, et al. A fake review identification framework considering the suspicion degree of reviews with time burst characteristics. Expert Syst Appl. 2022. https:\/\/doi.org\/10.1016\/j.eswa.2021.116207.","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1130_CR3","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1080\/10864415.2023.2295067","volume":"28","author":"YC Pan","year":"2024","unstructured":"Pan YC, Xu L. Detecting fake online reviews: an unsupervised detection method with a novel performance evaluation. Int J Electron Commer. 2024;28(1):84\u2013107.","journal-title":"Int J Electron Commer"},{"issue":"2","key":"1130_CR4","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.3390\/jtaer19020075","volume":"19","author":"SA Ashraf","year":"2024","unstructured":"Ashraf SA, et al. Leveraging stacking framework for fake review detection in the hospitality sector. J Theor Appl Electron Commer Res. 2024;19(2):1517\u201358.","journal-title":"J Theor Appl Electron Commer Res"},{"key":"1130_CR5","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B. Review spam detection. In: Proceedings of the 16th international conference on World Wide Web. 2007. p. 1189\u201390.","DOI":"10.1145\/1242572.1242759"},{"issue":"16","key":"1130_CR6","doi-asserted-by":"crossref","first-page":"11357","DOI":"10.1007\/s00500-023-08507-z","volume":"27","author":"N Deshai","year":"2023","unstructured":"Deshai N, Rao BB. Unmasking deception: a CNN and adaptive PSO approach to detecting fake online reviews. Soft Comput. 2023;27(16):11357\u201378.","journal-title":"Soft Comput"},{"key":"1130_CR7","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B. Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining. 2008. p. 219\u201330.","DOI":"10.1145\/1341531.1341560"},{"key":"1130_CR8","unstructured":"Ott M, Choi Y, Cardie C, et al. Finding deceptive opinion spam by any stretch of the imagination. In: Association for Computational Linguistics, 2011 .p. 1566\u201376."},{"key":"1130_CR9","doi-asserted-by":"crossref","unstructured":"Zhang W, Zhang X, Chen J, et al. Stacking GA2M for inherently interpretable fraudulent reviewer identification by fusing target and non-target features. Int J Gen Syst. 2024: 1\u201336.","DOI":"10.1080\/03081079.2024.2384404"},{"key":"1130_CR10","doi-asserted-by":"crossref","first-page":"114435","DOI":"10.1109\/ACCESS.2024.3435497","volume":"12","author":"MQ Alnabhan","year":"2024","unstructured":"Alnabhan MQ, Branco P. Fake news detection using deep learning: a systematic literature review. IEEE Access. 2024;12:114435\u201359.","journal-title":"IEEE Access"},{"issue":"22","key":"1130_CR11","doi-asserted-by":"crossref","first-page":"20213","DOI":"10.1007\/s00521-022-07531-8","volume":"34","author":"G Bathla","year":"2022","unstructured":"Bathla G, Singh P, Singh RK, et al. Intelligent fake reviews detection based on aspect extraction and analysis using deep learning. Neural Comput Appl. 2022;34(22):20213\u201329.","journal-title":"Neural Comput Appl"},{"key":"1130_CR12","doi-asserted-by":"crossref","first-page":"114190","DOI":"10.1109\/ACCESS.2024.3445354","volume":"12","author":"M Zhang","year":"2024","unstructured":"Zhang M, Zhang YH, Zhang XJ. SGAN-SAM-ERNIE: a novel and effective detection scheme for Chinese fake reviews. IEEE Access. 2024;12:114190\u20137.","journal-title":"IEEE Access"},{"issue":"1","key":"1130_CR13","first-page":"601","volume":"12","author":"AM Elmogy","year":"2021","unstructured":"Elmogy AM, Tariq U, Mohammed A, et al. Fake reviews detection using supervised machine learning. Int J Adv Comput Sci Appl. 2021;12(1):601\u20136.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"2","key":"1130_CR14","first-page":"156","volume":"34","author":"N Cao","year":"2020","unstructured":"Cao N, Ji S, Chiu DKW, et al. A deceptive review detection framework: combination of coarse and fine-grained features. Expert Syst Appl. 2020;34(2):156\u201366.","journal-title":"Expert Syst Appl"},{"issue":"16","key":"1130_CR15","doi-asserted-by":"crossref","first-page":"7847","DOI":"10.1007\/s00500-022-06806-5","volume":"26","author":"N Alsharif","year":"2022","unstructured":"Alsharif N. Fake opinion detection in an e-commerce business based on a long-short memory algorithm. Soft Comput. 2022;26(16):7847\u201354.","journal-title":"Soft Comput"},{"issue":"2","key":"1130_CR16","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2024.101926","volume":"36","author":"N Qandos","year":"2024","unstructured":"Qandos N, Hamad G, Alharbi M, et al. Multiscale cascaded domain-based approach for Arabic fake reviews detection in e-commerce platforms. J King Saud Univ Comput Inf Sci. 2024;36(2): 101926.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1130_CR17","volume":"134","author":"DTT Thuy","year":"2024","unstructured":"Thuy DTT, Thuy LTM, Bach NC, et al. Designing a deep learning-based application for detecting fake online reviews. Eng Appl Artif Intell. 2024;134: 108708.","journal-title":"Eng Appl Artif Intell"},{"issue":"8","key":"1130_CR18","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory. Neural Comput. 1997;9(8):1735\u201380.","journal-title":"Neural Comput"},{"issue":"5\/6","key":"1130_CR19","first-page":"602","volume":"18","author":"G Alex","year":"2005","unstructured":"Alex G, J\u00fcrgen S. Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 2005;18(5\/6):602\u201310.","journal-title":"Neural Netw"},{"key":"1130_CR20","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.neucom.2020.01.006","volume":"387","author":"WJ Li","year":"2020","unstructured":"Li WJ, et al. Bidirectional LSTM with self-attention mechanism and multi-channel features for sentiment classification. Neurocomputing. 2020;387:63\u201377.","journal-title":"Neurocomputing"},{"key":"1130_CR21","doi-asserted-by":"crossref","unstructured":"Su X, Shen T, Zhan Z. English text classification based on BiLSTM and attention mechanism. In: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), 2023. p. 651\u2013654.","DOI":"10.1109\/ICIBA56860.2023.10165488"},{"key":"1130_CR22","doi-asserted-by":"crossref","first-page":"48436","DOI":"10.1109\/ACCESS.2024.3382832","volume":"12","author":"W Jian","year":"2024","unstructured":"Jian W, Li JP, Akbar A, et al. SA-BiLSTM: self attention with bi-directional LSTM based intelligent model for accurate fake news detection to ensured information integrity on social media platforms. IEEE Access. 2024;12:48436\u201352.","journal-title":"IEEE Access"},{"key":"1130_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118111","author":"W Haizhou","year":"2022","unstructured":"Haizhou W, Sen W, YuHu H. Detecting fake news on Chinese social media based on hybrid feature fusion method. Expert Syst Appl. 2022. https:\/\/doi.org\/10.1016\/j.eswa.2022.118111.","journal-title":"Expert Syst Appl"},{"key":"1130_CR24","unstructured":"Jonas G, Michael A, David G, et al. Convolutional sequence to sequence learning. In: Proceedings of the 34th International Conference on Machine Learning. 2017;70:1243\u201352."},{"key":"1130_CR25","unstructured":"Devlin J, Chang M W, Lee K, et al. BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2019;1:4171\u201386."},{"key":"1130_CR26","doi-asserted-by":"crossref","unstructured":"Zhuang L, Wayne L, Ya S, et al. A robustly optimized BERT pre-training approach with post-training. In: Chinese computational linguistics: 20th China National Conference, Hohhot, China. 2021. p. 471\u2013484.","DOI":"10.1007\/978-3-030-84186-7_31"},{"key":"1130_CR27","unstructured":"Wang Y L, Zhang Y S, Zhu S W. Headline generation model with positional embedding for knowledge reasoning. J Comput Appl. 2024;1\u201311"},{"key":"1130_CR28","doi-asserted-by":"crossref","unstructured":"Shaw P, Uszkoreit J, Vaswani A. Self-attention with relative position representations. In: Proceedings of NAACL-HLT. New Orleans, USA. 2018. p. 464\u2013468.","DOI":"10.18653\/v1\/N18-2074"},{"key":"1130_CR29","volume":"568","author":"J Su","year":"2024","unstructured":"Su J, Lu Y, Pan S, et al. Roformer: enhanced transformer with rotary position embedding. Neurocomputing. 2024;568: 127603.","journal-title":"Neurocomputing"},{"key":"1130_CR30","unstructured":"Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need. In: 31st Annual Conference on Neural Information Processing Systems (NIPS). 2017: 6000\u201310."},{"key":"1130_CR31","doi-asserted-by":"crossref","unstructured":"Yang Z, Yang D, Dyer C, et al. Hierarchical attention networks for document classification. In: Proceedings of the 2016 conference of the North American chapter of the association for computational linguistics: human language technologies. California, USA: NAACL. 2016; 1480\u201389.","DOI":"10.18653\/v1\/N16-1174"},{"key":"1130_CR32","unstructured":"Mikolov T, Chen K, Corrado G, et al. Efficient estimation of word representations in vector space. CoRR, 2013."},{"key":"1130_CR33","doi-asserted-by":"crossref","unstructured":"Xu M, Wong D F, Yang B, et al. Leveraging local and global patterns for self-attention networks. In: Proceedings of the 57th annual meeting of the association for computational linguistics, Florence, Italy: NAACL. 2019: 3069\u201375.","DOI":"10.18653\/v1\/P19-1295"},{"key":"1130_CR34","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Venkataraman V, Liu B, et al. What yelp fake review filter might be doing? In: Proceedings of the international AAAI conference on web and social media. 2013;7(1): 409\u201318.","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"1130_CR35","doi-asserted-by":"crossref","unstructured":"Prusa J, Khoshgoftaar T M, Seliya N. The effect of dataset size on training tweet sentiment classifiers. In: 2015 IEEE 14th international conference on machine learning and applications (ICMLA). IEEE. 2015: 96\u2013102.","DOI":"10.1109\/ICMLA.2015.22"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01130-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01130-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01130-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T03:08:49Z","timestamp":1743822529000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01130-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,4]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1130"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01130-9","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,4]]},"assertion":[{"value":"13 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"83"}}