Abstract
Crowdsourcing is an effective paradigm for recruiting online workers to perform intelligent tasks that are difficult for computers to complete. More and more attacks bring challenges to crowdsourcing systems. Although the truth discovery method can defend against common attacks to a certain extent, the real scene is much more complex. Malicious workers can not only improve their reliability by agreeing with normal workers on tasks that are unlikely to be overturned, but also gather together to launch more effective attacks on tasks that are easily overturned. This disguised attack is smarter and harder to defend. To solve this problem, we propose a new defense framework TD-DA (Truth Discovery against Disguised Attack) composed of truth discovery and task allocation. In the truth discovery phase, we quantify the aggressiveness and reliability of workers on the golden task based on the sigmoid function. In the task allocation phase, the Weighted Arithmetic Mean (WAM) is used to estimate the allocation probability of golden tasks to avoid the shortage of golden tasks. Extensive experiments on real-world datasets and synthetic datasets demonstrate that our method is effective against disguised attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: the role of source dependence. VLDB 2(1), 550–561 (2009)
Druschel, P., Kaashoek, F., Rowstron, A.: Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, 7–8 March 2002, Revised Papers, vol. 2429. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45748-8
Galland, A., Abiteboul, S., Marian, A., Senellart, P.: Corroborating information from disagreeing views. In: WSDM, pp. 131–140 (2010)
Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: SIGKDD, pp. 895–904 (2016)
Huberman, B.A., Romero, D.M., Wu, F.: Crowdsourcing, attention and productivity. JIS 35(6), 758–765 (2009)
Kaghazgaran, P., Caverlee, J., Squicciarini, A.: Combating crowdsourced review manipulators: a neighborhood-based approach. In: WSDM, pp. 306–314 (2018)
Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. JACM 46(5), 604–632 (1999)
Li, X., Dong, X.L., Lyons, K.B., Meng, W., Srivastava, D.: Scaling up copy detection. In: ICDE, pp. 89–100. IEEE (2015)
Li, Y., et al.: A survey on truth discovery. SIGKDD 17(2), 1–16 (2016)
Li, Y., et al.: Conflicts to harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. TKDE 28(8), 1986–1999 (2016)
Miao, C., Li, Q., Su, L., Huai, M., Jiang, W., Gao, J.: Attack under disguise: an intelligent data poisoning attack mechanism in crowdsourcing. In: Proceedings of the 2018 World Wide Web Conference, pp. 13–22 (2018)
Pasternack, J., Roth, D.: Making better informed trust decisions with generalized fact-finding. In: IJCAI (2011)
Pasternack, J., Roth, D.: Latent credibility analysis. In: Proceedings of the 22nd international conference on World Wide Web, pp. 1009–1020 (2013)
Spatscheck, O., Peterson, L.L.: Defending against denial of service attacks in scout. In: OSDI, vol. 99, pp. 59–72 (1999)
Xiao, H., Wang, S.: A joint maximum likelihood estimation framework for truth discovery: a unified perspective. IEEE Trans. Knowl. Data Eng. (2022)
Yang, J., Tay, W.P.: An unsupervised Bayesian neural network for truth discovery in social networks. IEEE Trans. Knowl. Data Eng. (2021)
Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: SIGKDD, pp. 1048–1052 (2007)
Yuan, D., Li, G., Li, Q., Zheng, Y.: Sybil defense in crowdsourcing platforms. In: CIKM, pp. 1529–1538 (2017)
Zhang, H., et al.: Influence-aware truth discovery. In: CIKM, pp. 851–860 (2016)
Acknowledgement
This work was supported by Fundamental Research Funds for the Central Universities (No. 23D111204, 22D111210), Shanghai Science and Technology Commission (No. 22YF1401100), and National Science Fund for Young Scholars (No. 62202095).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Fang, X., Tang, Y., Sun, G., Shen, C., Chen, H. (2024). Truth Discovery Against Disguised Attack Mechanism in Crowdsourcing. In: Song, X., Feng, R., Chen, Y., Li, J., Min, G. (eds) Web and Big Data. APWeb-WAIM 2023. Lecture Notes in Computer Science, vol 14333. Springer, Singapore. https://doi.org/10.1007/978-981-97-2387-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-97-2387-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2386-7
Online ISBN: 978-981-97-2387-4
eBook Packages: Computer ScienceComputer Science (R0)