- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0002000000000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
Dou, Yingtong (2)
-
Chen, Canyu (1)
-
Ma, Guixiang (1)
-
Shu, Kai (1)
-
Sun, Lichao (1)
-
Wang, Haoran (1)
-
Xie, Sihong (1)
-
Yu, Philip S (1)
-
Yu, Philip S. (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Dou, Yingtong; Ma, Guixiang; Yu, Philip S; Xie, Sihong (, The 26th ACM SIGKDD international conference on knowledge discovery and data mining (KDD'2020))Online reviews provide product evaluations for customers to makedecisions. Unfortunately, the evaluations can be manipulated us-ing fake reviews (“spams”) by professional spammers, who havelearned increasingly insidious and powerful spamming strategiesby adapting to the deployed detectors. Spamming strategies arehard to capture, as they can be varying quickly along time, differentacross spammers and target products, and more critically, remainedunknown in most cases. Furthermore, most existing detectors focuson detection accuracy, which is not well-aligned with the goal ofmaintaining the trustworthiness of product evaluations. To addressthe challenges, we formulate a minimax game where the spammersand spam detectors compete with each other on their practical goalsthat are not solely based on detection accuracy. Nash equilibria ofthe game lead to stable detectors that are agnostic to any mixeddetection strategies. However, the game has no closed-form solu-tion and is not differentiable to admit the typical gradient-basedalgorithms. We turn the game into two dependent Markov Deci-sion Processes (MDPs) to allow efficient stochastic optimizationbased on multi-armed bandit and policy gradient. We experimenton three large review datasets using various state-of-the-art spam-ming and detection strategies and show that the optimization al-gorithm can reliably find an equilibrial detector that can robustlyand effectively prevent spammers with any mixed spamming strate-gies from attaining their practical goal. Our code is available athttps://github.com/YingtongDou/Nash-Detect.more » « less
An official website of the United States government
