[1]ALSPECTOR J.SVM-based filtering of E-mail spam with content-specific misclassification costs[C]//Proceedings of Workshop on Text Mining.Washington D.C.,USA:IEEE Press,2001:1-6.
[2]BECCHETTI L,CASTILLO C.Link-based characterization and detection of Web spam[C]//Proceedings of the 2nd International Workshop on Adversarial Information Retrieval on the Web.Washington D.C.,USA:IEEE Press,2006:1-8.
[3]JINDAL N,LIU B.Opinion spam and analysis[C]//Proceedings of International Conference on Web Search and Data Mining.New York,USA:ACM Press,2008:219-230.
[4]OTT M,CHOI Y,CARDIE C,et al.Finding deceptive opinion spam by any stretch of the imagination[C]//Proceedings of Meeting of the Association for Computational Linguistics:Human Language Technologies.Cambridge,USA:Association for Computational Linguistics,2011:309-319.
[5]宋海霞,严馨,余正涛,等.基于自适应聚类的虚假评论检测[J].南京大学学报(自然科学版),2013,49(4):433-438.
[6]CHANG T,PING Y H,MINGS C,et al.Detecting fake review with rumor model—case study in hotel review[C]//Proceedings of International Conference on Intelligent Science and Big Data Engineering.Berlin,Germany:Springer,2015:181-192.
[7]LI J,OTT M,CARDIE C,et al.Towards a general rule for identifying deceptive opinion spam[C]//Proceedings of Meeting of the Association for Computational Linguistics.Cambridge,USA:Association for Computational Linguistics,2014:1566-1576.
[8]DEWANG R K,SINGH A K.Identification of fake reviews using new set of lexical and syntactic features[C]//Proceedings of the 6th International Conference on Computer and Communication Technology.New York,USA:ACM Press,2015:115-119.
[9]LI H,LIU B,MUKHERJEE A,et al.Spotting fake reviews using positive-unlabeled learning[J].Computacion Y Sistemas,2014,18(3):467-475.
[10]GAO J,DONG Y W,SHANG M,et al.Group-based ranking method for online rating systems with spamming attacks[EB/OL].[2018-02-11].https://arxiv.org/abs/1501.00677.
[11]HUSNA H,PHITHAKKITNUKOON S,PALLA S,et al.Behavior analysis of spam botnets[C]//Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshops.Washington D.C.,USA:IEEE Press,2008:6-10.
[12]HAYATI P,CHAI K,POTDAR V,et al.Behaviour-based Web spambot detection by utilising action time and action frequency[C]//Proceedings of ICCSA’10.Berlin,Germany:Springer,2010:351-360.
[13]XIE S,WANG G,LIN S,et al.Review spam detection via time series pattern discovery[C]//Proceedings of the 21st International Conference Companion on World Wide Web.New York,USA:ACM Press,2012:635-636.
[14]柳萌萌,张书良,韩玉辉,等.多尺度数据挖掘方法[J].软件学报,2016,27(12):3030-3050.
[15]LAPPAS T.Fake reviews:the malicious perspective[C]//Proceedings of International Conference on Applications of Natural Language Processing and Information Systems.Berlin,Germany:Springer,2012:23-34.
[16]REN Y F,YIN L,JI D H.Deceptive reviews detection based on Language steucture and sentiment polrit[J].Journal of Frontiers of Computer Science and Technology,2014,8(3):313-320.
[17]BREIMAN L.Random forest[J].Machine Learning,2001,45(1):5-32.
[18]张希翔,赵欢.基于随机森林的语音人格预测方法[J].计算机工程,2017,43(6):253-258.
[19]周文谊,王吉源.一种模糊森林学习方法及其行人检测应用[J].计算机工程,2017,43(3):304-308.
[20]RODRIGUEZ A,LAIO A.Clustering by fast search and find of density peaks[J].Science,2014,344(6191):1492.
[21]刘曾超前,许光銮.基于密度峰值的轨迹聚类算法[J].国外电子测量技术,2017,36(4):59-65.
[22]邵珠峰,姬东鸿.基于情感特征和用户关系的虚假评论者的识别[J].计算机应用与软件,2016,33(5):158-161. |