Label propagation-based approach for detecting review spammer groups on e-commerce websites
F Zhang, X Hao, J Chao, S Yuan - Knowledge-Based Systems, 2020 - Elsevier
Online product reviews are very important information resources on e-commerce websites
and significantly influence consumers' purchase decisions. Driven by interests, however …
and significantly influence consumers' purchase decisions. Driven by interests, however …
Detecting group shilling attacks in online recommender systems based on bisecting k-means clustering
F Zhang, S Wang - IEEE Transactions on computational social …, 2020 - ieeexplore.ieee.org
Existing shilling attack detection approaches focus mainly on identifying individual attackers
in online recommender systems and rarely address the detection of group shilling attacks in …
in online recommender systems and rarely address the detection of group shilling attacks in …
Detecting collusive spammers with heterogeneous graph attention network
F Zhang, J Wu, P Zhang, R Ma, H Yu - Information Processing & …, 2023 - Elsevier
Detecting collusive spammers who collaboratively post fake reviews is extremely important
to guarantee the reliability of review information on e-commerce platforms. In this research …
to guarantee the reliability of review information on e-commerce platforms. In this research …
Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems
F Zhang, Y Qu, Y Xu, S Wang - Knowledge-Based Systems, 2020 - Elsevier
Over the past decade, many approaches have been presented to detect shilling attacks in
collaborative recommender systems. However, these approaches focus mainly on detecting …
collaborative recommender systems. However, these approaches focus mainly on detecting …
Detecting review spammer groups based on generative adversarial networks
F Zhang, S Yuan, P Zhang, J Chao, H Yu - Information Sciences, 2022 - Elsevier
The detection of spammer groups has recently gained more attention. However, the existing
spammer group detection approaches rely on manual feature engineering to design spam …
spammer group detection approaches rely on manual feature engineering to design spam …
Detecting collusive spammers on e-commerce websites based on reinforcement learning and adversarial autoencoder
The collusive spamming behavior on e-commerce websites seriously affects the purchase
decisions of consumers and disrupts the fair competition order among merchants. To …
decisions of consumers and disrupts the fair competition order among merchants. To …
Network Embedding‐Based Approach for Detecting Collusive Spamming Groups on E‐Commerce Platforms
J Chao, C Zhao, F Zhang - Security and communication …, 2022 - Wiley Online Library
Information security is one of the key issues in e‐commerce Internet of Things (IoT) platform
research. The collusive spamming groups on e‐commerce platforms can write a large …
research. The collusive spamming groups on e‐commerce platforms can write a large …
Detecting group shilling attacks in recommender systems based on maximum dense subtensor mining
H Yu, H Zheng, Y Xu, R Ma, D Gao… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Existing group shilling attack detection methods mainly depend on human feature
engineering to extract group attack behavior features, which requires a high knowledge cost …
engineering to extract group attack behavior features, which requires a high knowledge cost …
[PDF][PDF] 基于贝叶斯模型的微博网络水军识别算法研究
张艳梅, 黄莹莹, 甘世杰, 丁熠… - Journal on …, 2017 - 221.179.172.81
为了能够有效地识别水军, 在以往相关研究基础上, 设置粉丝关注比, 平均发布微博数,
互相关注数, 综合质量评价, 收藏数和阳光信用这6 个特征属性来设计微博水军识别分类器 …
互相关注数, 综合质量评价, 收藏数和阳光信用这6 个特征属性来设计微博水军识别分类器 …
Group attack detection in recommender systems based on triangle dense subgraph mining
H Yu, S Yuan, Y Xu, R Ma, D Gao… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Aiming at group shilling attacks in recommender systems, a shilling group detection
approach based on triangle dense subgraph mining is proposed. First, the user relation …
approach based on triangle dense subgraph mining is proposed. First, the user relation …