SlideShare uma empresa Scribd logo
1 de 21
A Presentation on
“ Fake User Detection”
SUBMITTED BY
Mahendra Nath Dwivedi
Roll No:- 502202216004
Enroll No.:- AA/3522
Department of Computer Science & Engineering
Central college of engineering and management
GUIDED BY
Mr. Abhishek Badholia
DEPT. OF COMPUTER SCIENCE &
ENGINEERING
CONTENT
• INTRODUCTION
- INTRODUCTION OF PROJECT
- REVIEW ANALYSIS OF AMAZON.COM
- BEHAVIOR FEATURES OF SPAMMERS
• LITERATURE REVIEW
• PROBLEM IDENTIFICATION
• METHODOLOGY
• RESULT AND FUTURE SCOPE
• REFERENCES
With the development of the Internet, people are more likely to express their
views and opinions on the Web. They can write reviews or other opinions on
E-Commerce sites, forums, and blogs. They are also used by product
manufacturers to identify problems of their products and to find competitive
intelligence information about their competitors. Unfortunately, this
importance of reviews also gives good incentive for spam, which contains
false positive or malicious negative opinions
INTRODUCTION
Table shows some selected mobile phone reviews from the Amazon website. For
the mobile phone product's topic, reviews 1 and 2 are relevant to the topic, and
review 1 has the highest relevancy than other reviews. But, it is hard to decide the
relevancy between review 3 and the topic. Besides, reviews 4 and 5 are part of
plagiarism of review 3, and review 6 is an advertisement. Only two of six reviews are
relevant to the mobile phone product's topic. Fake reviews can not only increase
decision's making cost, but also affect decision accuracy making.
Review(Comment) analysis of website.
1) Star User
2) Deviation Rate
3) Bias Rate
4) Review Similarity rate
5) Review Relevancy Rate
6) Content-Length
7) Illustration
8) Burst review
BEHAVIOR FEATURES OF SPAMMERS
Types of Spammers
Types of Review Spams
Basically three types of review spams exist[6]. These are:
Type 1 (Untruthful Review Spams): Fictitious positive reviews are rewarded to
products in order to promote them and also unreasonable negative reviews
are given to the competing products to harm their reputations among the
consumers.This is how untruthful reviews mislead the consumers into
believing their spam reviews.
Type 2 (Reviews with brand mentions): These spams have only brands as their prime
focus. They comment about the manufacturer or seller or the brand name
alone.These reviews are biased and can easily b figured out as they do not
talk about the product and rather only mention the brand names.
Type 3 (Non-reviews): These reviews are either junk, as in, have no relation with the
product or are purely used for advertisement purposes. They have these
two forms:
i. marketing purposes, and
ii. irrelevant text or reviews having random write-ups.
Rule Based Classification Of Spammers
METHODOLOGY
In this section we will discuss the proposed framework in detail. The
proposed spam detection and blocking framework consist of various
modules.
•Feature Discretization
•Negative Set Extraction
•Expected Maximization Algorithm
•Blocking of Users
.
Rating Deviation from Mean Agreement
Filter Mean Target Difference
Group Filter Mean Variance
Target Model Focus
Algorithm: Negative Set Extraction
Input: P → Positive Set of Spammers
U → unlabeled set of users
Output: RN → Set of negative set.
RN <- N initially
RN_Extract (P, U)
For each feature do
Calculate
End for
For evaluate each feature (decreasing order) do
Remove instances consists of from
If Size(RN) is close enough to P then
Return RN
End if
End for
End
Algorithm for Negative set extraction is presented below.
BLOCK DIAGRAM OF GENERATING A LIST OF SPAMMERS
Literature Riews
To detect spam reviews, some scholars have done some related research by using
the techniques of data mining and natural language processing.This works are
performed by the several other researcher by work of them my research takes place
1. The paper entiteled “FAKE REVIEW DETECTION FROM A PRODUCT REVIEW USING
MODIFIED METHOD OF ITERATIVE COMPUTATION FRAMEWORK “ was published in
DP Sciences.( DOI: 10.1051/conf/ matec5803003) by Eka Dyar Wahyuni and Arif
Djunaidy.
They worked on The honesty value of a review will be measured by utilizing the text
mining and opinion mining techniques. The result from the experiment shows that
the proposed system has a better accuracy compared with the result from iterative
computation framework (ICF) method and try to identified the fake reviews.The
drawback of this method is, some process need to be optimized, so it can detect a
fake review in a short amount of time.
REVIEW OF PAPERS:-
2. The paper entitled “Spammers Detection from Product Reviews: A Hybrid Model”
was published in 1550-4786/15 $31.00 © 2015 IEEEDOI 10.1109/ICDM.2015.73.
They worked on This paper focuses on detecting hidden spam users based on product
reviews. In the literature, there have been tremendous studies suggesting diversified
methods for spammer detection. This paper proposes a principled hybrid learning
model called hPSD to combine both user features and user-product relations for
spammer detection. Three essential components of hPSD, including feature
discretization, reliable negative set extraction and hybrid learning scheme, are
elaborated respectively.
3. The paper entitled “Mining the Peanut Gallery: Opinion Extraction and Semantic
Classification Of Product Reviews” was published by Kushal Dave NEC Laboratories
America
They worked on Opinion mining tool would process a set of search results for a given
item, generating a list of product attributes (quality ,features, etc.) and aggregating
opinions about each of them (poor , mixed,good).We begin by identifying the unique
properties of this problem and develop a method for automatically distinguishing
between positive and negative reviews. a number of issues that make this problem
difficult in Rating inconsistency, Ambivalence and comparison , Sparse data , Skewed
distribution
PROBLEM IDENTIFICATION
The main problem of reviews by users lies in the fact to identify the spam reviews
in between genuine reviews. The reviews posted by any users can be spam or not a
spam. Consider an example of person Alice. Alice constantly posting review of some
published “X”. The publisher published many books. Alice simply post good content
and genuine review to the publisher “X”. He purchase most of the books of “X” and
provide review on that particular book. So by looking at this posts, the algorithm can
conclude that the user Alice is genuine user so as its comments too.
But in fact, the user Alice is hired to posts review by publisher “X”. HE gave
good and 5 star rating to publisher “X” books. This might be the problem in
identification of users who looks to be genuine but not actually is.
Fig. 3.1. Alice Behaviour of Reviewing Books
Percentage of Users Being Spammer and Ham
Lastly, the users are classified into spam and non-spam categories. The
probability of categorizing into spam and non-spam category are presented in
In our dataset, the probability of spam users are 49 % and non-spam users
are 51%. The dataset is flooded with the spam users. The user need to be blocked
so that they cannot further effect the review and comments.
Fig.. Shows the Probability of Spammer and Non-Spammers
Users Blocking
After identifying of the spam users, they are blocked. The
blocking stage is depicted in fig.
The result produced by EM(Expectation Maximization) algorithm with 6 features are
compared with the base paper having more number of features. Fig. Shows the
comparison between proposed and existing approach.
Future scope of work
In this project, majority of the work has been done with respect to spammer
detection technique. The major drawback of this work is working with only one
dataset. The future scope might be working with multiple dataset to analyse the
attacker of other websites too.
References
Nitin Jindal and Bing Liu, “Analyzing and Detecting Review Spam”, Seventh IEEE International Conference on Data
Mining 2007.
SNEHAL DIXIT & A.J.AGRAWAL, “REVIEW SPAM DETECTION”, International Journal of Computational
Linguistics and Natural Language Processing Vol 2 Issue 6 June 2013 ISSN2279 –0756
Gera T., Thakur D. and Singh J. 2015. BILD Testing for Spotting Out Suspicious Reviews, Suspicious Reviewers and
Group Spammers, International Conference on Communication Systems and Network Technologies(CSNT.2015.138).
Liang D., Liu X. and Shen H. 2014. Detecting Spam Reviewers by Combing Reviewer Feature and Relationship,
International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS).
Mukherjee A., Kumar A., Liu B., Wang J. and Ghosh R. 2013. Spotting Opinion Spammers using Behavioral Footprints.
Mukherjee A., Glance N. and Liu B. 2012 . Spotting Fake Reviewer Groups in Consumer Reviews.
Wang G., Xie S., Liu B. and Philip S. Yu 2011. Review Graph based Online Store Review Spammer Detection, IEEE
International Conference on Data Mining(ICDM) .
Zhang X., Xiong G., Zhu F. and Dong X. 2016. A Method of SMS Spam Filtering Based on AdaBoost Algorithm, World
Congress on Intelligent Control and Automation (WCICA).

Mais conteúdo relacionado

Semelhante a Mahendra nath

Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring Systemijtsrd
 
IRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review DetectionIRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review DetectionIRJET Journal
 
Fraud Detection in Online Reviews using Machine Learning Techniques
Fraud Detection in Online Reviews using Machine Learning TechniquesFraud Detection in Online Reviews using Machine Learning Techniques
Fraud Detection in Online Reviews using Machine Learning Techniquesijceronline
 
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET Journal
 
VTU final year project report Main
VTU final year project report MainVTU final year project report Main
VTU final year project report Mainathiathi3
 
Shiva ppt.pptx
Shiva ppt.pptxShiva ppt.pptx
Shiva ppt.pptxbcvishal50
 
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...Vivrfvg
 
FAKE PRODUCT PAPER PRESENTATION.pptx
FAKE PRODUCT PAPER PRESENTATION.pptxFAKE PRODUCT PAPER PRESENTATION.pptx
FAKE PRODUCT PAPER PRESENTATION.pptxNareshKumar675331
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsIRJET Journal
 
Extracting Business Intelligence from Online Product Reviews
Extracting Business Intelligence from Online Product Reviews  Extracting Business Intelligence from Online Product Reviews
Extracting Business Intelligence from Online Product Reviews ijsc
 
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWS
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWSEXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWS
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWSijdms
 
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET Journal
 
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET Journal
 
IRJET- A New Approach to Product Recommendation Systems
IRJET-  	  A New Approach to Product Recommendation SystemsIRJET-  	  A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
 
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...IRJET Journal
 
Opinion Mining and Opinion Spam Detection
Opinion Mining and Opinion Spam DetectionOpinion Mining and Opinion Spam Detection
Opinion Mining and Opinion Spam DetectionIRJET Journal
 
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...ijtsrd
 
IRJET- Hybrid Book Recommendation System
IRJET- Hybrid Book Recommendation SystemIRJET- Hybrid Book Recommendation System
IRJET- Hybrid Book Recommendation SystemIRJET Journal
 
“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”IRJET Journal
 

Semelhante a Mahendra nath (20)

Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring System
 
IRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review DetectionIRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review Detection
 
Fraud Detection in Online Reviews using Machine Learning Techniques
Fraud Detection in Online Reviews using Machine Learning TechniquesFraud Detection in Online Reviews using Machine Learning Techniques
Fraud Detection in Online Reviews using Machine Learning Techniques
 
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
 
VTU final year project report Main
VTU final year project report MainVTU final year project report Main
VTU final year project report Main
 
Shiva ppt.pptx
Shiva ppt.pptxShiva ppt.pptx
Shiva ppt.pptx
 
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...
Shiva pptvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...
 
FAKE PRODUCT PAPER PRESENTATION.pptx
FAKE PRODUCT PAPER PRESENTATION.pptxFAKE PRODUCT PAPER PRESENTATION.pptx
FAKE PRODUCT PAPER PRESENTATION.pptx
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
 
Extracting Business Intelligence from Online Product Reviews
Extracting Business Intelligence from Online Product Reviews  Extracting Business Intelligence from Online Product Reviews
Extracting Business Intelligence from Online Product Reviews
 
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWS
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWSEXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWS
EXTRACTING BUSINESS INTELLIGENCE FROM ONLINE PRODUCT REVIEWS
 
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
 
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
 
IRJET- A New Approach to Product Recommendation Systems
IRJET-  	  A New Approach to Product Recommendation SystemsIRJET-  	  A New Approach to Product Recommendation Systems
IRJET- A New Approach to Product Recommendation Systems
 
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...
IRJET - Characterizing Products’ Outcome by Sentiment Analysis and Predicting...
 
Opinion Mining and Opinion Spam Detection
Opinion Mining and Opinion Spam DetectionOpinion Mining and Opinion Spam Detection
Opinion Mining and Opinion Spam Detection
 
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
 
IRJET- Hybrid Book Recommendation System
IRJET- Hybrid Book Recommendation SystemIRJET- Hybrid Book Recommendation System
IRJET- Hybrid Book Recommendation System
 
“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”
 
Google: Spotting Fake Reviewer Groups
Google: Spotting Fake Reviewer GroupsGoogle: Spotting Fake Reviewer Groups
Google: Spotting Fake Reviewer Groups
 

Último

8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Último (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

Mahendra nath

  • 1. A Presentation on “ Fake User Detection” SUBMITTED BY Mahendra Nath Dwivedi Roll No:- 502202216004 Enroll No.:- AA/3522 Department of Computer Science & Engineering Central college of engineering and management GUIDED BY Mr. Abhishek Badholia DEPT. OF COMPUTER SCIENCE & ENGINEERING
  • 2. CONTENT • INTRODUCTION - INTRODUCTION OF PROJECT - REVIEW ANALYSIS OF AMAZON.COM - BEHAVIOR FEATURES OF SPAMMERS • LITERATURE REVIEW • PROBLEM IDENTIFICATION • METHODOLOGY • RESULT AND FUTURE SCOPE • REFERENCES
  • 3. With the development of the Internet, people are more likely to express their views and opinions on the Web. They can write reviews or other opinions on E-Commerce sites, forums, and blogs. They are also used by product manufacturers to identify problems of their products and to find competitive intelligence information about their competitors. Unfortunately, this importance of reviews also gives good incentive for spam, which contains false positive or malicious negative opinions INTRODUCTION
  • 4. Table shows some selected mobile phone reviews from the Amazon website. For the mobile phone product's topic, reviews 1 and 2 are relevant to the topic, and review 1 has the highest relevancy than other reviews. But, it is hard to decide the relevancy between review 3 and the topic. Besides, reviews 4 and 5 are part of plagiarism of review 3, and review 6 is an advertisement. Only two of six reviews are relevant to the mobile phone product's topic. Fake reviews can not only increase decision's making cost, but also affect decision accuracy making. Review(Comment) analysis of website.
  • 5.
  • 6. 1) Star User 2) Deviation Rate 3) Bias Rate 4) Review Similarity rate 5) Review Relevancy Rate 6) Content-Length 7) Illustration 8) Burst review BEHAVIOR FEATURES OF SPAMMERS
  • 8. Types of Review Spams Basically three types of review spams exist[6]. These are: Type 1 (Untruthful Review Spams): Fictitious positive reviews are rewarded to products in order to promote them and also unreasonable negative reviews are given to the competing products to harm their reputations among the consumers.This is how untruthful reviews mislead the consumers into believing their spam reviews. Type 2 (Reviews with brand mentions): These spams have only brands as their prime focus. They comment about the manufacturer or seller or the brand name alone.These reviews are biased and can easily b figured out as they do not talk about the product and rather only mention the brand names. Type 3 (Non-reviews): These reviews are either junk, as in, have no relation with the product or are purely used for advertisement purposes. They have these two forms: i. marketing purposes, and ii. irrelevant text or reviews having random write-ups.
  • 10. METHODOLOGY In this section we will discuss the proposed framework in detail. The proposed spam detection and blocking framework consist of various modules. •Feature Discretization •Negative Set Extraction •Expected Maximization Algorithm •Blocking of Users .
  • 11. Rating Deviation from Mean Agreement Filter Mean Target Difference Group Filter Mean Variance Target Model Focus
  • 12. Algorithm: Negative Set Extraction Input: P → Positive Set of Spammers U → unlabeled set of users Output: RN → Set of negative set. RN <- N initially RN_Extract (P, U) For each feature do Calculate End for For evaluate each feature (decreasing order) do Remove instances consists of from If Size(RN) is close enough to P then Return RN End if End for End Algorithm for Negative set extraction is presented below.
  • 13. BLOCK DIAGRAM OF GENERATING A LIST OF SPAMMERS
  • 14. Literature Riews To detect spam reviews, some scholars have done some related research by using the techniques of data mining and natural language processing.This works are performed by the several other researcher by work of them my research takes place 1. The paper entiteled “FAKE REVIEW DETECTION FROM A PRODUCT REVIEW USING MODIFIED METHOD OF ITERATIVE COMPUTATION FRAMEWORK “ was published in DP Sciences.( DOI: 10.1051/conf/ matec5803003) by Eka Dyar Wahyuni and Arif Djunaidy. They worked on The honesty value of a review will be measured by utilizing the text mining and opinion mining techniques. The result from the experiment shows that the proposed system has a better accuracy compared with the result from iterative computation framework (ICF) method and try to identified the fake reviews.The drawback of this method is, some process need to be optimized, so it can detect a fake review in a short amount of time. REVIEW OF PAPERS:-
  • 15. 2. The paper entitled “Spammers Detection from Product Reviews: A Hybrid Model” was published in 1550-4786/15 $31.00 © 2015 IEEEDOI 10.1109/ICDM.2015.73. They worked on This paper focuses on detecting hidden spam users based on product reviews. In the literature, there have been tremendous studies suggesting diversified methods for spammer detection. This paper proposes a principled hybrid learning model called hPSD to combine both user features and user-product relations for spammer detection. Three essential components of hPSD, including feature discretization, reliable negative set extraction and hybrid learning scheme, are elaborated respectively. 3. The paper entitled “Mining the Peanut Gallery: Opinion Extraction and Semantic Classification Of Product Reviews” was published by Kushal Dave NEC Laboratories America They worked on Opinion mining tool would process a set of search results for a given item, generating a list of product attributes (quality ,features, etc.) and aggregating opinions about each of them (poor , mixed,good).We begin by identifying the unique properties of this problem and develop a method for automatically distinguishing between positive and negative reviews. a number of issues that make this problem difficult in Rating inconsistency, Ambivalence and comparison , Sparse data , Skewed distribution
  • 16. PROBLEM IDENTIFICATION The main problem of reviews by users lies in the fact to identify the spam reviews in between genuine reviews. The reviews posted by any users can be spam or not a spam. Consider an example of person Alice. Alice constantly posting review of some published “X”. The publisher published many books. Alice simply post good content and genuine review to the publisher “X”. He purchase most of the books of “X” and provide review on that particular book. So by looking at this posts, the algorithm can conclude that the user Alice is genuine user so as its comments too. But in fact, the user Alice is hired to posts review by publisher “X”. HE gave good and 5 star rating to publisher “X” books. This might be the problem in identification of users who looks to be genuine but not actually is. Fig. 3.1. Alice Behaviour of Reviewing Books
  • 17. Percentage of Users Being Spammer and Ham Lastly, the users are classified into spam and non-spam categories. The probability of categorizing into spam and non-spam category are presented in In our dataset, the probability of spam users are 49 % and non-spam users are 51%. The dataset is flooded with the spam users. The user need to be blocked so that they cannot further effect the review and comments. Fig.. Shows the Probability of Spammer and Non-Spammers
  • 18. Users Blocking After identifying of the spam users, they are blocked. The blocking stage is depicted in fig.
  • 19. The result produced by EM(Expectation Maximization) algorithm with 6 features are compared with the base paper having more number of features. Fig. Shows the comparison between proposed and existing approach.
  • 20. Future scope of work In this project, majority of the work has been done with respect to spammer detection technique. The major drawback of this work is working with only one dataset. The future scope might be working with multiple dataset to analyse the attacker of other websites too.
  • 21. References Nitin Jindal and Bing Liu, “Analyzing and Detecting Review Spam”, Seventh IEEE International Conference on Data Mining 2007. SNEHAL DIXIT & A.J.AGRAWAL, “REVIEW SPAM DETECTION”, International Journal of Computational Linguistics and Natural Language Processing Vol 2 Issue 6 June 2013 ISSN2279 –0756 Gera T., Thakur D. and Singh J. 2015. BILD Testing for Spotting Out Suspicious Reviews, Suspicious Reviewers and Group Spammers, International Conference on Communication Systems and Network Technologies(CSNT.2015.138). Liang D., Liu X. and Shen H. 2014. Detecting Spam Reviewers by Combing Reviewer Feature and Relationship, International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS). Mukherjee A., Kumar A., Liu B., Wang J. and Ghosh R. 2013. Spotting Opinion Spammers using Behavioral Footprints. Mukherjee A., Glance N. and Liu B. 2012 . Spotting Fake Reviewer Groups in Consumer Reviews. Wang G., Xie S., Liu B. and Philip S. Yu 2011. Review Graph based Online Store Review Spammer Detection, IEEE International Conference on Data Mining(ICDM) . Zhang X., Xiong G., Zhu F. and Dong X. 2016. A Method of SMS Spam Filtering Based on AdaBoost Algorithm, World Congress on Intelligent Control and Automation (WCICA).