<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462014000300005</article-id>
<article-id pub-id-type="doi">10.13053/CyS-18-3-2035</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Spotting Fake Reviews using Positive-Unlabeled Learning]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Huayi]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Bing]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[Arjun]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Shao]]></surname>
<given-names><![CDATA[Jidong]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,University of Illinois at Chicago Department of Computer Science ]]></institution>
<addr-line><![CDATA[Chicago Illinois]]></addr-line>
<country>Estados Unidos de América</country>
</aff>
<aff id="A02">
<institution><![CDATA[,University of Houston Department of Computer Science ]]></institution>
<addr-line><![CDATA[Houston Texas]]></addr-line>
<country>Estados Unidos de América</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Dianping Inc.  ]]></institution>
<addr-line><![CDATA[Shanghai ]]></addr-line>
<country>China</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2014</year>
</pub-date>
<volume>18</volume>
<numero>3</numero>
<fpage>467</fpage>
<lpage>475</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462014000300005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462014000300005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462014000300005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Fake review detection has been studied by researchers for several years. However, so far all reported studies are based on English reviews. This paper reports a study of detecting fake reviews in Chinese. Our review dataset is from the Chinese review hosting site Dianping, which has built a fake review detection system. They are confident that their algorithm has a very high precision, but they don't know the recall. This means that all fake reviews detected by the system are almost certainly fake but the remaining reviews may not be all genuine. This paper first reports a supervised learning study of two classes, fake and unknown. However, since the unknown set may contain many fake reviews, it is more appropriate to treat it as an unlabeled set. This calls for the model of learning from positive and unlabeled examples (or PU-learning). Experimental results show that PU learning not only outperforms supervised learning significantly, but also detects a large number of potentially fake reviews hidden in the unlabeled set that Dianping fails to detect.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Fake reviews]]></kwd>
<kwd lng="en"><![CDATA[Positive-Unlabeled learning]]></kwd>
<kwd lng="en"><![CDATA[PU-learning]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="justify"><font face="verdana" size="4">Art&iacute;culos regulares</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="4"><b>Spotting Fake Reviews using Positive&#45;Unlabeled Learning</b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Huayi Li<sup>1</sup>, Bing Liu<sup>1</sup>, Arjun Mukherjee<sup>2</sup>, and Jidong Shao<sup><sup>3</sup></sup></b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><sup><i>1</i></sup></sup> <i>Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA.</i> <a href="mailto:hli47@uic.edu">hli47@uic.edu</a>, <a href="mailto:liub@cs.uic.edu">liub@cs.uic.edu</a></font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup><sup>2</sup></sup> Department of Computer Science, University of Houston, Houston, TX, USA.</i></font> <font face="verdana" size="2"><a href="mailto:arjun@cs.uh.edu">arjun@cs.uh.edu</a></font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup><sup>3</sup></sup> Dianping Inc., Shanghai, China.</i><a href="mailto:arjun@cs.uh.edu"></a>, <a href="mailto:jidong.shao@dianping.com">jidong.shao@dianping.com</a>.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Article received on 22/08/2014.    <br> 	Accepted on 18/09/2014.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Fake review detection has been studied by researchers for several years. However, so far all reported studies are based on English reviews. This paper reports a study of detecting fake reviews in Chinese. Our review dataset is from the Chinese review hosting site Dianping, which has built a fake review detection system. They are confident that their algorithm has a very high precision, but they don't know the recall. This means that all fake reviews detected by the system are almost certainly fake but the remaining reviews may not be all genuine. This paper first reports a supervised learning study of two classes, fake and unknown. However, since the unknown set may contain many fake reviews, it is more appropriate to treat it as an unlabeled set. This calls for the model of learning from positive and unlabeled examples (or PU&#45;learning). Experimental results show that PU learning not only outperforms supervised learning significantly, but also detects a large number of potentially fake reviews hidden in the unlabeled set that Dianping fails to detect.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Fake reviews, Positive&#45;Unlabeled learning, PU&#45;learning.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v18n3/v18n3a5.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>  	    <p align="justify"><font face="verdana" size="2">The authors would like to thank the spam detection team in Dianping for sharing the Chinese review dataset. This research paper is made possible through the help and support from engineers and scientists in Dianping who provided valuable suggestions and indispensable efforts in evaluation.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>1. Akoglu, L., Chandy, R., &amp; Faloutsos, C.</b> (<b>2013</b>). Opinion fraud detection in online reviews by network effects. In <i>ICWSM</i>.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>2. Dempster</b>, A. P., Laird, N. M., &amp; Rubin, D. B. (<b>1977</b>). Maximum likelihood from incomplete data via the EM algorithm. <i>Journal of the royal statistical society, series B</i>, 39(1), 1&#150;38.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068578&pid=S1405-5546201400030000500001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>3. Denis, F.</b> (<b>1998</b>). PAC learning from positive statistical queries. In <i>ALT</i>. 112&#150;126.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>4. Elkan, C. &amp; Noto, K.</b> (<b>2008</b>). Learning classifiers from only positive and unlabeled data. In <i>KDD</i>. 213&#150;220.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>5. Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castel</b>lanos, M., &amp; Ghosh, R. (<b>2013</b>). Exploiting burstiness in reviews for review spammer detection. In <i>ICWSM</i>.</font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2"><b>6. Feng, S., Banerjee, R., &amp; Choi, Y.</b> (<b>2012</b>). Syntactic stylometry for deception detection. In <i>ACL (2)</i>. 171&#150;175.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068583&pid=S1405-5546201400030000500002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>7. Feng, S., Xing, L., Gogar, A., &amp; Choi, Y.</b> (<b>2012</b>). Distributional footprints of deceptive product reviews. In <i>ICWSM</i>.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>8. Hancock, J. T., Curry, L. E., Goorha, S., &amp; Wood&#45;worth, M.</b> (<b>2007</b>). On lying and being lied to: A linguistic analysis of deception in computer&#45;mediated communication. <i>Discourse Processes</i>, 45(1), 1&#150;23.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068586&pid=S1405-5546201400030000500003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>9. Hern&aacute;ndez, D., Guzm&aacute;n, R., M&oacute;ntes y Gomez, M.,</b> <b>&amp; Rosso, P.</b> (<b>2013</b>). Using PU&#45;learning to detect deceptive opinion spam. In <i>Proc. of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis</i>. Association for Computational Linguistics, Atlanta, Georgia, 38&#150;45.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068588&pid=S1405-5546201400030000500004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>10. Jindal, N. &amp; Liu, B</b>. (<b>2008</b>). Opinion spam and analysis. In <i>WSDM</i>. 219&#150;230.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>11. Jindal, N., Liu, B., &amp; Lim, E.&#45;P.</b> (<b>2010</b>). Finding unusual review patterns using unexpected rules. In <i>CIKM</i>. 1549&#150;1552.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>12. Joachims, T.</b> (<b>1999</b>). Making large scale SVM learning practical.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068592&pid=S1405-5546201400030000500005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>13. Lee, W. S. &amp; Liu, B.</b> (<b>2003</b>). Learning with positive and unlabeled examples using weighted logistic regression. In <i>ICML</i>, volume 3. 448&#150;455.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068594&pid=S1405-5546201400030000500006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>14. Li, F.</b>, Huang, M., Yang, Y., &amp; Zhu, X. (<b>2011</b>). Learning to identify review spam. In <i>Proc. of IJCAI International Joint Conference on Artificial Intelligence</i>, volume 22. 2488.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068596&pid=S1405-5546201400030000500007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>15. Li, J., Ott, M., &amp; Cardie, C</b>. (<b>2013</b>). Identifying manipulated offerings on review portals. In <i>EMNLP</i>. 1933&#150;1942.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>16. Lim, E.&#45;P., Nguyen, V.&#45;A., Jindal, N., Liu, B., &amp; Lauw, H. W.</b> (<b>2010</b>). Detecting product review spammers using rating behaviors. In <i>Proc. of the 19th ACM international conference on Information and knowledge management</i>. ACM, 939&#150;948.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068599&pid=S1405-5546201400030000500008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>17. Liu, B., Lee, W</b>. S., Yu, P. S., &amp; Li, X. (<b>2002</b>). Partially supervised classification of text documents. In <i>ICML</i>, volume 2. Citeseer, 387&#150;394.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068601&pid=S1405-5546201400030000500009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>18. Lowe, L.</b> (<b>2010</b>). <a href="http://officialblog.yelp.com/2010/03/yelp&#45;review&#45;filter&#45;explained.html" target="_blank">http://officialblog.yelp.com/2010/03/yelp&#45;review&#45;filter&#45;explained.html</a>.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>19. Mihalcea, R. &amp; Strapparava, C.</b> (<b>2009</b>). The lie detector: Explorations in the automatic recognition of deceptive language. In <i>Proceedings of the ACLIJCNLP 2009 Conference Short Papers</i>. Association for Computational Linguistics, 309&#150;312.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068604&pid=S1405-5546201400030000500010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>20. Mukherjee, A., Liu, B., &amp; Glance, N.</b> (<b>2012</b>). Spotting fake reviewer groups in consumer reviews. In <i>Proc. of the 21st international conference on World Wide Web</i>. ACM, 191&#150;200.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068606&pid=S1405-5546201400030000500011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <p align="justify"><font face="verdana" size="2"><b>21. Mukherjee</b>, A., Venkataraman, V., Liu, B., &amp; Glance, N. S. (<b>2013</b>). What yelp fake review filter might be doing? In <i>ICWSM</i>.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>22. Newman, M. L., Pennebaker, J. W., Berry, D. S., &amp; Richards, J. M.</b> (<b>2003</b>). Lying words: Predicting deception from linguistic styles. <i>Personality and social psychology bulletin</i>, 29(5), 665&#150;675.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068609&pid=S1405-5546201400030000500012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>23. Nigam, K., McCallum, A. K., Thrun, S., &amp; Mitchell,</b> <b>T.</b> (<b>2000</b>). Text classification from labeled and unlabeled documents using em. <i>Machine learning</i>, 39(2&#45;3), 103&#150;134.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068611&pid=S1405-5546201400030000500013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>24. Ott, M., Choi, Y., Cardie, C., &amp; Hancock, J</b>. T. (<b>2011</b>). Finding deceptive opinion spam by any stretch of the imagination. In <i>ACL</i>. 309&#150;319.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>25. Stoppelman, J.</b> (<b>2009</b>). <a href="http://officialblog.yelp.com/2009/10/why&#45;yelp&#45;has&#45;a&#45;review&#45;filter.html" target="_blank">http://officialblog.yelp.com/2009/10/why&#45;yelp&#45;has&#45;a&#45;review&#45;filter.html</a>.</font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>26. Wang, G., Xie, S., Liu, B., &amp; Yu, P. S.</b> (<b>2011</b>). Review graph based online store review spammer detection. In <i>IEEE 11th International Conference on Data Mining (ICDM)</i>. IEEE, 1242&#150;1247.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068615&pid=S1405-5546201400030000500014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>27. Wu, G., Greene, D., Smyth, B., &amp; Cunningham,</b> <b>P.</b> (<b>2010</b>). Distortion as a validation criterion in the identification of suspicious reviews. In <i>Proc. of the First Workshop on Social Media Analytics</i>. ACM, 10&#150;13.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068617&pid=S1405-5546201400030000500015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>28. Xie, S., Wang, G., Lin, S., &amp; Yu, P. S.</b> (<b>2012</b>). Review spam detection via temporal pattern discovery. In <i>Proc. of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining</i>. ACM, 823&#150;831.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068619&pid=S1405-5546201400030000500016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>29. Yu, H., Han, J., &amp; Chang, K. C.&#45;C.</b> (<b>2002</b>). PEBL: positive example based learning for web page classification using SVM. In <i>Proc. of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining</i>. ACM, 239&#150;248.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068621&pid=S1405-5546201400030000500017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2"><b>30. Zhou, L., Shi, Y., &amp; Zhang, D.</b> (<b>2008</b>). A statistical language modeling approach to online deception detection. <i>IEEE Transactions on Knowledge and Data Engineering</i>, 20(8), 1077&#150;1081.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2068623&pid=S1405-5546201400030000500018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dempster]]></surname>
<given-names><![CDATA[A. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Laird]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rubin]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Maximum likelihood from incomplete data via the EM algorithm]]></article-title>
<source><![CDATA[Journal of the royal statistical society, series B]]></source>
<year>1977</year>
<volume>39</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-38</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Syntactic stylometry for deception detection]]></article-title>
<source><![CDATA[ACL]]></source>
<year>2012</year>
<volume>(2)</volume>
<page-range>171-175</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[J. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Curry]]></surname>
<given-names><![CDATA[L. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Goorha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wood-worth]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On lying and being lied to: A linguistic analysis of deception in computer-mediated communication]]></article-title>
<source><![CDATA[Discourse Processes]]></source>
<year>2007</year>
<volume>45</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzmán]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Móntes y Gomez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosso]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Using PU-learning to detect deceptive opinion spam]]></article-title>
<source><![CDATA[]Proc. of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis]]></source>
<year>2013</year>
<page-range>38-45</page-range><publisher-loc><![CDATA[Atlanta^eGeorgia Georgia]]></publisher-loc>
<publisher-name><![CDATA[Association for Computational Linguistics]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Joachims]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Making large scale SVM learning practical]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B6">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Learning with positive and unlabeled examples using weighted logistic regression]]></article-title>
<source><![CDATA[ICML]]></source>
<year>2003</year>
<volume>3</volume>
<page-range>448-455</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Learning to identify review spam]]></article-title>
<source><![CDATA[Proc. of IJCAI International Joint Conference on Artificial Intelligence]]></source>
<year>2011</year>
<volume>22</volume>
<page-range>2488</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lim]]></surname>
<given-names><![CDATA[E.-P.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[V.-A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jindal]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lauw]]></surname>
<given-names><![CDATA[H. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Detecting product review spammers using rating behaviors]]></article-title>
<source><![CDATA[Proc. of the 19th ACM international conference on Information and knowledge management]]></source>
<year>2010</year>
<page-range>939-948</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[W. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[P. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Partially supervised classification of text documents]]></article-title>
<source><![CDATA[ICML]]></source>
<year>2002</year>
<volume>2</volume>
<page-range>387-394</page-range><publisher-name><![CDATA[Citeseer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mihalcea]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Strapparava]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The lie detector: Explorations in the automatic recognition of deceptive language]]></article-title>
<source><![CDATA[Proceedings of the ACLIJCNLP 2009 Conference Short Papers]]></source>
<year>2009</year>
<page-range>309-312</page-range><publisher-name><![CDATA[Association for Computational Linguistics]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Glance]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Spotting fake reviewer groups in consumer reviews]]></article-title>
<source><![CDATA[Proc. of the 21st international conference on World Wide Web]]></source>
<year>2012</year>
<page-range>191-200</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Newman]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pennebaker]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Berry]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Richards]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Lying words: Predicting deception from linguistic styles]]></article-title>
<source><![CDATA[Personality and social psychology bulletin]]></source>
<year>2003</year>
<volume>29</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>665-675</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nigam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[McCallum]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Thrun]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Text classification from labeled and unlabeled documents using em]]></article-title>
<source><![CDATA[Machine learning]]></source>
<year>2000</year>
<volume>39</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>103-134</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>26</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[P. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Review graph based online store review spammer detection]]></article-title>
<source><![CDATA[IEEE 11th International Conference on Data Mining (ICDM)]]></source>
<year>2011</year>
<page-range>1242-1247</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>27</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Greene]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Smyth]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Cunningham]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Distortion as a validation criterion in the identification of suspicious reviews]]></article-title>
<source><![CDATA[Proc. of the First Workshop on Social Media Analytics]]></source>
<year>2010</year>
<page-range>10-13</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[P. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Review spam detection via temporal pattern discovery]]></article-title>
<source><![CDATA[Proc. of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining]]></source>
<year>2012</year>
<page-range>823-831</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>29</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[K. C.-C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[PEBL: positive example based learning for web page classification using SVM]]></article-title>
<source><![CDATA[Proc. of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining]]></source>
<year>2002</year>
<page-range>239-248</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A statistical language modeling approach to online deception detection]]></article-title>
<source><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></source>
<year>2008</year>
<volume>20</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1077-1081</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
