Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2505515.2505700acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Uncovering collusive spammers in Chinese review websites

Published: 27 October 2013 Publication History

Abstract

As the rapid development of China's e-commerce in recent years and the underlying evolution of adversarial spamming tactics, more sophisticated spamming activities may carry out in Chinese review websites. Empirical analysis, on recently crawled product reviews from a popular Chinese e-commerce website, reveals the failure of many state-of-the-art spam indicators on detecting collusive spammers. Two novel methods are then proposed: 1) a KNN-based method that considers the pairwise similarity of two reviewers based on their group-level relational information and selects k most similar reviewers for voting; 2) a more general graph-based classification method that jointly classifies a set of reviewers based on their pairwise transaction correlations. Experimental results show that both our methods promisingly outperform the indicator-only classifiers in various settings.

References

[1]
S. Feng, L. Xing, A. Gogar, and Y. Choi. Distributional footprints of deceptive product reviews. In Proceedings of the International AAAI Conference on WebBlogs and Social Media (ICWSM), 2012.
[2]
N. Jindal and B. Liu. Opinion spam and analysis. In Proceedings of the International Conference on Web Search and Web Data Mining (WSDM), 2008.
[3]
F. Li, M. Huang, Y. Yang, and X. Zhu. Learning to identify review spam. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI), pages 2488--2493, 2011.
[4]
E. Lim, V. Nguyen, N. Jindal, B. Liu, and H. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010.
[5]
L. K. McDowell, K. M. Gupta, and D. W. Aha. Cautious inference in collective classification. In Proceedings of the National Conference on Artificial Intelligence (AAAI), 2007.
[6]
A. Mukherjee, B. Liu, and N. Glance. Spotting fake reviewer groups in consumer reviews. In Proceedings of the International Conference on World Wide Web (WWW), 2012.
[7]
J. Neville and D. Jensen. Iterative classification in relational data. In Proceedings of the AAAI Workshop on Learning Statistical Models from Relational Data, 2000.
[8]
M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint arXiv:1107.4557, 2011.
[9]
P. Sen and L. Getoor. Empirical comparison of approximate inference algorithms for networked data. In Proceedings of ICML Workshop on Statistical Relational Learning (SRL), 2006.
[10]
P. Sen, G. Namata, M. Bilgic, L. Getoor, B. Galligher, and T. Eliassi-Rad. Collective classification in network data. AI magazine, 29(3):93, 2008.
[11]
B. Taskar, P. Abbeel, and D. Koller. Discriminative probabilistic models for relational data. In Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, 2002.
[12]
G. Wang, S. Xie, B. Liu, and S. Philip. Identify online store review spammers via social review graph. ACM Transactions on Intelligent Systems and Technology (TIST), 3(4), 2012.

Cited By

View all
  • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
  • (2025)Spam detection using hybrid model on fusion of spammer behavior and linguistics featuresEgyptian Informatics Journal10.1016/j.eij.2024.10060529(100605)Online publication date: Mar-2025
  • (2025)User similarity-based graph convolutional neural network for shilling attack detectionApplied Intelligence10.1007/s10489-025-06254-255:5Online publication date: 17-Jan-2025
  • Show More Cited By

Index Terms

  1. Uncovering collusive spammers in Chinese review websites

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge Management
      October 2013
      2612 pages
      ISBN:9781450322638
      DOI:10.1145/2505515
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. collusive spammer
      2. opinion spam
      3. spam review detection

      Qualifiers

      • Research-article

      Conference

      CIKM'13
      Sponsor:
      CIKM'13: 22nd ACM International Conference on Information and Knowledge Management
      October 27 - November 1, 2013
      California, San Francisco, USA

      Acceptance Rates

      CIKM '13 Paper Acceptance Rate 143 of 848 submissions, 17%;
      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)28
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 01 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
      • (2025)Spam detection using hybrid model on fusion of spammer behavior and linguistics featuresEgyptian Informatics Journal10.1016/j.eij.2024.10060529(100605)Online publication date: Mar-2025
      • (2025)User similarity-based graph convolutional neural network for shilling attack detectionApplied Intelligence10.1007/s10489-025-06254-255:5Online publication date: 17-Jan-2025
      • (2024)Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimizationCybersecurity10.1186/s42400-024-00230-y7:1Online publication date: 4-Jun-2024
      • (2024)A recommendation attack detection approach integrating CNN with BaggingComputers and Security10.1016/j.cose.2024.104030146:COnline publication date: 1-Nov-2024
      • (2024)A study on the propagation of online public opinion by internet water armySocial Network Analysis and Mining10.1007/s13278-023-01182-w14:1Online publication date: 17-Jan-2024
      • (2024)Fake review detection techniques, issues, and future research directions: a literature reviewKnowledge and Information Systems10.1007/s10115-024-02118-266:9(5071-5112)Online publication date: 17-May-2024
      • (2024)Spammer Group Detection Approach Based on Deep Reinforcement LearningAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5606-3_20(233-244)Online publication date: 5-Aug-2024
      • (2023)Detecting E-Commerce Water Army through Graph Modeling on User Multiple Collusive Relationships: A Case Study of China’s Hotel IndustryJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1801000618:1(105-129)Online publication date: 5-Jan-2023
      • (2023)Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithmCybersecurity10.1186/s42400-023-00159-86:1Online publication date: 2-Oct-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media