DOI QR코드

DOI QR Code

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems

  • Oh, Hyun-Kyo (Department of Computer and Software, Hanyang University) ;
  • Kim, Sang-Wook (Department of Computer and Software, Hanyang University)
  • Received : 2016.09.25
  • Accepted : 2017.01.24
  • Published : 2017.04.30

Abstract

When purchasing an online product, a customer tends to be influenced strongly by its reputation, the aggregation of other customers' ratings on it. The reputation, however, is not always trustable since it can be manipulated easily by attackers who intentionally give unfair ratings to their target products. In this paper, we first address identifying trustable users who tend to give fair ratings to products in online rating systems and then propose a method of computing true reputation of a product by aggregating only those trustable users' ratings. In order to identify the trustable users, we list some candidate features that seem related significantly to the trustworthiness of users and verify the robustness of each of the features through extensive experiments. By finding and exploiting these robust features, we are able to identify trustable users and to compute true reputation effectively and efficiently based on fair ratings of those trustable users.

Keywords

References

  1. M. Brennan, S. Wrazien, and R. Greenstadt, "Using Machine Learning to Augment Collaborative Filtering of Community Discussions," in Proc. of the 9th Int'l Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1569-1570, 2010.
  2. R. Burke, B. Mobasher, C. Williams, and R. Bhaumik, "Classification Features for Attack Detection in Collaborative Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 542-547, 2006.
  3. P. Chirita, W. Nejdl, and C. Zamfir, "Preventing Shilling Attacks in Online Recommender Systems," in Proc. of the 7th Annual ACM Int'l Workshop on Web Information and Data Management (WIDM), pp. 67-74, 2005.
  4. M. Eisend, "Source Credibility Dimensions in Marketing Communication-A Generalized Solution," Journal of Empirical Generalisations in Marketing Science, vol. 10, no. 2, 1-33, 2006.
  5. S. Grazioli and S. L. Jarvenpaa, "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp. 395-410, 2000. https://doi.org/10.1109/3468.852434
  6. I. Gunes, C. Kaleli, A. Bilge, and H. Polat, "Shilling Attacks against Recommender Systems: A Comprehensive Survey," Artificial Intelligence Review, pp. 1-33, 2012.
  7. G. Häuubl and V. Trifts, "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids," Marketing Science, vol. 19, no. 1, pp. 4-21, 2000. https://doi.org/10.1287/mksc.19.1.4.15178
  8. J. Howe, "The Rise of Crowdsourcing," Wired, 2006.
  9. N. Hurley, Z. Cheng, and M. Zhang, "Statistical Attack Detection," in Proc. of the 3rd ACM Conf. on Recommender Systems (RecSys), pp. 149-156, 2009.
  10. S. Lam and J. Riedl, "Shilling Recommender Systems for Fun and Profit," in Proc. of the 13th Int'l Conf. on World Wide Web (WWW), pp. 393-402, 2004.
  11. C. Leadbeater, "WE-THINK: Mass Innovation, not Mass Production," Profile Books, 2008.
  12. J.-S. Lee and D. Zhu, "Shilling Attack Detection-A New Approach for a Trustworthy Recommender System," INFORMS Journal on Computing, vol. 24, no. 1, pp. 117-131, 2012. https://doi.org/10.1287/ijoc.1100.0440
  13. P. Levy, "L'Intelligence Collective: Pour Une Anthropologie Du Cyberspace," La Decouverte, 1997.
  14. M. Limayem, M. Khalifa, and A. Frini, "What Makes Consumers Buy from Internet? A Longitudinal Study of Online Shopping," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp.421-432, 2000. https://doi.org/10.1109/3468.852436
  15. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams, "Towards Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness," ACM Transactions on Internet Technology, vol. 7, no. 2, pp. 1-40, 2007. https://doi.org/10.1145/1189740.1189741
  16. Nielsen, "Trends in Online Shopping," a global Nielsen consumer report, Feb. 2008.
  17. H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems," IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 45, no. 12, pp. 1564-1576, 2015. https://doi.org/10.1109/TSMC.2015.2416126
  18. H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Trustable Aggregation of Online Ratings," in Proc. of the 22nd ACM Int'l Conf. on Information and Knowledge Management (CIKM), pp. 1233-1236, 2013.
  19. S. Y. Rieh and D. Danielson, "Credibility: A Multidisciplinary Framework," Annual Review of Information Science and Technology, vol. 41, no. 1, pp. 307-364, 2007. https://doi.org/10.1002/aris.2007.1440410114
  20. J. Surowiecki, "The Wisdom of Crowds: Why the Many are Smarter than the Few and how Collective Wisdom Shapes Business, Economies, Societies, and Nations," NY: Doubleday, 2004.
  21. A. Whitby, A. Josang and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," The Icfain Journal of Management Research, vol. 4, no. 2, pp. 48-64, 2005.
  22. Z. Wu, J. Cao, B. Mao, and Y. Wang, "Semi-Sad: Applying Semi-Supervised Learning to Shilling Attack Detection," in Proc. of the 5th ACM Conf. on Recommender Systems (RecSys), pp. 289-292, 2011.
  23. Z. Wu, J. Wu, J. Cao, and D. Tao, "HySAD: A Semi-Supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation," in Proc. of the 18th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 985-993, 2012.
  24. S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon, "Attack Detection in Time Series for Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 809-814, 2006.
  25. A. Ng, Machine Learning and AI via Brain simulations, Stanford University, 2015.
  26. "Feature Engineering: How to transform variables and create new ones?" Analytics Vidhya. 2015.
  27. J. Brownlee, "Discover Feature Engineering, How to Engineer Features and How to Get Good at It," Machine Learning Mastery, 2015.
  28. H. Ding, L. Cao, Y. Ren, K.-K. R. Choo, and B. Shi, "Reputation-Based Investment Helps to Optimize Group Behaviors in Spatial Lattice Networks," PLoS ONE, 2016.
  29. H. Ding, Y. Zhang, Y. Ren, B. Shi, and K.-K. R. Choo, "Heterogeneous Investment in Spatial Public Goods Game with Mixed Strategy," Soft Computing, 2016.
  30. H. Ding, J. Huang, Y. Chen, Y. Ren, "Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game," in Proc. of The 13rd IEEE Int'l Conf. on Dependable, Autonomic and Secure Computing (DASC2015), pp. 1954-1959, 2015.
  31. T. Ma, J. Zhou, M. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee, "Social Network and Tag Sources based Augmenting Collaborative Recommender System," IEICE transactions on Information and Systems, vol. E98-D, no.4, pp. 902-910, Apr. 2015. https://doi.org/10.1587/transinf.2014EDP7283
  32. B. Gu, X. Sun and V. S. Sheng, "Structural Minimax Probability Machine," IEEE Transactions on Neural Networks and Learning Systems, 2016
  33. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," IEEE Transactions on Parallel and Distributed Systems, 2015