{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:55:26Z","timestamp":1725900926012},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353857"},{"type":"electronic","value":"9783642353864"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35386-4_33","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T08:54:28Z","timestamp":1353920068000},"page":"448-461","source":"Crossref","is-referenced-by-count":4,"title":["Spam Fighting in Social Tagging Systems"],"prefix":"10.1007","author":[{"given":"Sasan","family":"Yazdani","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Ivanov","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"AnaLoui","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Berangi","sequence":"additional","affiliation":[]},{"given":"Touradj","family":"Ebrahimi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Xirong, L., Snoek, C., Worring, M.: Learning tag relevance by neighbor voting for social image retrieval. In: Proc. ACM MIR, pp. 180\u2013187 (2008)"},{"issue":"6","key":"33_CR2","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/s00778-010-0208-4","volume":"19","author":"D.K. Benz","year":"2010","unstructured":"Benz, D.K., Hotho, A., J\u00e4schke, R., Krause, B., Mitzlaff, F., Schmitz, C., Stumme, G.: The social bookmark and publication management system BibSonomy. VLDB Journal\u00a019(6), 849\u2013875 (2010)","journal-title":"VLDB Journal"},{"key":"33_CR3","unstructured":"Bogers, T., Van den Bosch, A.: Using Language Models for Spam Detection in Social Bookmarking. In: Proc. ECML\/PKDD Discovery Challenge, pp. 1\u201312 (2008)"},{"key":"33_CR4","unstructured":"Duda, R., Hart, P.: Pattern classification and scene analysis. Wiley (1973)"},{"issue":"6","key":"33_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P. Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing\u00a011(6), 36\u201345 (2007)","journal-title":"IEEE Internet Computing"},{"key":"33_CR6","unstructured":"Hotho, A., Benz, D., J\u00e4schke, R., Krause, B.: ECML PKDD Discovery Challenge (2008), \n \n http:\/\/www.kde.cs.uni-kassel.de\/ws\/rsdc08"},{"issue":"1","key":"33_CR7","first-page":"155","volume":"56","author":"I. Ivanov","year":"2012","unstructured":"Ivanov, I., Vajda, P., Jong-Seok, L., Goldmann, L., Ebrahimi, T.: Geotag propagation in social networks based on user trust model. MTAP\u00a056(1), 155\u2013177 (2012)","journal-title":"MTAP"},{"issue":"2","key":"33_CR8","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2011.942345","volume":"29","author":"I. Ivanov","year":"2012","unstructured":"Ivanov, I., Vajda, P., Jong-Seok, L., Ebrahimi, T.: In tags we trust: Trust modeling in social tagging of multimedia content. IEEE SPM\u00a029(2), 98\u2013107 (2012)","journal-title":"IEEE SPM"},{"key":"33_CR9","unstructured":"Liu, H., Setiono, R.: Chi2: Feature selection and discretization of numeric attributes. In: Proc. ICTAI, pp. 338\u2013391 (1995)"},{"key":"33_CR10","unstructured":"Rogers, I.: The Google PageRank algorithm and how it works (2002)"},{"key":"33_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-74976-9_52","volume-title":"Knowledge Discovery in Databases: PKDD 2007","author":"R. J\u00e4schke","year":"2007","unstructured":"J\u00e4schke, R., Marinho, L., Hotho, A., Schmidt-Thieme, L., Stumme, G.: Tag Recommendations in Folksonomies. In: Kok, J.N., Koronacki, J., Lopez de Mantaras, R., Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) PKDD 2007. LNCS (LNAI), vol.\u00a04702, pp. 506\u2013514. Springer, Heidelberg (2007)"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Koutrika, G., Effendi, F.A., Gy\u00f6ngyi, Z., Heymann, P., Garcia-Molina, H.: Combating spam in tagging systems. In: Proc. ACM AIRWeb, pp. 57\u201364 (2007)","DOI":"10.1145\/1244408.1244420"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Krause, B., Schmitz, C., Hotho, A., Stumme, G.: The anti-social tagger: Detecting spam in social bookmarking systems. In: Proc. ACM AIRWeb, pp. 61\u201368 (2008)","DOI":"10.1145\/1451983.1451998"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In: Proc. ACM AIRWeb, pp. 41\u201348 (2009)","DOI":"10.1145\/1531914.1531924"},{"issue":"2","key":"33_CR15","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"B.W. Matthews","year":"1975","unstructured":"Matthews, B.W.: Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et Biophysica Acta\u00a0405(2), 442\u2013451 (1975)","journal-title":"Biochimica et Biophysica Acta"},{"key":"33_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn Von","year":"2003","unstructured":"Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"issue":"5895","key":"33_CR17","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science\u00a0321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"key":"33_CR18","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann (2005), \n \n http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"33_CR19","unstructured":"Xu, Z., Fu, Y., Mao, J., Su, D.: Towards the semantic web: Collaborative tag suggestions. In: Proc. ACM WWW, pp. 1\u20138 (2006)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with TrustRank. In: Proc. VLDB, pp. 576\u2013587 (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35386-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:31:17Z","timestamp":1557534677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35386-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353857","9783642353864"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35386-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}