Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3397271.3401165acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article

GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection

Published: 25 July 2020 Publication History
  • Get Citation Alerts
  • Abstract

    In recent years, recommender system has become an indispensable function in all e-commerce platforms. The review rating data for a recommender system typically comes from open platforms, which may attract a group of malicious users to deliberately insert fake feedback in an attempt to bias the recommender system to their favour. The presence of such attacks may violate modeling assumptions that high-quality data is always available and these data truly reflect users' interests and preferences. Therefore, it is of great practical significance to construct a robust recommender system that is able to generate stable recommendations even in the presence of shilling attacks. In this paper, we propose GraphRfi - a GCN-based user representation learning framework to perform robust recommendation and fraudster detection in a unified way. In its end-to-end learning process, the probability of a user being identified as a fraudster in the fraudster detection component automatically determines the contribution of this user's rating data in the recommendation component; while the prediction error outputted in the recommendation component acts as an important feature in the fraudster detection component. Thus, these two components can mutually enhance each other. Extensive experiments have been conducted and the experimental results show the superiority of our GraphRfi in the two tasks - robust rating prediction and fraudster detection. Furthermore, the proposed GraphRfi is validated to be more robust to the various types of shilling attacks over the state-of-the-art recommender systems.

    Supplementary Material

    MP4 File (3397271.3401165.mp4)
    In this paper, we propose GraphRfi - a GCN-based user representation learning framework to perform robust recommendation and fraudster detection in a unified way. In its end-to-end learning process, the probability of a user being identified as a fraudster in the fraudster detection component automatically determines the contribution of this user's rating data in the recommendation component; while the prediction error outputted in the recommendation component acts as an important feature in the fraudster detection component. Thus, these two components can mutually enhance each other. Extensive experiments have been conducted and the experimental results show the superiority of our GraphRfi in the two tasks - robust rating prediction and fraudster detection. Furthermore, the proposed GraphRfi is validated to be more robust to the various types of shilling attacks over the state-of-the-art recommender systems.

    References

    [1]
    Charu C Aggarwal. 2016. Attack-resistant recommender systems. In Recommender Systems. 385--410.
    [2]
    Leman Akoglu, Hanghang Tong, and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery (2015), 626--688.
    [3]
    Rianne van den Berg, Thomas N Kipf, and Max Welling. 2017. Graph convolutional matrix completion. SIGKDD (2017).
    [4]
    Hongxu Chen, Hongzhi Yin, Tong Chen, Quoc Viet Hung Nguyen, Wen-Chih Peng, and Xue Li. 2019. Exploiting centrality information with graph convolutions for network representation learning. In ICDE. 590--601.
    [5]
    Hongxu Chen, Hongzhi Yin, Tong Chen, Weiqing Wang, Xue Li, and Xia Hu. 2020. Social Boosted Recommendation with Folded Bipartite Network Embedding. TKDE (2020).
    [6]
    Yu-Ren Chen and Hsin-Hsi Chen. 2015. Opinion spam detection in web forum: a real case study. In WWW. 173--183.
    [7]
    Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NIPS. 3844--3852.
    [8]
    Manqing Dong, Lina Yao, Xianzhi Wang, Boualem Benatallah, Chaoran Huang, and Xiaodong Ning. 2018. Opinion fraud detection via neural autoencoder decision forest. CORR (2018).
    [9]
    Wenqi Fan, Yao Ma, Qing Li, Yuan He, Eric Zhao, Jiliang Tang, and Dawei Yin. 2019. Graph Neural Networks for Social Recommendation. In WWW. 974--983.
    [10]
    Amir Fayazi, Kyumin Lee, James Caverlee, and Anna Squicciarini. 2015. Uncovering crowdsourced manipulation of online reviews. In SIGIR. 233--242.
    [11]
    Ihsan Gunes, Cihan Kaleli, Alper Bilge, and Huseyin Polat. 2014. Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. (2014), 767--799.
    [12]
    Huifeng Guo, Ruiming Tang, Yunming Ye, Zhenguo Li, and Xiuqiang He. 2017. DeepFM: a factorization-machine based neural network for CTR prediction. IJCAI (2017).
    [13]
    Xiangnan He, Kuan Deng, Xiang Wang, Yan Li, Yongdong Zhang, and Meng Wang. 2020. LightGCN: Simplifying and Powering Graph Convolution Network for Recommendation. SIGIR (2020).
    [14]
    Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182.
    [15]
    Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. Birdnest: Bayesian inference for ratings-fraud detection. In SIAM. 495--503.
    [16]
    Cheng-Kang Hsieh, Longqi Yang, Yin Cui, Tsung-Yi Lin, Serge Belongie, and Deborah Estrin. 2017. Collaborative metric learning. In WWW. 193--201.
    [17]
    Peter J Huber. 2004. Robust statistics .John Wiley & Sons.
    [18]
    Dietmar Jannach, Markus Zanker, Alexander Felfernig, and Gerhard Friedrich. 2011. Recommender systems, an introduction. (2011).
    [19]
    Meng Jiang, Peng Cui, and Christos Faloutsos. 2016. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems (2016), 31--39.
    [20]
    Peter Kontschieder, Madalina Fiterau, Antonio Criminisi, and Samuel Rota Bulo. 2015. Deep neural decision forests. In ICCV. 1467--1475.
    [21]
    Yehuda Koren and Robert Bell. 2015. Advances in Collaborative Filtering. In Recommender Systems Handbook. 77--118.
    [22]
    Yehuda Koren, Robert Bell, and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. Computer (2009).
    [23]
    Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and VS Subrahmanian. 2018. Rev2: Fraudulent user prediction in rating platforms. In WSDM. 333--341.
    [24]
    Chenliang Li, Cong Quan, Li Peng, Yunwei Qi, Yuming Deng, and Libing Wu. 2019. A Capsule Network for Recommendation and Explaining What You Like and Dislike. In SIGIR. 275--284.
    [25]
    Rong-Hua Li, Jeffery Xu Yu, Xin Huang, and Hong Cheng. 2012. Robust reputation-based ranking on bipartite rating networks. In SIAM. 612--623.
    [26]
    Wentao Li, Min Gao, Hua Li, Jun Zeng, Qingyu Xiong, and Sachio Hirokawa. 2016. Shilling attack detection in recommender systems via selecting patterns analysis. IEICE TRANSACTIONS (2016).
    [27]
    Julian John McAuley and Jure Leskovec. 2013. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In WWW. 897--908.
    [28]
    Bhaskar Mehta. 2007. Unsupervised shilling detection for collaborative filtering. In AAAI. 1402--1407.
    [29]
    Bhaskar Mehta, Thomas Hofmann, and Wolfgang Nejdl. 2007. Robust collaborative filtering. In RecSys. 49--56.
    [30]
    Bhaskar Mehta and Wolfgang Nejdl. 2009. Unsupervised strategies for shilling detection and robust collaborative filtering. UMUAI (2009).
    [31]
    Amanda J Minnich, Nikan Chavoshi, Abdullah Mueen, Shuang Luan, and Michalis Faloutsos. 2015. Trueview: Harnessing the power of multiple review sites. In WWW. 787--797.
    [32]
    Abhinav Mishra and Arnab Bhattacharya. 2011. Finding the bias and prestige of nodes in networks based on trust scores. In WWW. 567--576.
    [33]
    Andriy Mnih and Ruslan R Salakhutdinov. 2008. Probabilistic matrix factorization. In NIPS.
    [34]
    Arjun Mukherjee, Abhinav Kumar, Bing Liu, Junhui Wang, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. 2013a. Spotting opinion spammers using behavioral footprints. In SIGKDD. 632--640.
    [35]
    Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie Glance. 2013b. What Yelp Fake Review Filter Might Be Doing?. In AAAI.
    [36]
    Michael P O'mahony, Neil J Hurley, and Guenole CM Silvestre. 2004. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artificial Intelligence Review (2004), 215--228.
    [37]
    Shebuti Rayana and Leman Akoglu. 2015a. Collective Opinion Spam Detection: Bridging Review Networks and metadata. In SIGKDD.
    [38]
    Shebuti Rayana and Leman Akoglu. 2015b. Collective opinion spam detection: Bridging review networks and metadata. In SIGKDD. 985--994.
    [39]
    Vlad Sandulescu and Martin Ester. 2015. Detecting singleton review spammers using semantic similarity. In WWW. 971--976.
    [40]
    Badrul Munir Sarwar, George Karypis, Joseph A Konstan, John Riedl, et al. 2001. Item-based collaborative filtering recommendation algorithms. WWW (2001).
    [41]
    Suvash Sedhain, Aditya Krishna Menon, Scott Sanner, and Lexing Xie. 2015. Autorec: Autoencoders meet collaborative filtering. In WWW Companion. 111--112.
    [42]
    Petar Velivc ković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. ICLR (2018).
    [43]
    Guan Wang, Sihong Xie, Bing Liu, and S Yu Philip. 2011. Review graph based online store review spammer detection. In ICDM. 1242--1247.
    [44]
    Guan Wang, Sihong Xie, Bing Liu, and Philip S Yu. 2012. Identify online store review spammers via social review graph. TIST (2012), 61.
    [45]
    Weiqing Wang, Hongzhi Yin, Zi Huang, Qinyong Wang, Xingzhong Du, and Quoc Viet Hung Nguyen. 2018. Streaming ranking based recommender systems. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval. 525--534.
    [46]
    CJ Mower White. 2015. Consistency in cognitive social behaviour: an introduction to social psychology .Psychology Press.
    [47]
    Yao Wu, Christopher DuBois, Alice X Zheng, and Martin Ester. 2016. Collaborative denoising auto-encoders for top-n recommender systems. In WSDM. 153--162.
    [48]
    Zhiang Wu, Youquan Wang, Yaqiong Wang, Junjie Wu, Jie Cao, and Lu Zhang. 2015. Spammers detection from product reviews: a hybrid model. In ICDM. 1039--1044.
    [49]
    Zhiang Wu, Junjie Wu, Jie Cao, and Dacheng Tao. 2012. HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In SIGKDD. 985--993.
    [50]
    Min Xie, Hongzhi Yin, Hao Wang, Fanjiang Xu, Weitong Chen, and Sen Wang. 2016. Learning graph-based poi embedding for location-based recommendation. In CIKM. 15--24.
    [51]
    Sihong Xie, Guan Wang, Shuyang Lin, and Philip S Yu. 2012. Review spam detection via temporal pattern discovery. In SIGKDD. 823--831.
    [52]
    Hongzhi Yin, Qinyong Wang, Kai Zheng, Zhixu Li, Jiali Yang, and Xiaofang Zhou. 2019. Social influence-based group representation learning for group recommendation. In ICDE. 566--577.
    [53]
    Hongzhi Yin, Lei Zou, Quoc Viet Hung Nguyen, Zi Huang, and Xiaofang Zhou. 2018. Joint event-partner recommendation in event-based social networks. In ICDE. 929--940.
    [54]
    Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L Hamilton, and Jure Leskovec. 2018. Graph convolutional neural networks for web-scale recommender systems. In SIGKDD. 974--983.
    [55]
    Shuai Zhang, Lina Yao, Aixin Sun, and Yi Tay. 2019 a. Deep learning based recommender system: A survey and new perspectives. CSUR (2019), 5.
    [56]
    Shijie Zhang, Hongzhi Yin, Qinyong Wang, Tong Chen, Hongxu Chen, and Quoc Viet Hung Nguyen. 2019 b. Inferring substitutable products with deep network embedding. IJCAI (2019), 4306--4312.
    [57]
    Yongfeng Zhang, Yunzhi Tan, Min Zhang, Yiqun Liu, Tat-Seng Chua, and Shaoping Ma. 2015. Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In IJCAI.
    [58]
    Zhi-Dan Zhao and Ming-Sheng Shang. 2010. User-based collaborative-filtering recommendation algorithms on hadoop. In WKDD. 478--481.

    Cited By

    View all
    • (2024)User tendency-based rating scaling in online trading networksPLOS ONE10.1371/journal.pone.029790319:4(e0297903)Online publication date: 16-Apr-2024
    • (2024)LoRec: Combating Poisons with Large Language Model for Robust Sequential RecommendationProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657684(1733-1742)Online publication date: 10-Jul-2024
    • (2024)GAD-NR: Graph Anomaly Detection via Neighborhood ReconstructionProceedings of the 17th ACM International Conference on Web Search and Data Mining10.1145/3616855.3635767(576-585)Online publication date: 4-Mar-2024
    • Show More Cited By

    Index Terms

    1. GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGIR '20: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
      July 2020
      2548 pages
      ISBN:9781450380164
      DOI:10.1145/3397271
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 July 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. deep learning
      2. network embedding
      3. robust recommender system
      4. shilling attack detection

      Qualifiers

      • Research-article

      Funding Sources

      • Australian Research Council

      Conference

      SIGIR '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 792 of 3,983 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)239
      • Downloads (Last 6 weeks)28
      Reflects downloads up to 12 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)User tendency-based rating scaling in online trading networksPLOS ONE10.1371/journal.pone.029790319:4(e0297903)Online publication date: 16-Apr-2024
      • (2024)LoRec: Combating Poisons with Large Language Model for Robust Sequential RecommendationProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657684(1733-1742)Online publication date: 10-Jul-2024
      • (2024)GAD-NR: Graph Anomaly Detection via Neighborhood ReconstructionProceedings of the 17th ACM International Conference on Web Search and Data Mining10.1145/3616855.3635767(576-585)Online publication date: 4-Mar-2024
      • (2024)Revisiting Attack-Caused Structural Distribution Shift in Graph Anomaly DetectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.338070936:9(4849-4861)Online publication date: Sep-2024
      • (2024)Comprehensive Privacy Analysis on Federated Recommender System Against Attribute Inference AttacksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.329560136:3(987-999)Online publication date: Mar-2024
      • (2024)Toward Adversarially Robust Recommendation From Adaptive Fraudster DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332787619(907-919)Online publication date: 2024
      • (2024)BOURNE: Bootstrapped Self-Supervised Learning Framework for Unified Graph Anomaly Detection2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00220(2820-2833)Online publication date: 13-May-2024
      • (2024)An imbalanced learning method based on graph tran-smote for fraud detectionScientific Reports10.1038/s41598-024-67550-414:1Online publication date: 17-Jul-2024
      • (2024)Graph neural network recommendation algorithm based on improved dual tower modelScientific Reports10.1038/s41598-024-54376-314:1Online publication date: 15-Feb-2024
      • (2024)Two-stage GNN-based fraud detection with camouflage identification and enhanced semantics aggregationNeurocomputing10.1016/j.neucom.2023.127108570:COnline publication date: 12-Apr-2024
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media