[1] |
AKOGLU L , CHANDY R , FALOUTSOS C . Opinion fraud detectionin online reviews by network effects[C]// The International AAAI Conference on Weblogs and Social Media. AAAI, 2013: 1-12.
|
[2] |
LACKERMAIR G , KAILER D , KANMAZ K . Importance of online product reviews from a consumer's perspective[J]. Advances in Economics and Business, 2013,1(1): 1-5.
|
[3] |
金立印 . 网络口碑信息对消费者购买决策的影响:一个实验研究[J]. 经济管理, 2007(22): 36-42.
|
|
JIN L Y . The impact of internet word-of-mouth information on consumers' purchase decisions:an experimental study[J]. Economic Management, 2007(22): 36-42.
|
[4] |
LUCA M , ZERVAS G . Fake it till you make it:reputation,competition,and yelp review fraud[J]. Management Science, 2016,62(12): 3412-3427.
|
[5] |
LIPSMAN A , . Online consumer-generated reviews have significant impact on offline purchase behavior[C]// Industry Analysis,comScore Inc. 2007: 2-8.
|
[6] |
JINDAL N , LIU B . Opinion spam and analysis[C]// International Conference on Web Search and Data Mining. ACM, 2008: 219-230.
|
[7] |
WANG G , WILSON C , ZHAO X ,et al. Serf and turf:crowdturfing for fun and profit[C]// The International Conference on World Wide Web. ACM, 2012: 679-688.
|
[8] |
LEE K , WEBB S , GE H . Characterizing and automatically detecting crowdturfing in Fiverr and Twitter[J]. Social Network Analysis and Mining, 2015,5(1): 1-6.
|
[9] |
孟美任, 丁晟春 . 虚假商品评论信息发布者行为动机分析[J]. 情报科学, 2013(10): 100-104.
|
|
MENG M R , DING S C . Analysis of behavioral motivation of publishers of false commodity commentary information[J]. Information Science, 2013(10): 100-104.
|
[10] |
YAO Y , VISWANATH B , CRYAN J ,et al. Automated crowdturfing attacks and defenses in online review systems[J]. ACM, 2017: 1143-1158.
|
[11] |
BARTOLI A , LORENZO A D , MEDVET E ,et al. "Best dinner ever!!!":automatic generation of restaurant reviews with LSTM-RNN[C]// IEEE/WIC/ACM International Conference on Web Intelligence. IEEE, 2017: 721-724.
|
[12] |
MIKOLOV T . Statistical language models based on neural networks[M]. Mountain View,Presentation at Google, 2012: 2-80.
|
[13] |
WEN T H , GASIC M , MRKSIC N ,et al. Semantically conditioned LSTM-based natural language generation for spoken dialogue systems[J]. Computer Science, 2015: 1711-1721.
|
[14] |
ZHANG Q , WANG D Y , VOELKER G M . DSpin:detecting automatically spun content on the web[C]// The Network and Distributed System Security Symposium. 2014: 1-11.
|
[15] |
杨钊, 陶大鹏, 张树业 ,等. 大数据下的基于深度神经网的相似汉字识别[J]. 通信学报, 2014,35(9): 184-189.
|
|
YANG Z , TAO D P , ZHANG S Y ,et al. Similarity of Chinese character recognition based on deep neural network under big data[J]. Journal on Communications, 2014,35(9): 184-189.
|
[16] |
张蕾, 章毅 . 大数据分析的无限深度神经网络方法[J]. 计算机研究与发展, 2016,53(1): 68-79.
|
|
ZHANG L , ZHANG Y . Infinite depth neural network method for big data analysis[J]. Journal of Computer Research and Development, 2016,53(1): 68-79.
|
[17] |
MURPHY K P . Machine learning:a probabilistic perspective[J]. MIT press, 2012,27(2): 62-63.
|
[18] |
TAI Y , HE H , ZHANG W Z ,et al. Automatic generation of review content in specific domain of social network based on RNN[C]// IEEE International Conference on Data Science in Cyberspace. IEEE, 2018: 601-608.
|
[19] |
AULI M , GALLEY M , QUIRK C ,et al. Joint language and translation modeling with recurrent neural networks[C]// The 2013 Conference on Empirical Methods in Natural Language Processing. 2013: 1044-1054.
|
[20] |
KANNAN A , . Smart reply:automated response suggestion for email[C]// The ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2016: 955-964.
|
[21] |
KARPATHY A , FEI-FEI L . Deep visual-semantic alignments for generating image descriptions[J]. IEEE Conference on Computer Vision and Pattern Recognition, 2015: 3128-3137.
|
[22] |
SERBAN IV , SORDONI A , BENGIO Y ,et al. Hierarchical neural network generative models for movie dialogues[J]. Cornell University,arXiv:1507,04808.
|
[23] |
SHANG L , LU Z , LI H . Neural responding machine for short-text conversation[C]// The Annual Meeting of the Association for Computational Linguistics and The International Joint Conference on Natural Language Processing,Association for Computational Linguistics. 2015(1): 1577-1586.
|
[24] |
SUN Y , LIN L , TANG D ,et al. Radical-enhanced Chinese character embedding[J]. Lecture Notes in Computer Science, 2014: 279-286.
|
[25] |
Graves A . Generating Sequences With Recurrent Neural Networks[J]. Cornell University,arXiv:1308,0850.
|
[26] |
LEBRET R , GRANGIER D , AULI M . Neural text generation from structured data with application to the biography domain[C]// The Conference on Empirical Methods in Natural Language Processing. 2016: 1203-1213.
|
[27] |
MIKOLOV T , SUTSKEVER I , CHEN K ,et al. Distributed representations of words and phrases and their compositionality[J]. Advances in Neural Information Processing Systems, 2013(26): 3111-3119.
|
[28] |
曾谁飞, 张笑燕, 杜晓峰 ,等. 基于神经网络的文本表示模型新方法[J]. 通信学报, 2017,38(4): 86-98.
|
|
ZENG S F , ZHANG X Y , DU X F ,et al. A new method of text representation model based on neural network[J]. Journal on Communications, 2017,38(4): 86-98.
|
[29] |
WANG X , LIU Y , CHENGJIE S U ,et al. Predicting polarities of tweets by composing word embeddings with long short-term memory[C]// The Annual Meeting of The Association for Computational Linguistics,The International Joint Conference on Natural Language Processing. 2015(1): 1343-1353.
|
[30] |
SUTSKEVER I , VINYALS O , LE Q V . Sequence to sequence learning with neural networks[J]. In Advances in Neural Information Processing Systems, 2014: 3104-3112.
|
[31] |
XU K , BA J , KIROS R ,et al. Show,attend and tell:neural imagecaption generation with visual attention[C]// International Conference on Machine Learning. 2015: 2048-2057.
|
[32] |
RUSH A M , CHOPRA S , WESTON J . A neural attention model for abstractive sentence summarization[C]// The Conference on Empirical Methods in Natural Language Processing. 2015: 379-389.
|
[33] |
CRAWFORD M , KHOSHGOFTAAR T M , PRUSA J D ,et al. Survey of review spam detection using machine learning techniques[J]. Journal of Big Data, 2015,2(1): 1-24.
|
[34] |
李璐旸, 秦兵, 刘挺 . 虚假评论检测研究综述[J]. 计算机学报, 2018,41(4): 946-968.
|
|
LI W , QIN B , LIU T . A review of false comment detection research[J]. Chinese Journal of Computers, 2018,41(4): 946-968.
|
[35] |
OTT M , CHOI Y , CARDIE C ,et al. Finding deceptive opinion spam by any stretch of the imagination[C]// The Annual Meeting of the Association for Computational Linguistics:Human Language Technologies,Association for Computational Linguistics. 2011(1): 309-319.
|
[36] |
LI J , OTT M , CARDIE C ,et al. Towards a general rule for identifying deceptive opinion spam[C]// The Annual Meeting of the Association for Computational Linguistics,Association for Computational Linguistics. 2014(1): 1566-1576.
|
[37] |
CHEN C , CHEN J , SHI C . Research on credit evaluation model of online store based on snow NLP[C]// In E3S Web of Conferences,EDP Sciences. 2018(3): 3-39.
|
[38] |
HUANG C L , CHUNG C K , HUI N ,et al. The development of the Chinese linguistic inquiry and word count dictionary[J]. Chinese Journal of Psychology, 2012,54(2): 185-201.
|
[39] |
GAO R , HAO B , LI H ,et al. Brain and health informatics:developing simplified Chinese psychological linguistic analysis dictionary for microblog[M]. Berlin: SpringerPress, 2013: 359-368.
|
[40] |
SCHLEIMER S , WILKERSON D S , AIKEN A . Winnowing:local algorithms for document fingerprinting[C]// The ACM SIGMOD International Conference on Management of Data. ACM, 2003: 76-85.
|