ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761650
|View full text |Cite
|
Sign up to set email alerts
|

GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 16 publications
0
22
0
Order By: Relevance
“…This model can identify candidate spammer groups. Xu et al (2019) proposed a three-phase method called Group Spam Clique Percolation Method (GSCPM) which is based on the Clique Percolation Method (CPM). It is a graph-based method, which models review data as a reviewer graph then breaks this reviewer graph into k-clique clusters using CPM.…”
Section: Spammer Group Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This model can identify candidate spammer groups. Xu et al (2019) proposed a three-phase method called Group Spam Clique Percolation Method (GSCPM) which is based on the Clique Percolation Method (CPM). It is a graph-based method, which models review data as a reviewer graph then breaks this reviewer graph into k-clique clusters using CPM.…”
Section: Spammer Group Detection Methodsmentioning
confidence: 99%
“…Considering the existing work on spam group detection, most of the related studies (Mukherjee, Liu & Glance, 2012;Allahbakhsh et al, 2013;Zhang, Wu & Cao, 2017;Zhou, Liu & Zhang, 2018) have used spammer behavioral features to detect spam groups. On the other hand, some researchers used graph-based techniques to identify suspicious spammer groups with a little focus on spammer behavioral features (Rayana & Akoglu, 2015;Li et al, 2017;Kaghazgaran, Caverlee & Squicciarini, 2018;Zhang et al, 2018;Xu & Zhang, 2016;Xu et al, 2019;Hu et al, 2019). This research aims to develop a framework that will use both behavioral and graph features.…”
Section: Spammer Group Detection Methodsmentioning
confidence: 99%
“…[9]. Recent years have seen an increased research effort in detecting fraudster groups [10], [11], [12], [13]. It is widely accepted that individual fraudsters can cause significant damages to businesses, fraudster groups may be even more damaging because of their coordinated and considerate volume of fraud reviews that they can collectively produce.…”
Section: Introductionmentioning
confidence: 99%
“…by two categories: Frequent Itemset Mining (FIM) based [10], [13] approaches or graph-based [11], [12] approaches. An FIM-based algorithm generally follows a two-step process: first, candidate groups are determined based on the same set of items (itemset) reviewed by the reviewers.…”
Section: Introductionmentioning
confidence: 99%
“…Jia et al [4] employed the LDA model to extract language features and classified spam comments into false reviews and real comments. Xu et al [5] constructed suspicious commenter graphs based on user behavior characteristics, and detected spam posting groups based on CPM in a completely unsupervised manner. Li et al [6] proposed a new feature extraction method based on the characteristics of spammers and spam comments, and the gradient enhancement tree algorithm was used to construct the spam review classifier.…”
Section: Introductionmentioning
confidence: 99%