ABSTRACT
Rating platforms enable large-scale collection of user opinion about items(e.g., products or other users). However, untrustworthy users give fraudulent ratings for excessive monetary gains. In this paper, we present REV2, a system to identify such fraudulent users. We propose three interdependent intrinsic quality metrics---fairness of a user, reliability of a rating and goodness of a product. The fairness and reliability quantify the trustworthiness of a user and rating, respectively, and goodness quantifies the quality of a product. Intuitively, a user is fair if it provides reliable scores that are close to the goodness of products. We propose six axioms to establish the interdependency between the scores, and then, formulate a mutually recursive definition that satisfies these axioms. We extend the formulation to address cold start problem and incorporate behavior properties. We develop the REV2 algorithm to calculate these intrinsic quality scores for all users, ratings, and products. We show that this algorithm is guaranteed to converge and has linear time complexity. By conducting extensive experiments on five rating datasets, we show that REV2 outperforms nine existing algorithms in detecting fair and unfair users. We reported the 150 most unfair users in the Flipkart network to their review fraud investigators, and 127 users were identified as being fraudulent(84.6% accuracy). The REV2 algorithm is being deployed at Flipkart.
- Rev2 online appendix. https://cs.stanford.edu/~srijan/rev2/.Google Scholar
- L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in online reviews by network effects. In International Conference on Web and Social Media, 2013.Google Scholar
- L. Akoglu, H. Tong, and D. Koutra. Graph based anomaly detection and description: a survey. ACM Transactions on Knowledge Discovery from Data, 2015.Google Scholar
- C. Chen, K. Wu, V. Srinivasan, and X. Zhang. Battling the internet water army: Detection of hidden paid posters. In International Conference on Advances in Social Networks Analysis and Mining, 2013. Google ScholarDigital Library
- A. Fayazi, K. Lee, J. Caverlee, and A. Squicciarini. Uncovering crowdsourced manipulation of online reviews. In Special Interest Group on Information Retrieval, 2015. Google ScholarDigital Library
- S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In International Conference on World Wide Web, 2012. Google ScholarDigital Library
- B. Hooi, N. Shah, A. Beutel, S. Gunneman, L. Akoglu, M. Kumar, D. Makhija, and C. Faloutsos. Birdnest: Bayesian inference for ratings-fraud detection. In SIAM International Conference on Data Mining, 2016.Google ScholarCross Ref
- B. Hooi, H. A. Song, A. Beutel, N. Shah, K. Shin, and C. Faloutsos. Fraudar: Bounding graph fraud in the face of camouflage. In ACM International conference on Knowledge Discovery and Data Mining, 2016. Google ScholarDigital Library
- C. J. Hutto and E. Gilbert. Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Eighth international AAAI conference on weblogs and social media, 2014.Google ScholarCross Ref
- M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Catchsync: catching synchronized behavior in large directed graphs. In ACM International Conference on Knowledge Discovery and Data Mining, 2014. Google ScholarDigital Library
- M. Jiang, P. Cui, and C. Faloutsos. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems, 31)1):31--39, 2016. Google ScholarDigital Library
- S. Kumar, J. Cheng, J. Leskovec, and V. Subrahmanian. An army of me: Sockpuppets in online discussion communities. In International Conference on World Wide Web, 2017. Google ScholarDigital Library
- S. Kumar and N. Shah. False information on web and social media: A survey. In Social Media Analytics: Advances and Applications. CRC, 2018.Google Scholar
- S. Kumar, F. Spezzano, V. Subrahmanian, and C. Faloutsos. Edge weight prediction in weighted signed networks. In IEEE 16th International Conference on Data Mining, 2016.Google ScholarCross Ref
- T. Lappas, G. Sabnis, and G. Valkanas. The impact of fake reviews on online visibility: A vulnerability assessment of the hotel industry. INFORMS, 27)4), 2016.Google Scholar
- H. Li, G. Fei, S. Wang, B. Liu, W. Shao, A. Mukherjee, and J. Shao. Bimodal distribution and co-bursting in review spam detection. In International Conference on World Wide Web, 2017. Google ScholarDigital Library
- R.-H. Li, J. Xu~Yu, X. Huang, and H. Cheng. Robust reputation-based ranking on bipartite rating networks. In SIAM International Conference on Data Mining, 2012.Google ScholarCross Ref
- E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In International Conference on Information and Knowledge Management, 2010. Google ScholarDigital Library
- P. Massa and P. Avesani. Trust-aware recommender systems. In ACM Conference on Recommender Systems, 2007. Google ScholarDigital Library
- J. J. McAuley and J. Leskovec. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In International Conference on World Wide Web, 2013. Google ScholarDigital Library
- A. J. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In International Conference on World Wide Web, 2015. Google ScholarDigital Library
- A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in networks based on trust scores. In International World Wide Web conference, 2011. Google ScholarDigital Library
- A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In ACM International conference on Knowledge Discovery and Data Mining, 2013. Google ScholarDigital Library
- A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake review filter might be doing? In International Conference on Web and Social Media, 2013.Google Scholar
- J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates, 71)2001):2001, 2001.Google Scholar
- S. Rayana and L. Akoglu. Collective opinion spam detection: Bridging review networks and metadata. In ACM International conference on Knowledge Discovery and Data Mining, 2015. Google ScholarDigital Library
- V. Sandulescu and M. Ester. Detecting singleton review spammers using semantic similarity. In International Conference on World Wide Web, 2015. Google ScholarDigital Library
- V. Subrahmanian and S. Kumar. Predicting human behavior: The next frontiers. Science, 355)6324):489--489, 2017.Google Scholar
- H. Sun, A. Morales, and X. Yan. Synthetic review spamming and defense. In ACM International conference on Knowledge Discovery and Data Mining, 2013. Google ScholarDigital Library
- B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security, 2014. Google ScholarDigital Library
- B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget, S. Guha, K. P. Gummadi, A. Kate, and A. Mislove. Strength in numbers: Robust tamper detection in crowd computations. In Conference on Online Social Networks, 2015. Google ScholarDigital Library
- G. Wang, S. Xie, B. Liu, and S. Y. Philip. Review graph based online store review spammer detection. In IEEE International Conference on Data Mining series, 2011. Google ScholarDigital Library
- G. Wang, S. Xie, B. Liu, and P. S. Yu. Identify online store review spammers via social review graph. ACM Transactions on Intelligent Systems and Technology, 3)4):61, 2012. Google ScholarDigital Library
- J. Wang, A. Ghose, and P. Ipeirotis. Bonus, disclosure, and choice: what motivates the creation of high-quality paid reviews? In International Conference on Information Systems, 2012.Google Scholar
- G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious reviews. In ACM Conference on Recommender Systems, 2010. Google ScholarDigital Library
- Z. Wu, C. C. Aggarwal, and J. Sun. The troll-trust model for ranking in signed networks. In ACM International Conference on Web Search and Data Mining, 2016. Google ScholarDigital Library
- S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam detection via temporal pattern discovery. In ACM International Conference on Knowledge Discovery and Data Mining, 2012. Google ScholarDigital Library
Index Terms
- REV2: Fraudulent User Prediction in Rating Platforms
Recommendations
User preference representation based on psychometric models
ADC '11: Proceedings of the Twenty-Second Australasian Database Conference - Volume 115Neighbourhood-based collaborative filtering is one of the most popular recommendation techniques, and has been applied successfully in various fields. User ratings are often used by neighbourhood-based collaborative filtering to compute the similarity ...
A novel user-based collaborative filtering method by inferring tag ratings
User-based collaborative filtering is one of the most widely-used recommendation methods. It recommends items to a user based on her similar users' preferences. The essential part of user-based collaborative filtering is to infer users' similarities. A ...
Using inferred tag ratings to improve user-based collaborative filtering
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied ComputingUser-based collaborative filtering is one of the most widely-used recommender methods. It recommends items to a user according to her similar users' opinions. The key point of user-based collaborative filtering is to compute users' similarities. In ...
Comments