File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s10489-019-01490-9
- Scopus: eid_2-s2.0-85067660132
- WOS: WOS:000496315100007
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: An unsupervised strategy for defending against multifarious reputation attacks
Title | An unsupervised strategy for defending against multifarious reputation attacks |
---|---|
Authors | |
Keywords | Reputation attack Nearest neighbor search Lenient reviewer Strict reviewer Behavior expectation theory |
Issue Date | 2019 |
Publisher | Springer New York LLC. The Journal's web site is located at http://springerlink.metapress.com/openurl.asp?genre=journal&issn=0924-669X |
Citation | Applied Intelligence, 2019, v. 49 n. 12, p. 4189-4210 How to Cite? |
Abstract | In electronic markets, malicious sellers often employ reviewers to carry out different types of attacks to improve their own reputations or destroy their opponents’ reputations. As such attacks may involve deception, collusion, and complex strategies, maintaining the robustness of reputation evaluation systems remains a challenging problem. From a platform manager’s view, no trader can be taken as a trustable benchmark for reference, therefore, accurate filtration of dishonest sellers and fraud reviewers and precise presentation of users’ reputations remains a challenging problem. Based on impression theory, this paper presents an unsupervised strategy, which first design a nearest neighbor search algorithm to select some typical lenient reviewers and strict reviewers. Then, based on these selected reviewers and the behavior expectation theory in impression theory, this paper adopts a classification algorithm that pre-classify sellers into honest and dishonest ones. Thirdly, another classification algorithm is designed to classify reviewers (i.e., buyers) into honest, dishonest, and uncertain ones according to their trading experiences with the pre-classified sellers. Finally, based on the ratings of various reviewers, this paper proposes a formula to estimate seller reputations. We further designed two general sets of experiments over simulated data and real data to evaluate our scheme, which demonstrate that our unsupervised scheme outperforms benchmark strategies in accurately estimating seller reputations. In particular, this strategy can robustly defend against various common attacks and unknown attacks. |
Persistent Identifier | http://hdl.handle.net/10722/285326 |
ISSN | 2023 Impact Factor: 3.4 2023 SCImago Journal Rankings: 1.193 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, X | - |
dc.contributor.author | Ji, SJ | - |
dc.contributor.author | Liang, YQ | - |
dc.contributor.author | Leung, HF | - |
dc.contributor.author | Chiu, DKW | - |
dc.date.accessioned | 2020-08-18T03:52:26Z | - |
dc.date.available | 2020-08-18T03:52:26Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Applied Intelligence, 2019, v. 49 n. 12, p. 4189-4210 | - |
dc.identifier.issn | 0924-669X | - |
dc.identifier.uri | http://hdl.handle.net/10722/285326 | - |
dc.description.abstract | In electronic markets, malicious sellers often employ reviewers to carry out different types of attacks to improve their own reputations or destroy their opponents’ reputations. As such attacks may involve deception, collusion, and complex strategies, maintaining the robustness of reputation evaluation systems remains a challenging problem. From a platform manager’s view, no trader can be taken as a trustable benchmark for reference, therefore, accurate filtration of dishonest sellers and fraud reviewers and precise presentation of users’ reputations remains a challenging problem. Based on impression theory, this paper presents an unsupervised strategy, which first design a nearest neighbor search algorithm to select some typical lenient reviewers and strict reviewers. Then, based on these selected reviewers and the behavior expectation theory in impression theory, this paper adopts a classification algorithm that pre-classify sellers into honest and dishonest ones. Thirdly, another classification algorithm is designed to classify reviewers (i.e., buyers) into honest, dishonest, and uncertain ones according to their trading experiences with the pre-classified sellers. Finally, based on the ratings of various reviewers, this paper proposes a formula to estimate seller reputations. We further designed two general sets of experiments over simulated data and real data to evaluate our scheme, which demonstrate that our unsupervised scheme outperforms benchmark strategies in accurately estimating seller reputations. In particular, this strategy can robustly defend against various common attacks and unknown attacks. | - |
dc.language | eng | - |
dc.publisher | Springer New York LLC. The Journal's web site is located at http://springerlink.metapress.com/openurl.asp?genre=journal&issn=0924-669X | - |
dc.relation.ispartof | Applied Intelligence | - |
dc.rights | This is a post-peer-review, pre-copyedit version of an article published in Applied Intelligence. The final authenticated version is available online at: http://dx.doi.org/10.1007/s10489-019-01490-9 | - |
dc.subject | Reputation attack | - |
dc.subject | Nearest neighbor search | - |
dc.subject | Lenient reviewer | - |
dc.subject | Strict reviewer | - |
dc.subject | Behavior expectation theory | - |
dc.title | An unsupervised strategy for defending against multifarious reputation attacks | - |
dc.type | Article | - |
dc.identifier.email | Chiu, DKW: dchiu88@hku.hk | - |
dc.description.nature | postprint | - |
dc.identifier.doi | 10.1007/s10489-019-01490-9 | - |
dc.identifier.scopus | eid_2-s2.0-85067660132 | - |
dc.identifier.hkuros | 312764 | - |
dc.identifier.volume | 49 | - |
dc.identifier.spage | 4189 | - |
dc.identifier.epage | 4210 | - |
dc.identifier.isi | WOS:000496315100007 | - |
dc.publisher.place | United States | - |
dc.identifier.issnl | 0924-669X | - |