Skip to main content

Truth Discovery Against Disguised Attack Mechanism in Crowdsourcing

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14333))

  • 61 Accesses

Abstract

Crowdsourcing is an effective paradigm for recruiting online workers to perform intelligent tasks that are difficult for computers to complete. More and more attacks bring challenges to crowdsourcing systems. Although the truth discovery method can defend against common attacks to a certain extent, the real scene is much more complex. Malicious workers can not only improve their reliability by agreeing with normal workers on tasks that are unlikely to be overturned, but also gather together to launch more effective attacks on tasks that are easily overturned. This disguised attack is smarter and harder to defend. To solve this problem, we propose a new defense framework TD-DA (Truth Discovery against Disguised Attack) composed of truth discovery and task allocation. In the truth discovery phase, we quantify the aggressiveness and reliability of workers on the golden task based on the sigmoid function. In the task allocation phase, the Weighted Arithmetic Mean (WAM) is used to estimate the allocation probability of golden tasks to avoid the shortage of golden tasks. Extensive experiments on real-world datasets and synthetic datasets demonstrate that our method is effective against disguised attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: the role of source dependence. VLDB 2(1), 550–561 (2009)

    Google Scholar 

  2. Druschel, P., Kaashoek, F., Rowstron, A.: Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, 7–8 March 2002, Revised Papers, vol. 2429. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45748-8

  3. Galland, A., Abiteboul, S., Marian, A., Senellart, P.: Corroborating information from disagreeing views. In: WSDM, pp. 131–140 (2010)

    Google Scholar 

  4. Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: SIGKDD, pp. 895–904 (2016)

    Google Scholar 

  5. Huberman, B.A., Romero, D.M., Wu, F.: Crowdsourcing, attention and productivity. JIS 35(6), 758–765 (2009)

    Google Scholar 

  6. Kaghazgaran, P., Caverlee, J., Squicciarini, A.: Combating crowdsourced review manipulators: a neighborhood-based approach. In: WSDM, pp. 306–314 (2018)

    Google Scholar 

  7. Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. JACM 46(5), 604–632 (1999)

    Article  MathSciNet  Google Scholar 

  8. Li, X., Dong, X.L., Lyons, K.B., Meng, W., Srivastava, D.: Scaling up copy detection. In: ICDE, pp. 89–100. IEEE (2015)

    Google Scholar 

  9. Li, Y., et al.: A survey on truth discovery. SIGKDD 17(2), 1–16 (2016)

    Article  Google Scholar 

  10. Li, Y., et al.: Conflicts to harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. TKDE 28(8), 1986–1999 (2016)

    Google Scholar 

  11. Miao, C., Li, Q., Su, L., Huai, M., Jiang, W., Gao, J.: Attack under disguise: an intelligent data poisoning attack mechanism in crowdsourcing. In: Proceedings of the 2018 World Wide Web Conference, pp. 13–22 (2018)

    Google Scholar 

  12. Pasternack, J., Roth, D.: Making better informed trust decisions with generalized fact-finding. In: IJCAI (2011)

    Google Scholar 

  13. Pasternack, J., Roth, D.: Latent credibility analysis. In: Proceedings of the 22nd international conference on World Wide Web, pp. 1009–1020 (2013)

    Google Scholar 

  14. Spatscheck, O., Peterson, L.L.: Defending against denial of service attacks in scout. In: OSDI, vol. 99, pp. 59–72 (1999)

    Google Scholar 

  15. Xiao, H., Wang, S.: A joint maximum likelihood estimation framework for truth discovery: a unified perspective. IEEE Trans. Knowl. Data Eng. (2022)

    Google Scholar 

  16. Yang, J., Tay, W.P.: An unsupervised Bayesian neural network for truth discovery in social networks. IEEE Trans. Knowl. Data Eng. (2021)

    Google Scholar 

  17. Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: SIGKDD, pp. 1048–1052 (2007)

    Google Scholar 

  18. Yuan, D., Li, G., Li, Q., Zheng, Y.: Sybil defense in crowdsourcing platforms. In: CIKM, pp. 1529–1538 (2017)

    Google Scholar 

  19. Zhang, H., et al.: Influence-aware truth discovery. In: CIKM, pp. 851–860 (2016)

    Google Scholar 

Download references

Acknowledgement

This work was supported by Fundamental Research Funds for the Central Universities (No. 23D111204, 22D111210), Shanghai Science and Technology Commission (No. 22YF1401100), and National Science Fund for Young Scholars (No. 62202095).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guohao Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, X., Tang, Y., Sun, G., Shen, C., Chen, H. (2024). Truth Discovery Against Disguised Attack Mechanism in Crowdsourcing. In: Song, X., Feng, R., Chen, Y., Li, J., Min, G. (eds) Web and Big Data. APWeb-WAIM 2023. Lecture Notes in Computer Science, vol 14333. Springer, Singapore. https://doi.org/10.1007/978-981-97-2387-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2387-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2386-7

  • Online ISBN: 978-981-97-2387-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics