2018
DOI: 10.1371/journal.pone.0198884
|View full text |Cite
|
Sign up to set email alerts
|

Detecting opinion spams through supervised boosting approach

Abstract: Product reviews are the individual’s opinions, judgement or belief about a certain product or service provided by certain companies. Such reviews serve as guides for these companies to plan and monitor their business ventures in terms of increasing productivity or enhancing their product/service qualities. Product reviews can also increase business profits by convincing future customers about the products which they have interest in. In the mobile application marketplace such as Google Playstore, reviews and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 47 publications
(30 reference statements)
0
13
0
Order By: Relevance
“…Previous works show that it is not practical to implement spam review detection methods without training [83]. The learner's accuracy is much higher when trained on real-world datasets [84]. Table 15 shows that most of the existing studies used precision, f-measure, accuracy and ranked normalized discounted cumulative gain parameters to evaluate the performance of spam review detection methods.…”
Section: Discussionmentioning
confidence: 99%
“…Previous works show that it is not practical to implement spam review detection methods without training [83]. The learner's accuracy is much higher when trained on real-world datasets [84]. Table 15 shows that most of the existing studies used precision, f-measure, accuracy and ranked normalized discounted cumulative gain parameters to evaluate the performance of spam review detection methods.…”
Section: Discussionmentioning
confidence: 99%
“…It is a popular machine learning software program developed in Java at Waikato University, New Zealand [23,24]. WEKA supports a number of standard data mining tasks, including data pre-processing, clustering, classification, regression, visualization and selection of features [4,19,25]. Feature selection methods were used to identify and remove irrelevant and redundant attributes from data that do not contribute to the accuracy of a predictive model [26].The features of the phishing website were first trained and then classified by using significant features.…”
Section: Machine Learning Approachmentioning
confidence: 99%
“…The user will get fraud by entering their confidential information such as password, bank details and account credentials into the fake websites [1][2][3]. The criminal will then use the information provided to access the account to buy stuff, transfer money, or other damaging activities [3,4]. For example, in 2016 the phishing attack up to 65% worldwide which costs about $1.6 million [5].…”
Section: Introductionmentioning
confidence: 99%
“…Different morphological usage also hindered the adoption of English text processing techniques into Malay [2]. The various accents from different parts of Malaysia along with the informal abbreviation also contributed to the lack of congruency in the language (Hazim et al [8]). [3]sought to create a new electronic Malay computational lexicon to facilitate Malay morphological research and the updating of existing Malay dictionary.…”
Section: Morphological and Lexical Analysis General Challengesmentioning
confidence: 99%
“…The work reported in [8] explored the modelling of supervised boosting approaches along with statistical-based features to recognize opinion spams in the mobile application marketplace. The authors utilized the readily available Yelp's hotel review as English dataset while compiled the reviews of randomly chosen Malaysian applications from Google Playstore.…”
Section: Spam Review Detectionmentioning
confidence: 99%