skip to main content
10.1145/2806416.2806551acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Deep Semantic Frame-Based Deceptive Opinion Spam Analysis

Published: 17 October 2015 Publication History

Abstract

User-generated content is becoming increasingly valuable to both individuals and businesses due to its usefulness and influence in e-commerce markets. As consumers rely more on such information, posting deceptive opinions, which can be deliberately used for potential profit, is becoming more of an issue. Existing work on opinion spam detection focuses mainly on linguistic features such as n-grams, syntactic patterns, or LIWC. However, deep semantic analysis remains largely unstudied. In this paper, we propose a frame-based deep semantic analysis method for understanding rich characteristics of deceptive and truthful opinions written by various types of individuals including crowdsourcing workers, employees who have expert-level domain knowledge about local businesses, and online users who post on Yelp and TripAdvisor. Using our proposed semantic frame feature, we developed a classification model that outperforms the baseline model and achieves an accuracy of nearly 91%. Also, we performed qualitative analysis of deceptive and truthful review datasets and considered their semantic differences. Finally, we successfully found some interesting features that existing methods were unable to identify.

References

[1]
2013 study: 79% of consumers trust online reviews as much as personal recommendations, "http://searchengineland.com/2013-study-79-of-consumers-trust-online-reviews-as-much-as-personal-recommendations-164565". Accessed: 2015-04-05.
[2]
A. A. Benczur, K. Csalogany, T. Sarlos, and M. Uher. Spamrank--fully automatic link spam detection work in progress. In Proceedings of the first international workshop on adversarial information retrieval on the web, AIRWeb '05, Chiba, Japan, 2005.
[3]
C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Silvestri. Know your neighbors: Web spam detection using the web topology. In Proceedings of SIGIR, Amsterdam, Netherlands, July 2007. ACM.
[4]
S. Feng, R. Banerjee, and Y. Choi. Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, 2012.
[5]
C. Fillmore, C. Johnson, and M. Petruck. Background to framenet. International journal of lexicography, 16(3):235, 2003.
[6]
C. J. Fillmore. Frame semantics and the nature of language. In Origins and Evolution of Language and Speech, 280, 1976.
[7]
T. Gamerschlag, D. Gerland, R. Osswald, and W. Petersen. Frames and Concept Types: Applications in Language and Philosophy, volume 94 of 0924--4662. Springer International Publishing, 1 edition, 2014.
[8]
Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30, VLDB '04, pages 576--587, 2004.
[9]
N. Jindal and B. Liu. Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Data Mining, WSDM '08, 2008.
[10]
N. Jindal, B. Liu, and E.-P. Lim. Finding unusual review patterns using unexpected rules. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, pages 1549--1552, New York, NY, USA, 2010. ACM.
[11]
J. Li, M. Ott, C. Cardie, and E. Hovy. Towards a general rule for identifying deceptive opinion spam. In Proceedings of the 52th Annual Meeting of the Association for Computational Linguistics, 2014.
[12]
E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, 2010.
[13]
A. Mukherjee, B. Liu, and N. S. Glance. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012, pages 191--200.
[14]
A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake review filter might be doing? In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8-11, 2013.
[15]
M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, 2011.
[16]
J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, and R. J. Booth. The Development and Psychometric Properties of LIWC2007. Austin, TX, USA LIWC. Net.
[17]
N. Spirin and J. Han. Survey on web spam detection: principles and algorithms. ACM SIGKDD Explorations Newsletter, 13(2):50--64, 2012.
[18]
G. Wang, S. Xie, B. Liu, and P. S. Yu. Review graph based online store review spammer detection. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining, ICDM '11, pages 1242--1247, Washington, DC, USA, 2011. IEEE Computer Society.

Cited By

View all
  • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
  • (2024)An interpretable wide and deep model for online disinformation detectionExpert Systems with Applications10.1016/j.eswa.2023.121588237(121588)Online publication date: Mar-2024
  • (2024)Node embedding approach for accurate detection of fake reviews: a graph-based machine learning approach with explainable AIInternational Journal of Data Science and Analytics10.1007/s41060-024-00565-218:3(295-315)Online publication date: 4-Jun-2024
  • Show More Cited By

Index Terms

  1. Deep Semantic Frame-Based Deceptive Opinion Spam Analysis

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management
      October 2015
      1998 pages
      ISBN:9781450337946
      DOI:10.1145/2806416
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. deceptive opinion spam
      2. framenet
      3. semantic analysis

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CIKM'15
      Sponsor:

      Acceptance Rates

      CIKM '15 Paper Acceptance Rate 165 of 646 submissions, 26%;
      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Signed Latent Factors for Spamming Activity DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657320(651-664)Online publication date: 2025
      • (2024)An interpretable wide and deep model for online disinformation detectionExpert Systems with Applications10.1016/j.eswa.2023.121588237(121588)Online publication date: Mar-2024
      • (2024)Node embedding approach for accurate detection of fake reviews: a graph-based machine learning approach with explainable AIInternational Journal of Data Science and Analytics10.1007/s41060-024-00565-218:3(295-315)Online publication date: 4-Jun-2024
      • (2023)Rule-Based Classifiers for Identifying Fake Reviews in E-commerce: A Deep Learning SystemFuzzy, Rough and Intuitionistic Fuzzy Set Approaches for Data Handling10.1007/978-981-19-8566-9_14(257-276)Online publication date: 26-Mar-2023
      • (2022)Deceptive opinion spam detection approaches: a literature surveyApplied Intelligence10.1007/s10489-022-03427-153:2(2189-2234)Online publication date: 5-May-2022
      • (2021)Detecting Spam Game Reviews on Steam with a Semi-Supervised ApproachProceedings of the 16th International Conference on the Foundations of Digital Games10.1145/3472538.3472547(1-10)Online publication date: 3-Aug-2021
      • (2021)Fake Reviews Detection: A SurveyIEEE Access10.1109/ACCESS.2021.30755739(65771-65802)Online publication date: 2021
      • (2020)Recommending Inferior Results: A General and Feature-Free Model for Spam DetectionProceedings of the 29th ACM International Conference on Information & Knowledge Management10.1145/3340531.3411900(955-974)Online publication date: 19-Oct-2020
      • (2020)Fusion-based Spammer Detection Method by Embedding Review Texts and Weak Social Relations2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00067(329-336)Online publication date: Dec-2020
      • (2020)Automatic generation of lexica for sentiment polarity shiftersNatural Language Engineering10.1017/S135132492000039X27:2(153-179)Online publication date: 9-Jul-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media