skip to main content
10.1145/3159652.3159729acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
research-article
Public Access

REV2: Fraudulent User Prediction in Rating Platforms

Published:02 February 2018Publication History

ABSTRACT

Rating platforms enable large-scale collection of user opinion about items(e.g., products or other users). However, untrustworthy users give fraudulent ratings for excessive monetary gains. In this paper, we present REV2, a system to identify such fraudulent users. We propose three interdependent intrinsic quality metrics---fairness of a user, reliability of a rating and goodness of a product. The fairness and reliability quantify the trustworthiness of a user and rating, respectively, and goodness quantifies the quality of a product. Intuitively, a user is fair if it provides reliable scores that are close to the goodness of products. We propose six axioms to establish the interdependency between the scores, and then, formulate a mutually recursive definition that satisfies these axioms. We extend the formulation to address cold start problem and incorporate behavior properties. We develop the REV2 algorithm to calculate these intrinsic quality scores for all users, ratings, and products. We show that this algorithm is guaranteed to converge and has linear time complexity. By conducting extensive experiments on five rating datasets, we show that REV2 outperforms nine existing algorithms in detecting fair and unfair users. We reported the 150 most unfair users in the Flipkart network to their review fraud investigators, and 127 users were identified as being fraudulent(84.6% accuracy). The REV2 algorithm is being deployed at Flipkart.

References

  1. Rev2 online appendix. https://cs.stanford.edu/~srijan/rev2/.Google ScholarGoogle Scholar
  2. L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in online reviews by network effects. In International Conference on Web and Social Media, 2013.Google ScholarGoogle Scholar
  3. L. Akoglu, H. Tong, and D. Koutra. Graph based anomaly detection and description: a survey. ACM Transactions on Knowledge Discovery from Data, 2015.Google ScholarGoogle Scholar
  4. C. Chen, K. Wu, V. Srinivasan, and X. Zhang. Battling the internet water army: Detection of hidden paid posters. In International Conference on Advances in Social Networks Analysis and Mining, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Fayazi, K. Lee, J. Caverlee, and A. Squicciarini. Uncovering crowdsourced manipulation of online reviews. In Special Interest Group on Information Retrieval, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In International Conference on World Wide Web, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Hooi, N. Shah, A. Beutel, S. Gunneman, L. Akoglu, M. Kumar, D. Makhija, and C. Faloutsos. Birdnest: Bayesian inference for ratings-fraud detection. In SIAM International Conference on Data Mining, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  8. B. Hooi, H. A. Song, A. Beutel, N. Shah, K. Shin, and C. Faloutsos. Fraudar: Bounding graph fraud in the face of camouflage. In ACM International conference on Knowledge Discovery and Data Mining, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. J. Hutto and E. Gilbert. Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Eighth international AAAI conference on weblogs and social media, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Catchsync: catching synchronized behavior in large directed graphs. In ACM International Conference on Knowledge Discovery and Data Mining, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Jiang, P. Cui, and C. Faloutsos. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems, 31)1):31--39, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Kumar, J. Cheng, J. Leskovec, and V. Subrahmanian. An army of me: Sockpuppets in online discussion communities. In International Conference on World Wide Web, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Kumar and N. Shah. False information on web and social media: A survey. In Social Media Analytics: Advances and Applications. CRC, 2018.Google ScholarGoogle Scholar
  14. S. Kumar, F. Spezzano, V. Subrahmanian, and C. Faloutsos. Edge weight prediction in weighted signed networks. In IEEE 16th International Conference on Data Mining, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  15. T. Lappas, G. Sabnis, and G. Valkanas. The impact of fake reviews on online visibility: A vulnerability assessment of the hotel industry. INFORMS, 27)4), 2016.Google ScholarGoogle Scholar
  16. H. Li, G. Fei, S. Wang, B. Liu, W. Shao, A. Mukherjee, and J. Shao. Bimodal distribution and co-bursting in review spam detection. In International Conference on World Wide Web, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R.-H. Li, J. Xu~Yu, X. Huang, and H. Cheng. Robust reputation-based ranking on bipartite rating networks. In SIAM International Conference on Data Mining, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In International Conference on Information and Knowledge Management, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Massa and P. Avesani. Trust-aware recommender systems. In ACM Conference on Recommender Systems, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. J. McAuley and J. Leskovec. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In International Conference on World Wide Web, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. J. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In International Conference on World Wide Web, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in networks based on trust scores. In International World Wide Web conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In ACM International conference on Knowledge Discovery and Data Mining, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake review filter might be doing? In International Conference on Web and Social Media, 2013.Google ScholarGoogle Scholar
  25. J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates, 71)2001):2001, 2001.Google ScholarGoogle Scholar
  26. S. Rayana and L. Akoglu. Collective opinion spam detection: Bridging review networks and metadata. In ACM International conference on Knowledge Discovery and Data Mining, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. V. Sandulescu and M. Ester. Detecting singleton review spammers using semantic similarity. In International Conference on World Wide Web, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. V. Subrahmanian and S. Kumar. Predicting human behavior: The next frontiers. Science, 355)6324):489--489, 2017.Google ScholarGoogle Scholar
  29. H. Sun, A. Morales, and X. Yan. Synthetic review spamming and defense. In ACM International conference on Knowledge Discovery and Data Mining, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget, S. Guha, K. P. Gummadi, A. Kate, and A. Mislove. Strength in numbers: Robust tamper detection in crowd computations. In Conference on Online Social Networks, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. G. Wang, S. Xie, B. Liu, and S. Y. Philip. Review graph based online store review spammer detection. In IEEE International Conference on Data Mining series, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. G. Wang, S. Xie, B. Liu, and P. S. Yu. Identify online store review spammers via social review graph. ACM Transactions on Intelligent Systems and Technology, 3)4):61, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. Wang, A. Ghose, and P. Ipeirotis. Bonus, disclosure, and choice: what motivates the creation of high-quality paid reviews? In International Conference on Information Systems, 2012.Google ScholarGoogle Scholar
  35. G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious reviews. In ACM Conference on Recommender Systems, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Z. Wu, C. C. Aggarwal, and J. Sun. The troll-trust model for ranking in signed networks. In ACM International Conference on Web Search and Data Mining, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam detection via temporal pattern discovery. In ACM International Conference on Knowledge Discovery and Data Mining, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. REV2: Fraudulent User Prediction in Rating Platforms

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  WSDM '18: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining
                  February 2018
                  821 pages
                  ISBN:9781450355810
                  DOI:10.1145/3159652

                  Copyright © 2018 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 2 February 2018

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  WSDM '18 Paper Acceptance Rate81of514submissions,16%Overall Acceptance Rate498of2,863submissions,17%

                  Upcoming Conference

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader