{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:16:24Z","timestamp":1769825784067,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF003"],"award-info":[{"award-number":["ZR2019MF003"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2020MF044"],"award-info":[{"award-number":["ZR2020MF044"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71772107"],"award-info":[{"award-number":["71772107"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072288"],"award-info":[{"award-number":["62072288"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products\u2019 reputations, forming a gray industry chain. To detect spammer groups in a heterogeneous network with rich semantic information from both buyers and sellers, researchers have conducted extensive research using Frequent Item Mining-based and graph-based methods. However, these methods cannot detect spammer groups with cross-product attacks and do not jointly consider structural and attribute features, and structure-attribute correlation, resulting in poorer detection performance. Therefore, we propose a collaborative training-based spammer group detection algorithm by constructing a heterogeneous induced sub-network based on the target product set to detect cross-product attack spammer groups. To jointly consider all available features, we use the collaborative training method to learn the feature representations of nodes. In addition, we use the DBSCAN clustering method to generate candidate groups, exclude innocent ones, and rank them to obtain spammer groups. The experimental results on real-world datasets indicate that the overall detection performance of the proposed method is better than that of the baseline methods.<\/jats:p>","DOI":"10.1186\/s42400-023-00159-8","type":"journal-article","created":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T03:09:00Z","timestamp":1696216140000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm"],"prefix":"10.1186","volume":"6","author":[{"given":"Qi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhixiang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Shujuan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Benyong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Dickson K. W.","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,2]]},"reference":[{"key":"159_CR1","doi-asserted-by":"crossref","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013) Opinion fraud detection in online reviews by network effects. In: Proceedings of the international AAAI conference on web and social media, vol 7, 1st edn. pp 2\u201311","DOI":"10.1609\/icwsm.v7i1.14380"},{"key":"159_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113465","volume":"156","author":"N Cao","year":"2020","unstructured":"Cao N, Ji S, Chiu DK, He M, Sun X (2020) A deceptive review detection framework: combination of coarse and fine-grained features. Expert Syst Appl 156:113465","journal-title":"Expert Syst Appl"},{"key":"159_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115977","volume":"187","author":"N Cao","year":"2022","unstructured":"Cao N, Ji S, Chiu DK, Gong M (2022) A deceptive reviews detection model: separated training of multi-feature learning and classification. Expert Syst Appl 187:115977","journal-title":"Expert Syst Appl"},{"key":"159_CR4","doi-asserted-by":"crossref","unstructured":"Chao J, Zhao C, Zhang F (2022) Network embedding-based approach for detecting collusive spamming groups on E-commerce platforms. In: Security and communication networks, pp 1\u201313","DOI":"10.1155\/2022\/4354086"},{"key":"159_CR5","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol 96, 34th edn. pp 226\u2013231"},{"key":"159_CR6","unstructured":"Glorot X, Bengio Y (2010). Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics. JMLR Workshop and Conference Proceedings, pp 249\u2013256"},{"key":"159_CR7","doi-asserted-by":"publisher","DOI":"10.27005\/d.cnki.gdzku.2021.000829","author":"Y Hu","year":"2021","unstructured":"Hu Y (2021) Unsupervised learning for spammer group detection based on network representation. Univ Electron Sci Technol China. https:\/\/doi.org\/10.27005\/d.cnki.gdzku.2021.000829","journal-title":"Univ Electron Sci Technol China"},{"key":"159_CR8","doi-asserted-by":"crossref","unstructured":"Huang W, Li Y, Fang Y, Fan J, Yang H (2020) BiANE: Bipartite attributed network embedding. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval. pp 149\u2013158","DOI":"10.1145\/3397271.3401068"},{"key":"159_CR9","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.ins.2020.05.084","volume":"536","author":"SJ Ji","year":"2020","unstructured":"Ji SJ, Zhang Q, Li J, Chiu DK, Xu S, Yi L, Gong M (2020) A burst-based unsupervised method for detecting review spammer groups. Inf Sci 536:454\u2013469","journal-title":"Inf Sci"},{"key":"159_CR10","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining. pp 219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"159_CR11","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"159_CR12","unstructured":"Li FH, Huang M, Yang Y, Zhu X (2011) Learning to identify review spam. In: Twenty-second international joint conference on artificial intelligence"},{"key":"159_CR13","doi-asserted-by":"crossref","unstructured":"Li H, Fei G, Wang S, Liu B, Shao W, Mukherjee A, Shao J (2017) Bimodal distribution and co-bursting in review spam detection. In: Proceedings of the 26th international conference on World Wide Web. pp 1063\u20131072","DOI":"10.1145\/3038912.3052582"},{"issue":"12","key":"159_CR14","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1109\/TKDE.2018.2876531","volume":"31","author":"S Liu","year":"2018","unstructured":"Liu S, Hooi B, Faloutsos C (2018) A contrast metric for fraud detection in rich graphs. IEEE Trans Knowl Data Eng 31(12):2235\u20132248","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"159_CR15","unstructured":"Luca M (2016) Reviews, reputation, and revenue: the case of Yelp. Com. (March 15, 2016). Harvard Business School NOM Unit Working Paper, (12-016)"},{"key":"159_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012). Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web. pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"159_CR17","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013) Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining. pp 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"159_CR18","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint arXiv:1107.4557"},{"key":"159_CR19","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015) Collective opinion spam detection: Bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"key":"159_CR20","doi-asserted-by":"crossref","unstructured":"Shehnepoor S, Togneri R, Liu W, Bennamoun M (2021) HIN-RNN: a graph representation learning neural network for fraudster group detection with no handcrafted features. In: IEEE transactions on neural networks and learning systems. pp 1\u201314","DOI":"10.1109\/TNNLS.2022.3212001"},{"key":"159_CR21","doi-asserted-by":"crossref","unstructured":"Shehnepoor S, Togneri R, Liu W, Bennamoun M (2022) Spatio-temporal graph representation learning for fraudster group detection. In: IEEE transactions on neural networks and learning systems. pp 1\u201315","DOI":"10.1109\/TNNLS.2022.3212001"},{"issue":"4","key":"159_CR22","first-page":"1","volume":"3","author":"G Wang","year":"2012","unstructured":"Wang G, Xie S, Liu B, Yu PS (2012) Identify online store review spammers via social review graph. ACM Trans Intell Syst Technol (TIST) 3(4):1\u201321","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"6","key":"159_CR23","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang Z, Hou T, Song D, Li Z, Kong T (2016) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861\u2013874","journal-title":"Comput J"},{"issue":"3","key":"159_CR24","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Zhao X, Xu X (2018) Graph-based review spammer group detection. Knowl Inf Syst 55(3):571\u2013597","journal-title":"Knowl Inf Syst"},{"issue":"10","key":"159_CR25","doi-asserted-by":"publisher","first-page":"3291","DOI":"10.1007\/s10489-020-01724-1","volume":"50","author":"J Wang","year":"2020","unstructured":"Wang J, Guo Y, Wen X, Wang Z, Li Z, Tang M (2020) Improving graph-based label propagation algorithm with group partition for fraud detection. Appl Intell 50(10):3291\u20133300","journal-title":"Appl Intell"},{"key":"159_CR26","doi-asserted-by":"crossref","unstructured":"Wang X, Liu N, Han H, Shi C (2021a) Self-supervised heterogeneous graph neural network with co-contrastive learning. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. pp 1726\u20131736","DOI":"10.1145\/3447548.3467415"},{"key":"159_CR27","doi-asserted-by":"crossref","unstructured":"Wang Y, Zhang J, Guo S, Yin H, Li C, Chen H (2021b) Decoupling representation learning and classification for GNN-based anomaly detection. In: Proceedings of the 44th international ACM SIGIR conference on research and development in information retrieval. pp 1239\u20131248","DOI":"10.1145\/3404835.3462944"},{"issue":"2","key":"159_CR28","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TBDATA.2022.3177455","volume":"9","author":"X Wang","year":"2022","unstructured":"Wang X, Bo D, Shi C, Fan S, Ye Y, Philip SY (2022) A survey on heterogeneous graph embedding: methods, techniques, applications and sources. IEEE Trans Big Data 9(2):415\u2013436","journal-title":"IEEE Trans Big Data"},{"key":"159_CR29","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J, Chang K, Long C (2013) Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM international conference on information & knowledge management. pp 979\u2013988","DOI":"10.1145\/2505515.2505700"},{"key":"159_CR30","unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv preprint arXiv:1810.00826"},{"key":"159_CR31","doi-asserted-by":"crossref","unstructured":"Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. In: Machine learning and knowledge discovery in databases: European conference, ECML PKDD 2015, Porto, Portugal, September 7\u201311, 2015, Proceedings, Part I 15. pp 267\u2013282","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"159_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105520","volume":"193","author":"F Zhang","year":"2020","unstructured":"Zhang F, Hao X, Chao J, Yuan S (2020a) Label propagation-based approach for detecting review spammer groups on e-commerce websites. Knowl-Based Syst 193:105520","journal-title":"Knowl-Based Syst"},{"issue":"05","key":"159_CR33","first-page":"926","volume":"43","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Li Y, Gu X, Ji S (2021) A group spam detection algorithm combining behavior and structural feature reasoning. Comput Eng Sci 43(05):926\u2013935","journal-title":"Comput Eng Sci"},{"issue":"05","key":"159_CR34","first-page":"1374","volume":"39","author":"Q Zhang","year":"2022","unstructured":"Zhang Q, Ji S, Zhang W et al (2022a) Group spam detection algorithm considering structure and behavior characteristics. Appl Res Comput 39(05):1374\u20131379","journal-title":"Appl Res Comput"},{"key":"159_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117482","volume":"203","author":"F Zhang","year":"2022","unstructured":"Zhang F, Yuan S, Wu J, Zhang P, Chao J (2022b) Detecting collusive spammers on e-commerce websites based on reinforcement learning and adversarial autoencoder. Expert Syst Appl 203:117482","journal-title":"Expert Syst Appl"},{"key":"159_CR36","doi-asserted-by":"crossref","unstructured":"Zhang S, Yin H, Chen T, Hung QVN, Huang Z, Cui L (2020b) GCN-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval. pp 689\u2013698","DOI":"10.1145\/3397271.3401165"},{"key":"159_CR37","doi-asserted-by":"crossref","unstructured":"Zheng M, Zhou C, Wu J, Pan S, Shi J, Guo L (2018) FraudNE: a joint embedding approach for fraud detection. In: 2018 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2018.8489585"},{"issue":"1","key":"159_CR38","doi-asserted-by":"publisher","first-page":"317","DOI":"10.32604\/cmc.2019.05677","volume":"60","author":"C Zhu","year":"2019","unstructured":"Zhu C, Zhao W, Li Q, Li P, Da Q (2019) Network embedding-based anomalous density searching for multi-group collaborative fraudsters detection in social media. Comput Mater Continua 60(1):317\u2013333","journal-title":"Comput Mater Continua"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00159-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00159-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00159-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T03:10:08Z","timestamp":1696216208000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00159-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["159"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00159-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,2]]},"assertion":[{"value":"22 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"26"}}