Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3308560.3316586acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System

Published: 13 May 2019 Publication History

Abstract

Online review system enables users to submit reviews about the products. However, the openness of Internet and monetary rewards for crowdsourcing tasks stimulate a large number of fraudulent users to write fake reviews and post advertisements to interfere the rank of apps. Existing methods for detecting spam reviews have been successful but they usually aims at e-commerce (e.g. Amazon, eBay) and recommendation (e.g. Yelp, Dianping) systems. Since the behaviors of fraudulent users are complexity and varying across different review platforms, existing methods are not suitable for fraudster detection in online app review system.
To shed light on this question, we are among the first to analyze the intentions of fraudulent users from different review platforms and categorize them by utilizing characteristics of contents (similarity, special symbols) and behaviors (timestamps, device, login status). With a comprehensive analysis of spamming activities and relationships between normal and malicious users, we design and present FdGars, the first graph convolutional network approach for fraudster detection in online app review system. Then we evaluate FdGars on real-world large-scale dataset (with 82,542 nodes and 42,433,134 edges) from Tencent App Store. The result demonstrates that F1-score of FdGars can achieve 0.938+, which outperforms several baselines and state-of-art fraudsters detecting methods. Moreover, we deploy FdGars on Tencent Beacon Anti-Fraud Platform to show its effectiveness and scalability. To the best of our knowledge, this is the first work to use graph convolutional networks for fraudster detection in the large-scale online app review system. It is worth to mention that FdGars can uncover malicious accounts even the data lack of labels in anti-spam tasks.

References

[1]
Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects.ICWSM 13(2013), 2–11.
[2]
Leman Akoglu, Hanghang Tong, and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery 29, 3 (2015), 626–688.
[3]
Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. (2016).
[4]
Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 855–864.
[5]
Bryan Hooi, Kijung Shin, Hyun Ah Song, Alex Beutel, Neil Shah, and Christos Faloutsos. 2017. Graph-based fraud detection in the face of camouflage. ACM Transactions on Knowledge Discovery from Data (TKDD) 11, 4(2017), 44.
[6]
Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. Fraudar: Bounding graph fraud in the face of camouflage. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 895–904.
[7]
Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu. 2013. Social Spammer Detection in Microblogging. In IJCAI, Vol. 13. 2633–2639.
[8]
Parisa Kaghazgaran, James Caverlee, and Anna Squicciarini. 2018. Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 306–314.
[9]
Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and VS Subrahmanian. 2018. Rev2: Fraudulent user prediction in rating platforms. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 333–341.
[10]
Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. arXiv preprint arXiv:1804.08559(2018).
[11]
Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee, and Jidong Shao. 2017. Bimodal distribution and co-bursting in review spam detection. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1063–1072.
[12]
Xiang Li, Wen Zhang, Jiuzhou Xi, and Hao Zhu. 2018. HGsuspector: Scalable Collective Fraud Detection in Heterogeneous Graphs. (2018).
[13]
Yuming Lin, Tao Zhu, Xiaoling Wang, Jingwei Zhang, and Aoying Zhou. 2014. Towards online review spam detection. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 341–342.
[14]
Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, and Le Song. 2018. Heterogeneous Graph Neural Networks for Malicious Account Detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management. ACM, 2077–2085.
[15]
Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S Glance. 2013. What yelp fake review filter might be doing?. In ICWSM. 409–418.
[16]
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 701–710.
[17]
Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining. ACM, 985–994.
[18]
Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1067–1077.
[19]
Guan Wang, Sihong Xie, Bing Liu, and S Yu Philip. 2011. Review graph based online store review spammer detection. In Data mining (icdm), 2011 ieee 11th international conference on. IEEE, 1242–1247.
[20]
Guan Wang, Sihong Xie, Bing Liu, and Philip S Yu. 2012. Identify online store review spammers via social review graph. ACM Transactions on Intelligent Systems and Technology (TIST) 3, 4(2012), 61.
[21]
Liang Wu, Xia Hu, Fred Morstatter, and Huan Liu. 2017. Detecting Camouflaged Content Polluters. In ICWSM. 696–699.
[22]
Fan Yang, Yang Liu, Xiaohui Yu, and Min Yang. 2012. Automatic detection of rumor on Sina Weibo. In Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. ACM, 13.
[23]
Wenchao Yu, Wei Cheng, Charu C Aggarwal, Kai Zhang, Haifeng Chen, and Wei Wang. 2018. Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2672–2681.

Cited By

View all
  • (2025)Rethinking Unsupervised Graph Anomaly Detection With Deep Learning: Residuals and ObjectivesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.350130737:2(881-895)Online publication date: Feb-2025
  • (2025)Temporal Insights for Group-Based Fraud Detection on e-Commerce PlatformsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.348512737:2(951-965)Online publication date: Feb-2025
  • (2025)An analysis of graph neural networks for fake review detection: A systematic literature reviewNeurocomputing10.1016/j.neucom.2025.129341(129341)Online publication date: Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '19: Companion Proceedings of The 2019 World Wide Web Conference
May 2019
1331 pages
ISBN:9781450366755
DOI:10.1145/3308560
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • IW3C2: International World Wide Web Conference Committee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fraud Detection
  2. Graph Convolutional Networks
  3. Online App Review System

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WWW '19
WWW '19: The Web Conference
May 13 - 17, 2019
San Francisco, USA

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)553
  • Downloads (Last 6 weeks)72
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Rethinking Unsupervised Graph Anomaly Detection With Deep Learning: Residuals and ObjectivesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.350130737:2(881-895)Online publication date: Feb-2025
  • (2025)Temporal Insights for Group-Based Fraud Detection on e-Commerce PlatformsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.348512737:2(951-965)Online publication date: Feb-2025
  • (2025)An analysis of graph neural networks for fake review detection: A systematic literature reviewNeurocomputing10.1016/j.neucom.2025.129341(129341)Online publication date: Jan-2025
  • (2025)Multiplex graph fusion network with reinforcement structure learning for fraud detection in online e-commerce platformsExpert Systems with Applications10.1016/j.eswa.2024.125598262(125598)Online publication date: Mar-2025
  • (2025)Graph neural network for fraud detection via context encoding and adaptive aggregationExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.125473261:COnline publication date: 1-Feb-2025
  • (2025)Identifying E-Commerce Fraud Through User Behavior Data: Observations and InsightsData Science and Engineering10.1007/s41019-024-00275-6Online publication date: 15-Jan-2025
  • (2024)Tickets or privacy? understand the ecosystem of chinese ticket grabbing appsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699186(5107-5124)Online publication date: 14-Aug-2024
  • (2024)Artificial Intelligence for detecting and preventing procurement fraudInternational Journal of Business Ecosystem & Strategy (2687-2293)10.36096/ijbes.v6i1.4776:1(63-73)Online publication date: 23-Mar-2024
  • (2024)Anomaly Detection Based on GCNs and DBSCAN in a Large-Scale GraphElectronics10.3390/electronics1313262513:13(2625)Online publication date: 4-Jul-2024
  • (2024)E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature ReviewBig Data Mining and Analytics10.26599/BDMA.2023.90200237:2(419-444)Online publication date: Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media