2010 IEEE Second International Conference on Social Computing 2010
DOI: 10.1109/socialcom.2010.81
|View full text |Cite
|
Sign up to set email alerts
|

Using Stereotypes to Identify Risky Transactions in Internet Auctions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…This is akin to the clustering approach that Liu et al . (2009, 2010, 2013) proposed in StereoTrust, where interactions are separated into groups defined by observed traits. The interactions in groups that match the current trustee traits are then aggregated to produce an overall trust value.…”
Section: Research Landscapementioning
confidence: 99%
See 1 more Smart Citation
“…This is akin to the clustering approach that Liu et al . (2009, 2010, 2013) proposed in StereoTrust, where interactions are separated into groups defined by observed traits. The interactions in groups that match the current trustee traits are then aggregated to produce an overall trust value.…”
Section: Research Landscapementioning
confidence: 99%
“…As with interaction context, one method for considering stereotype information is to use ratings from historical interaction records where similar traits were observed. This is akin to the clustering approach that Liu et al (2009Liu et al ( , 2010Liu et al ( , 2013 proposed in StereoTrust, where interactions are separated into Reputation assessment groups defined by observed traits. The interactions in groups that match the current trustee traits are then aggregated to produce an overall trust value.…”
Section: Representation Of Trust Informationmentioning
confidence: 99%
“…Similarly to our Stereotype-Sharing Overlay Network, in their work, new trustors can request stereotypes from the experienced ones, and then combine these stereotypes with the target agent's reputation (if any) using subjective logic [15]. Although similar, our approach has several advantages: (1) as a basic trust model, StereoTrust uses the (well adapted) beta distribution to derive stereotypes and trust, thus the resulting decision is easy to be interpreted; (2) The work [7] shares agents' local stereotypes heuristically (e.g., no discussion on how stereotype providers are selected) while StereoTrust offers a more sophisticated sharing mechanism by maintaining a dedicated overlay network for exchanging, combining, and updating stereotypes; (3) StereoTrust is applicable in practice as demonstrated in real-world dataset (Epinions.com) based evaluation (see Section 8) presented in this paper, as well as in other diverse applications and settings in which we have applied stereotype to derive trust [22,25].…”
Section: Related Workmentioning
confidence: 99%
“…A buyer can then use its own past transactions (with other sellers) to form stereotypes according to the identified attributes. Both StereoTrust and MetaTrust are used to derive stereotypes based trust [129].…”
Section: Chapter 6 Identifying Risky Transactions In Internet Auctionsmentioning
confidence: 99%
“…long). Inspired by behavior science and psychology, as well as leveraging on observations from existing literature [148,129], we study four potentially useful features, which will be discussed and verified in the next subsections. Note that there are possibly other useful features which can further improve the results, or replace some of the chosen ones.…”
Section: Featuresmentioning
confidence: 99%