Robust Detection of Adaptive Spammers by Nash Reinforcement Learning
暂无分享,去创建一个
Philip S. Yu | Sihong Xie | Guixiang Ma | Yingtong Dou | Sihong Xie | Guixiang Ma | Yi Dou
[1] Georgios Zervas,et al. Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015, Manag. Sci..
[2] Yiyu Yao,et al. Cost-sensitive three-way email spam filtering , 2013, Journal of Intelligent Information Systems.
[3] Philip S. Yu,et al. Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[4] Leman Akoglu,et al. Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.
[5] Yizheng Chen,et al. Practical Attacks Against Graph-based Clustering , 2017, CCS.
[6] Philip S. Yu,et al. Securing Behavior-based Opinion Spam Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[7] Bernhard Koerber,et al. IT works , 2006, LOG IN.
[8] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[9] James Caverlee,et al. Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures , 2019, CIKM.
[10] Bo Li,et al. Secure Network Release with Link Privacy , 2020, ArXiv.
[11] Wei Chen,et al. The influence of user-generated content on traveler behavior: An empirical investigation on the effects of e-word-of-mouth to hotel online bookings , 2011, Comput. Hum. Behav..
[12] George Valkanas,et al. The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry , 2016, Inf. Syst. Res..
[13] Binghui Wang,et al. GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs , 2017, 2017 IEEE International Conference on Data Mining (ICDM).
[14] Pushmeet Kohli,et al. Adversarial Risk and the Dangers of Evaluating Against Weak Attacks , 2018, ICML.
[15] Binghui Wang,et al. Attacking Graph-based Classification via Manipulating the Graph Structure , 2019, CCS.
[16] Michael Luca,et al. Aggregation of Consumer Ratings: An Application to Yelp.com , 2012 .
[17] Ben Y. Zhao,et al. Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.
[18] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[19] Sébastien Bubeck,et al. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..
[20] Udi Weinsberg,et al. Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks , 2020, WWW.
[21] Christos Faloutsos,et al. Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.
[22] Eduardo F. Morales,et al. An Introduction to Reinforcement Learning , 2011 .
[23] Anna Cinzia Squicciarini,et al. Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach , 2018, WSDM.
[24] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[25] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[26] Michael Luca. Reviews, Reputation, and Revenue: The Case of Yelp.Com , 2016 .
[27] Danai Koutra,et al. Linearized and Single-Pass Belief Propagation , 2014, Proc. VLDB Endow..
[28] Michael P. Wellman,et al. Nash Q-Learning for General-Sum Stochastic Games , 2003, J. Mach. Learn. Res..
[29] Bryan Hooi,et al. FlowScope: Spotting Money Laundering Based on Graphs , 2020, AAAI.
[30] Christos Faloutsos,et al. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.
[31] Jun Zhao,et al. Handling Cold-Start Problem in Review Spam Detection by Jointly Embedding Texts and Behaviors , 2017, ACL.
[32] Philip S. Yu,et al. Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection , 2020, SIGIR.
[33] Christos Faloutsos,et al. REV2: Fraudulent User Prediction in Rating Platforms , 2018, WSDM.
[34] Xiaohui Liang,et al. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks , 2017, NDSS.
[35] Arjun Mukherjee,et al. What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.
[36] James Caverlee,et al. TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures , 2019, ICWSM.
[37] Anindya Ghose,et al. Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..
[38] Michael I. Jordan,et al. Loopy Belief Propagation for Approximate Inference: An Empirical Study , 1999, UAI.
[39] Philip S. Yu,et al. Review spam detection via temporal pattern discovery , 2012, KDD.
[40] Hao Zhu,et al. EnsemFDet: An Ensemble Approach to Fraud Detection based on Bipartite Graph , 2019, ArXiv.
[41] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[42] Bogdan Carbunar,et al. The Art and Craft of Fraudulent App Promotion in Google Play , 2019, CCS.
[43] Philip S. Yu,et al. Adversarial Attack and Defense on Graph Data: A Survey , 2018 .
[44] Charles Elkan,et al. The Foundations of Cost-Sensitive Learning , 2001, IJCAI.
[45] Gordon Lin,et al. Discovering Yelp Elites : Reifying Yelp Elite Selection Criterion , 2015 .