skip to main content
10.1145/2464464.2464470acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Simultaneously detecting fake reviews and review spammers using factor graph model

Published: 02 May 2013 Publication History

Abstract

Review spamming is quite common on many online shopping platforms like Amazon. Previous attempts for fake review and spammer detection use features of reviewer behavior, rating, and review content. However, to the best of our knowledge, there is no work capable of detecting fake reviews and review spammers at the same time. In this paper, we propose an algorithm to achieve the two goals simultaneously. By defining features to describe each review and reviewer, a Review Factor Graph model is proposed to incorporate all the features and to leverage belief propagation between reviews and reviewers. Experimental results show that our algorithm outperforms all of the other baseline methods significantly with respect to both efficiency and accuracy.

References

[1]
P. Chirita, J. Diederich, and W. Nejdl. Mailrank: using ranking for spam detection. In Proceedings of the 14th ACM international conference on Information and knowledge management, pages 373--380. ACM, 2005.
[2]
K. Dave, S. Lawrence, and D. Pennock. Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of the 12th international conference on World Wide Web, pages 519--528. ACM, 2003.
[3]
E. Gilbert and K. Karahalios. Understanding deja reviewers. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 225--228. ACM, 2010.
[4]
J. Hopcroft, T. Lou, and J. Tang. Who will follow you back?: reciprocal relationship prediction. In Proceedings of the 20th ACM international conference on Information and knowledge management, pages 1137--1146. ACM, 2011.
[5]
M. Hu and B. Liu. Mining and summarizing customer reviews. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 168--177. ACM, 2004.
[6]
N. Jindal and B. Liu. Opinion spam and analysis. In Proceedings of the international conference on Web search and web data mining, pages 219--230, 2008.
[7]
N. Jindal, B. Liu, and E. Lim. Finding unusual review patterns using unexpected rules. In Proceedings of the 19th ACM international conference on Information and knowledge management, pages 1549--1552. ACM, 2010.
[8]
P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi. Detecting spam blogs: A machine learning approach. In PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, volume 21, page 1351. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2006.
[9]
F. Kschischang, B. Frey, and H. Loeliger. Factor graphs and the sum-product algorithm. Information Theory, IEEE Transactions on, 47(2):498--519, 2001.
[10]
F. Li, M. Huang, Y. Yang, and X. Zhu. Learning to identify review spam. In Proceedings of the Twenty-Second international joint conference on Artificial Intelligence-Volume Volume Three, pages 2488--2493. AAAI Press, 2011.
[11]
E. Lim, V. Nguyen, N. Jindal, B. Liu, and H. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management, pages 939--948. ACM, 2010.
[12]
D. Liu and J. Nocedal. On the limited memory bfgs method for large scale optimization. Mathematical programming, 45(1):503--528, 1989.
[13]
B. Markines, C. Cattuto, and F. Menczer. Social spam detection. In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, pages 41--48. ACM, 2009.
[14]
A. Mukherjee, B. Liu, and N. Glance. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st international conference on World Wide Web, pages 191--200. ACM, 2012.
[15]
M. Ott, Y. Choi, C. Cardie, and J. Hancock. Finding deceptive opinion spam by any stretch of the imagination. arXiv preprint arXiv:1107.4557, 2011.
[16]
B. Pang, L. Lee, and S. Vaithyanathan. Thumbs up?: sentiment classification using machine learning techniques. In Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, pages 79--86. Association for Computational Linguistics, 2002.
[17]
A. Popescu and O. Etzioni. Extracting product features and opinions from reviews. In Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, pages 339--346. Association for Computational Linguistics, 2005.
[18]
J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 807--816. ACM, 2009.
[19]
W. Tang, H. Zhuang, and J. Tang. Learning to infer social ties in large networks. Machine Learning and Knowledge Discovery in Databases, pages 381--397, 2011.
[20]
P. Turney. Thumbs up or thumbs down?: semantic orientation applied to unsupervised classification of reviews. In Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, pages 417--424. Association for Computational Linguistics, 2002.
[21]
C. Wang, J. Han, Y. Jia, J. Tang, D. Zhang, Y. Yu, and J. Guo. Mining advisor-advisee relationships from research publication networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 203--212. ACM, 2010.
[22]
G. Wang, S. Xie, B. Liu, and P. Yu. Review graph based online store review spammer detection. In Data Mining (ICDM), 2011 IEEE 11th International Conference on, pages 1242--1247. IEEE, 2011.
[23]
Z. Wang, J. Li, Z. Wang, and J. Tang. Cross-lingual knowledge linking across wiki knowledge bases. In Proceedings of the 21st international conference on World Wide Web, pages 459--468. ACM, 2012.
[24]
B. Wu, V. Goel, and B. Davison. Topical trustrank: Using topicality to combat web spam. In Proceedings of the 15th international conference on World Wide Web, pages 63--72. ACM, 2006.
[25]
G. Wu, D. Greene, B. Smyth, and P. Cunningham. Distortion as a validation criterion in the identification of suspicious reviews. In Proceedings of the First Workshop on Social Media Analytics, pages 10--13. ACM, 2010.
[26]
Z. Yang, K. Cai, J. Tang, L. Zhang, Z. Su, and J. Li. Social context summarization. In Proceedings of the 34th ACM SIGIR Conference, 2011.
[27]
K. Yoo and U. Gretzel. Comparison of deceptive and truthful travel reviews. Information and communication technologies in tourism 2009, pages 37--47, 2009.

Cited By

View all
  • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
  • (2024)Leveraging Stacking Framework for Fake Review Detection in the Hospitality SectorJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1902007519:2(1517-1558)Online publication date: 15-Jun-2024
  • (2024)Understanding Large-Scale Network Effects in Detecting Review SpammersIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.324313911:4(4994-5004)Online publication date: Aug-2024
  • Show More Cited By

Index Terms

  1. Simultaneously detecting fake reviews and review spammers using factor graph model

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WebSci '13: Proceedings of the 5th Annual ACM Web Science Conference
    May 2013
    481 pages
    ISBN:9781450318891
    DOI:10.1145/2464464
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. factor graph
    2. fake review
    3. opinion spam

    Qualifiers

    • Research-article

    Funding Sources

    • Shenzhen Key Laboratories

    Conference

    WebSci '13
    Sponsor:
    WebSci '13: Web Science 2013
    May 2 - 4, 2013
    Paris, France

    Acceptance Rates

    Overall Acceptance Rate 245 of 933 submissions, 26%

    Upcoming Conference

    Websci '25
    17th ACM Web Science Conference
    May 20 - 24, 2025
    New Brunswick , NJ , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
    • (2024)Leveraging Stacking Framework for Fake Review Detection in the Hospitality SectorJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1902007519:2(1517-1558)Online publication date: 15-Jun-2024
    • (2024)Understanding Large-Scale Network Effects in Detecting Review SpammersIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.324313911:4(4994-5004)Online publication date: Aug-2024
    • (2024)Predicting Credibility of Online Reviews: An Integrated ApproachIEEE Access10.1109/ACCESS.2024.338384612(49050-49061)Online publication date: 2024
    • (2023)Detecting Inactive Cyberwarriors from Online Forums2023 IEEE International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)10.1109/WI-IAT59888.2023.00008(9-15)Online publication date: 26-Oct-2023
    • (2023)Detecting Product Review Spammers Using Principles of Big DataIEEE Transactions on Engineering Management10.1109/TEM.2021.309780570:7(2516-2527)Online publication date: Jul-2023
    • (2023)Artificial intelligence applications in fake review detection: Bibliometric analysis and future avenues for researchJournal of Business Research10.1016/j.jbusres.2022.113631158(113631)Online publication date: Mar-2023
    • (2023)Aspect-based classification method for review spam detectionMultimedia Tools and Applications10.1007/s11042-023-16293-x83:7(20931-20952)Online publication date: 5-Aug-2023
    • (2023)A Machine Learning Approach to Prediction of Online Reviews ReliabilitySocial Computing and Social Media10.1007/978-3-031-35915-6_11(131-145)Online publication date: 9-Jul-2023
    • (2022)Spam Reviews Detection in the Time of COVID-19 Pandemic: Background, Definitions, Methods and Literature AnalysisApplied Sciences10.3390/app1207363412:7(3634)Online publication date: 3-Apr-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media