A burst-based unsupervised method for detecting review spammer groups
暂无分享,去创建一个
Dickson K. W. Chiu | Maoguo Gong | Jinpeng Li | Lei Yi | Qi Zhang | Shaohua Xu | Shu-juan Ji | Maoguo Gong | Shu-juan Ji | Qi Zhang | Jinpeng Li | Shaohua Xu | Lei Yi
[1] Qi Zhang,et al. An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews , 2018, Expert Syst. Appl..
[2] Xin Fan,et al. PHG: A Three-Phase Algorithm for Influence Maximization Based on Community Structure , 2019, IEEE Access.
[3] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[4] Philip S. Yu,et al. Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[5] Dickson K. W. Chiu,et al. On the making of service recommendations: An action theory based on utility, reputation, and risk attitude , 2009, Expert Syst. Appl..
[6] Yongjian Yang,et al. Slanderous user detection with modified recurrent neural networks in recommender system , 2019, Inf. Sci..
[7] Yejin Choi,et al. Distributional Footprints of Deceptive Product Reviews , 2012, ICWSM.
[8] Weixiang Shao,et al. Bimodal Distribution and Co-Bursting in Review Spam Detection , 2017, WWW.
[9] Chien-Ming Chen,et al. A provably secure certificateless public key encryption with keyword search , 2019, Journal of the Chinese Institute of Engineers.
[10] Arjun Mukherjee,et al. What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.
[11] Ho-fung Leung,et al. A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks , 2017, Applied Intelligence.
[12] Dong-Hong Ji,et al. Neural networks for deceptive opinion spam detection: An empirical study , 2017, Inf. Sci..
[13] Minhong Wang,et al. Alert based disaster notification and resource allocation , 2010, Inf. Syst. Frontiers.
[14] Ting Yu,et al. Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis , 2017, J. Comput. Secur..
[15] Yining Liu,et al. A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.
[16] Leman Akoglu,et al. Discovering Opinion Spammer Groups by Network Footprints , 2015, ECML/PKDD.
[17] Chong Long,et al. Uncovering collusive spammers in Chinese review websites , 2013, CIKM.
[18] Xiaowei Xu,et al. Graph-based review spammer group detection , 2017, Knowledge and Information Systems.
[19] Ee-Peng Lim,et al. Finding unusual review patterns using unexpected rules , 2010, CIKM.
[20] Dickson K. W. Chiu,et al. Automated management of assets based on RFID triggered alarm messages , 2010, Inf. Syst. Frontiers.
[21] Dickson K. W. Chiu,et al. A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks , 2016, Knowl. Based Syst..
[22] Francesco Marcelloni,et al. A survey on fake news and rumour detection techniques , 2019, Inf. Sci..
[23] Zhuo Wang,et al. Detecting Review Spammer Groups via Bipartite Graph Projection , 2016, Comput. J..
[24] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[25] Chong-kwon Kim,et al. Follow spam detection based on cascaded social information , 2016, Inf. Sci..
[26] Shing-Chi Cheung,et al. Ubiquitous enterprise service adaptations based on contextual user behavior , 2007, Inf. Syst. Frontiers.
[27] Wei Yang,et al. Asymmetric response aggregation heuristics for rating prediction and recommendation , 2020, Applied Intelligence.
[28] Arjun Mukherjee,et al. Spotting fake reviewer groups in consumer reviews , 2012, WWW.
[29] Jia Wei,et al. Analysis of Influence Maximization in Temporal Social Networks , 2019, IEEE Access.
[30] Liang Yongquan,et al. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis , 2018 .
[31] David G. Stork,et al. Pattern Classification , 1973 .
[32] Leman Akoglu,et al. Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.
[33] M. Rosenblatt. Remarks on Some Nonparametric Estimates of a Density Function , 1956 .
[34] Jie Zhang,et al. Towards Collusive Fraud Detection in Online Reviews , 2015, 2015 IEEE International Conference on Data Mining.
[35] Ho-fung Leung,et al. An unsupervised strategy for defending against multifarious reputation attacks , 2019, Applied Intelligence.