{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T00:37:05Z","timestamp":1724978225777},"reference-count":62,"publisher":"Vilnius University Press","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"abstract":"<jats:p\/>","DOI":"10.15388\/24-infor562","type":"journal-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T10:07:53Z","timestamp":1718618873000},"page":"483-507","source":"Crossref","is-referenced-by-count":0,"title":["Online Detection and Infographic Explanation of Spam Reviews with Data Drift Adaptation"],"prefix":"10.15388","author":[{"given":"Francisco","family":"de Arriba-P\u00e9rez","sequence":"first","affiliation":[]},{"given":"Silvia","family":"Garc\u00eda-M\u00e9ndez","sequence":"additional","affiliation":[]},{"given":"F\u00e1tima","family":"Leal","sequence":"additional","affiliation":[]},{"given":"Benedita","family":"Malheiro","sequence":"additional","affiliation":[]},{"given":"Juan C.","family":"Burguillo","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2024,6,17]]},"reference":[{"issue":"6","key":"2024082910113178468_j_infor562_ref_001","doi-asserted-by":"publisher","first-page":"33","DOI":"10.31449\/inf.v46i6.3991","article-title":"A review and comparative analysis of sentiment analysis techniques","volume":"46","year":"2022","journal-title":"Informatica"},{"issue":"1","key":"2024082910113178468_j_infor562_ref_002","doi-asserted-by":"publisher","first-page":"77","DOI":"10.31449\/inf.v43i1.2319","article-title":"An empirical study for detecting fake facebook profiles using supervised mining techniques","volume":"43","year":"2019","journal-title":"Informatica"},{"key":"2024082910113178468_j_infor562_ref_003","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.jss.2016.07.005","article-title":"A survey on feature drift adaptation: definition, benchmark, challenges and future directions","volume":"127","year":"2017","journal-title":"Journal of Systems and Software"},{"key":"2024082910113178468_j_infor562_ref_004","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3472538.3472547","volume-title":"Proceedings of the International Conference on the Foundations of Digital Games","year":"2021"},{"key":"2024082910113178468_j_infor562_ref_005","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.patcog.2018.10.024","article-title":"Evolving rule-based classifiers with genetic programming on GPUs for drifting data streams","volume":"87","year":"2019","journal-title":"Pattern Recognition"},{"issue":"8","key":"2024082910113178468_j_infor562_ref_006","doi-asserted-by":"publisher","first-page":"832","DOI":"10.3390\/electronics8080832","article-title":"Machine learning interpretability: a survey on methods and metrics","volume":"8","year":"2019","journal-title":"Electronics"},{"key":"2024082910113178468_j_infor562_ref_007","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s12243-022-00926-7","article-title":"Explainable artificial intelligence for cybersecurity: a literature survey","volume":"77","year":"2022","journal-title":"Annals of Telecommunications"},{"key":"2024082910113178468_j_infor562_ref_008","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.procs.2023.12.030","article-title":"Generative approach to aspect based sentiment analysis with GPT language models","volume":"229","year":"2023","journal-title":"Procedia Computer Science"},{"issue":"1","key":"2024082910113178468_j_infor562_ref_009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-015-0029-9","article-title":"Survey of review spam detection using machine learning techniques","volume":"2","year":"2015","journal-title":"Journal of Big Data"},{"key":"2024082910113178468_j_infor562_ref_010","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/978-981-19-1610-6_63","volume-title":"Proceedings of International Congress on Information and Communication Technology","volume":"448","year":"2023"},{"key":"2024082910113178468_j_infor562_ref_011","doi-asserted-by":"publisher","first-page":"23017","DOI":"10.1038\/s41598-021-02481-y","article-title":"Using explainable machine learning to characterise data drift and detect emergent health risks for emergency department admissions during COVID-19","volume":"11","year":"2021","journal-title":"Scientific Reports"},{"key":"2024082910113178468_j_infor562_ref_012","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.engappai.2019.06.008","article-title":"Set based particle swarm optimization for the feature selection problem","volume":"85","year":"2019","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"2024082910113178468_j_infor562_ref_013","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/ICTCK.2015.7582694","volume-title":"Proceedings of the International Congress on Technology, Communication and Knowledge","year":"2015"},{"key":"2024082910113178468_j_infor562_ref_014","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.inffus.2018.08.002","article-title":"An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks","volume":"48","year":"2019","journal-title":"Information Fusion"},{"issue":"3","key":"2024082910113178468_j_infor562_ref_015","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10994-012-5320-9","article-title":"On evaluating stream learning algorithms","volume":"90","year":"2013","journal-title":"Machine Learning"},{"issue":"4","key":"2024082910113178468_j_infor562_ref_016","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","article-title":"A survey on concept drift adaptation","volume":"46","year":"2014","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"2024082910113178468_j_infor562_ref_017","doi-asserted-by":"publisher","first-page":"116648","DOI":"10.1016\/j.eswa.2022.116648","article-title":"Detection of temporality at discourse level on financial news by combining Natural Language Processing and Machine Learning","volume":"197","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"2024082910113178468_j_infor562_ref_018","doi-asserted-by":"publisher","first-page":"102616","DOI":"10.1016\/j.simpat.2022.102616","article-title":"Simulation, modelling and classification of wiki contributors: Spotting the good, the bad, and the ugly","volume":"120","year":"2022","journal-title":"Simulation Modelling Practice and Theory"},{"key":"2024082910113178468_j_infor562_ref_019","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/Confluence51648.2021.9377042","volume-title":"Proceedings of the International Conference on Cloud Computing, Data Science & Engineering","year":"2021"},{"issue":"9\u201310","key":"2024082910113178468_j_infor562_ref_020","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s10994-017-5642-8","article-title":"Adaptive random forests for evolving data stream classification","volume":"106","year":"2017","journal-title":"Machine Learning"},{"issue":"6","key":"2024082910113178468_j_infor562_ref_021","doi-asserted-by":"publisher","first-page":"143","DOI":"10.31449\/inf.v46i6.4081","article-title":"Hybrid-MELAu: a hybrid mixing engineered linguistic features based on autoencoder for social bot detection","volume":"46","year":"2022","journal-title":"Informatica"},{"key":"2024082910113178468_j_infor562_ref_022","doi-asserted-by":"publisher","first-page":"6953","DOI":"10.1007\/s10489-022-03822-8","article-title":"Explainable knowledge integrated sequence model for detecting fake online reviews","volume":"53","year":"2022","journal-title":"Applied Intelligence"},{"key":"2024082910113178468_j_infor562_ref_023","doi-asserted-by":"publisher","first-page":"364","DOI":"10.3897\/jucs.66284","article-title":"Spam detection based on feature evolution to deal with concept drift","volume":"27","year":"2021","journal-title":"Journal of Universal Computer Science"},{"issue":"8","key":"2024082910113178468_j_infor562_ref_024","doi-asserted-by":"publisher","first-page":"81","DOI":"10.31449\/inf.v46i8.4336","article-title":"Indonesian hoax news classification with multilingual transformer model and BERTopic","volume":"46","year":"2022","journal-title":"Informatica"},{"key":"2024082910113178468_j_infor562_ref_025","doi-asserted-by":"publisher","first-page":"267","DOI":"10.31449\/inf.v45i2.3465","article-title":"Value-based retweet prediction on twitter","volume":"45","year":"2021","journal-title":"Informatica"},{"key":"2024082910113178468_j_infor562_ref_026","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-981-13-0408-8_20","volume-title":"Lecture Notes in Electrical Engineering","volume":"504","year":"2019"},{"key":"2024082910113178468_j_infor562_ref_027","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2018.03.015","article-title":"Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches","volume":"112","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"2024082910113178468_j_infor562_ref_028","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-030-72657-7_25","volume-title":"Advances in Intelligent Systems and Computing","volume":"1365 AIST","year":"2021"},{"key":"2024082910113178468_j_infor562_ref_029","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41747-020-0145-y","article-title":"Statistical significance: p value, 0.05 threshold, and applications to radiomics\u2014reasons for a conservative approach","volume":"4","year":"2020","journal-title":"Euro Radiology Experimental"},{"key":"2024082910113178468_j_infor562_ref_030","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2897845.2897928","volume-title":"Proceedings of the Asia Conference on Computer and Communications Security","year":"2016"},{"key":"2024082910113178468_j_infor562_ref_031","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/EMR.2019.2928964","article-title":"A method for the detection of fake reviews based on temporal features of reviews and comments","volume":"47","year":"2019","journal-title":"IEEE Engineering Management Review"},{"issue":"12","key":"2024082910113178468_j_infor562_ref_032","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TKDE.2018.2876857","article-title":"Learning under concept drift: a review","volume":"31","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2024082910113178468_j_infor562_ref_033","doi-asserted-by":"publisher","first-page":"5155","DOI":"10.1007\/s00521-020-05438-w","article-title":"Research on diversity and accuracy of the recommendation system based on multi-objective optimization","volume":"35","year":"2023","journal-title":"Neural Computing and Applications"},{"key":"2024082910113178468_j_infor562_ref_034","doi-asserted-by":"publisher","first-page":"15767","DOI":"10.1609\/aaai.v37i13.26872","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"37","year":"2023"},{"key":"2024082910113178468_j_infor562_ref_035","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","article-title":"Twitter spammer detection using data stream clustering","volume":"260","year":"2014","journal-title":"Information Sciences"},{"key":"2024082910113178468_j_infor562_ref_036","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114318","article-title":"Analysis of concept drift in fake reviews detection","volume":"169","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"2024082910113178468_j_infor562_ref_037","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/DICTA.2017.8227456","volume-title":"Proceedings of the International Conference on Digital Image Computing: Techniques and Applications","year":"2017"},{"key":"2024082910113178468_j_infor562_ref_038","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115742","article-title":"A review on social spam detection: challenges, open issues, and future directions","volume":"186","year":"2021","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"2024082910113178468_j_infor562_ref_039","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TCSS.2021.3085406","article-title":"Identifying groups of fake reviewers using a semisupervised approach","volume":"8","year":"2021","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"2024082910113178468_j_infor562_ref_040","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3292522.3326027","volume-title":"Proceedings of the ACM Conference on Web Science","year":"2019"},{"key":"2024082910113178468_j_infor562_ref_041","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7717\/peerj-cs.219","article-title":"The importance of behavioral data to identify online fake reviews for tourism businesses: a systematic review","volume":"5","year":"2019","journal-title":"PeerJ Computer Science"},{"key":"2024082910113178468_j_infor562_ref_042","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1145\/2939672.2939778","volume-title":"Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","year":"2016"},{"issue":"6","key":"2024082910113178468_j_infor562_ref_043","doi-asserted-by":"publisher","first-page":"2650","DOI":"10.17762\/turcomat.v12i6.5765","article-title":"Elimination and backward selection of features (P-value technique) in prediction of heart disease by using machine learning algorithms","volume":"12","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education"},{"key":"2024082910113178468_j_infor562_ref_044","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","article-title":"Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead","volume":"1","year":"2019","journal-title":"Nature Machine Intelligence"},{"issue":"2","key":"2024082910113178468_j_infor562_ref_045","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0245909","article-title":"A performance comparison of supervised machine learning models for Covid-19 tweets sentiment analysis","volume":"16","year":"2021","journal-title":"PLoS One"},{"issue":"5","key":"2024082910113178468_j_infor562_ref_046","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s10994-021-05968-x","article-title":"autoBOT: evolving neuro-symbolic representations for explainable low resource text classification","volume":"110","year":"2021","journal-title":"Machine Learning"},{"issue":"4","key":"2024082910113178468_j_infor562_ref_047","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1002\/2016WR019426","article-title":"Peaks Over Threshold (POT): a methodology for automatic threshold estimation using goodness of fit p-value","volume":"53","year":"2017","journal-title":"Water Resources Research"},{"key":"2024082910113178468_j_infor562_ref_048","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ins.2016.03.043","article-title":"Dynamic clustering forest: an ensemble framework to efficiently classify textual data stream with concept drift","volume":"357","year":"2016","journal-title":"Information Sciences"},{"key":"2024082910113178468_j_infor562_ref_049","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1007\/978-3-030-03991-2_65","volume-title":"Proceedings of the Australasian Joint Conference on Artificial Intelligence","volume":"11320","year":"2018"},{"key":"2024082910113178468_j_infor562_ref_050","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-030-77772-2_18","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","volume":"12797 LNAI","year":"2021"},{"issue":"4","key":"2024082910113178468_j_infor562_ref_051","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1080\/1206212X.2020.1751387","article-title":"Near real-time twitter spam detection with machine learning techniques","volume":"44","year":"2022","journal-title":"International Journal of Computers and Applications"},{"key":"2024082910113178468_j_infor562_ref_052","doi-asserted-by":"publisher","first-page":"118157","DOI":"10.1016\/j.eswa.2022.118157","article-title":"Word embedding dimensionality reduction using dynamic variance thresholding (DyVaT)","volume":"208","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"2024082910113178468_j_infor562_ref_053","doi-asserted-by":"publisher","first-page":"3291","DOI":"10.1109\/SMC52423.2021.9658757","volume-title":"Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics","year":"2021"},{"issue":"1","key":"2024082910113178468_j_infor562_ref_054","doi-asserted-by":"publisher","first-page":"143","DOI":"10.15388\/20-INFOR404","article-title":"Comparison of classification algorithms for detection of phishing websites","volume":"31","year":"2020","journal-title":"Informatica"},{"key":"2024082910113178468_j_infor562_ref_055","doi-asserted-by":"publisher","first-page":"100832","DOI":"10.1016\/j.elerap.2019.100832","article-title":"On-line guest profiling and hotel recommendation","volume":"34","year":"2019","journal-title":"Electronic Commerce Research"},{"key":"2024082910113178468_j_infor562_ref_056","doi-asserted-by":"publisher","first-page":"100957","DOI":"10.1016\/j.elerap.2020.100957","article-title":"A 2020 perspective on \u201cOnline guest profiling and hotel recommendation\u201d: reliability, scalability, traceability and transparency","volume":"40","year":"2020","journal-title":"Electronic Commerce Research and Applications"},{"issue":"5","key":"2024082910113178468_j_infor562_ref_057","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.4047","article-title":"Adaptive evaluation model of web spam based on link relation","volume":"32","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"2024082910113178468_j_infor562_ref_058","doi-asserted-by":"publisher","first-page":"108384","DOI":"10.1109\/ACCESS.2019.2932018","article-title":"Drifted twitter spam classification using multiscale detection test on K-L divergence","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"2024082910113178468_j_infor562_ref_059","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cose.2017.11.013","article-title":"Twitter spam detection: survey of new approaches and comparative study","volume":"76","year":"2018","journal-title":"Computers & Security"},{"key":"2024082910113178468_j_infor562_ref_060","doi-asserted-by":"publisher","first-page":"6198","DOI":"10.18653\/v1\/2023.emnlp-main.380","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","year":"2023"},{"issue":"3","key":"2024082910113178468_j_infor562_ref_061","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1108\/IntR-12-2016-0377","article-title":"Online reviews and impulse buying behavior: the role of browsing and impulsiveness","volume":"28","year":"2018","journal-title":"Internet Research"},{"key":"2024082910113178468_j_infor562_ref_062","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCR56254.2022.9995839","volume-title":"Proceedings of the International Conference on Cyber Resilience","year":"2022"}],"container-title":["Informatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1338\/text","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1338\/text","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T07:17:39Z","timestamp":1724915859000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/24-INFOR562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":62,"alternative-id":["10.15388\/24-INFOR562"],"URL":"https:\/\/doi.org\/10.15388\/24-infor562","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"type":"print","value":"0868-4952"},{"type":"electronic","value":"1822-8844"}],"subject":[],"published":{"date-parts":[[2024]]}}}