{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:21:05Z","timestamp":1725733265402},"reference-count":26,"publisher":"Elsevier BV","issue":"22","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP120200128"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1016\/j.eswa.2015.07.019","type":"journal-article","created":{"date-parts":[[2015,7,21]],"date-time":"2015-07-21T22:49:02Z","timestamp":1437518942000},"page":"8650-8657","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":76,"title":["Detection of opinion spam based on anomalous rating deviation"],"prefix":"10.1016","volume":"42","author":[{"given":"David","family":"Savage","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5558-3790","authenticated-orcid":false,"given":"Xiuzhen","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8093-9787","authenticated-orcid":false,"given":"Xinghuo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Pauline","family":"Chou","sequence":"additional","affiliation":[]},{"given":"Qingmai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2015.07.019_bib0001","series-title":"Proceedings of the international AAAI conference on web-blogs and social media","article-title":"Opinion fraud detection in online reviews by network effects","author":"Akoglu","year":"2013"},{"issue":"2","key":"10.1016\/j.eswa.2015.07.019_bib0002","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s10618-009-0140-7","article-title":"RTG: A recursive realistic graph generator using random typing","volume":"19","author":"Akoglu","year":"2009","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"3","key":"10.1016\/j.eswa.2015.07.019_bib0003","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"10.1016\/j.eswa.2015.07.019_bib0004","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1509\/jmkr.43.3.345","article-title":"The effect of word of mouth on sales: Online book reviews","volume":"43","author":"Chevalier","year":"2006","journal-title":"Journal of marketing research"},{"key":"10.1016\/j.eswa.2015.07.019_bib0005","series-title":"Proceedings of the international conference on machine learning","first-page":"255","article-title":"Anomaly detection over noisy data using learned probability distributions","author":"Eskin","year":"2000"},{"key":"10.1016\/j.eswa.2015.07.019_bib0006","series-title":"Proceedings of the ICWSM","article-title":"Exploiting burstiness in reviews for review spammer detection","author":"Fei","year":"2013"},{"issue":"4","key":"10.1016\/j.eswa.2015.07.019_bib0007","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.ipm.2014.11.001","article-title":"Detecting positive and negative deceptive opinions using PU-learning","volume":"51","author":"Fusilier","year":"2014","journal-title":"Information Processing & Management"},{"issue":"7","key":"10.1016\/j.eswa.2015.07.019_bib0008","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","article-title":"Detection of review spam: A survey","volume":"42","author":"Heydari","year":"2015","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2015.07.019_bib0009","series-title":"Proceedings of ACM conference on web search and data mining","first-page":"219","article-title":"Opinion spam and analysis","author":"Jindal","year":"2008"},{"key":"10.1016\/j.eswa.2015.07.019_bib0010","series-title":"Proceedings of conference on dependable networks and services","first-page":"74","article-title":"SPRT for SPIT: Using the sequential probability ratio test for spam in VoIP prevention","author":"Jung","year":"2012"},{"key":"10.1016\/j.eswa.2015.07.019_bib0011","series-title":"Proceedings of IEEE conference on computer vision and pattern recognition","first-page":"1446","article-title":"Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models","author":"Kratz","year":"2009"},{"key":"10.1016\/j.eswa.2015.07.019_bib0012","series-title":"Proceedings of ACM conference on computer and communications security","first-page":"251","article-title":"Anomaly detection of web-based attacks","author":"Kruegel","year":"2003"},{"issue":"11","key":"10.1016\/j.eswa.2015.07.019_bib0013","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2667111","article-title":"Keeping online reviews honest","volume":"57","author":"Kugler","year":"2014","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/j.eswa.2015.07.019_bib0014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2070710.2070716","article-title":"Text mining and probabilistic language modeling for online review spam detecting","volume":"2","author":"Lau","year":"2011","journal-title":"ACM Transactions on Management Information Systems"},{"key":"10.1016\/j.eswa.2015.07.019_bib0015","series-title":"Proceedings of joint conference on artificial intelligence","first-page":"2488","article-title":"Learning to identify review spam","author":"Li","year":"2011"},{"key":"10.1016\/j.eswa.2015.07.019_bib0016","series-title":"Proceedings of the ACM International conference on information and knowledge management","first-page":"939","article-title":"Detecting product review spammers using rating behaviors","author":"Lim","year":"2010"},{"issue":"12","key":"10.1016\/j.eswa.2015.07.019_bib0017","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","article-title":"Novelty detection: a review. Part 1: Statistical approaches","volume":"83","author":"Markou","year":"2003","journal-title":"Signal Processing"},{"key":"10.1016\/j.eswa.2015.07.019_bib0018","series-title":"Proceedings of the ACM international conference on knowledge discovery and data mining","first-page":"632","article-title":"Spotting opinion spammers using behavioral footprints","author":"Mukherjee","year":"2013"},{"key":"10.1016\/j.eswa.2015.07.019_bib0019","series-title":"Proceedings of the ACM international conference on world wide web","first-page":"191","article-title":"Spotting fake reviewer groups in consumer reviews","author":"Mukherjee","year":"2012"},{"key":"10.1016\/j.eswa.2015.07.019_bib0020","series-title":"Proceedings of the annual meeting of the association for computational linguistics","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","author":"Ott","year":"2011"},{"issue":"4","key":"10.1016\/j.eswa.2015.07.019_bib0021","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ins.2005.07.006","article-title":"Modeling the concept of majority opinion in group decision making","volume":"176","author":"Pasi","year":"2006","journal-title":"Information Sciences"},{"issue":"10","key":"10.1016\/j.eswa.2015.07.019_bib0022","doi-asserted-by":"crossref","first-page":"6862","DOI":"10.1016\/j.eswa.2010.03.036","article-title":"Scoring products from reviews through application of fuzzy techniques","volume":"37","author":"Ramkumar","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2015.07.019_bib0023","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.knosys.2008.07.002","article-title":"Fuzzy aggregation and averaging for group decision making: A generalization and survey","volume":"22","author":"Van\u00ed\u010dek","year":"2009","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"10.1016\/j.eswa.2015.07.019_bib0024","first-page":"1","article-title":"Identify online store review spammers via social review graph","volume":"3","author":"Wang","year":"2012","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"10.1016\/j.eswa.2015.07.019_bib0025","series-title":"Proceedings of the workshop on social media analytics","first-page":"10","article-title":"Distortion as a validation criterion in the identification of suspicious reviews","author":"Wu","year":"2010"},{"key":"10.1016\/j.eswa.2015.07.019_bib0026","series-title":"Proceedings of the ACM international conference on knowledge discovery and data mining","first-page":"823","article-title":"Review spam detection via temporal pattern discovery","author":"Xie","year":"2012"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417415004790?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417415004790?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T15:25:55Z","timestamp":1537457155000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417415004790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":26,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["S0957417415004790"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2015.07.019","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Detection of opinion spam based on anomalous rating deviation","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2015.07.019","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}