Social Fraud Detection Review: Methods, Challenges and Analysis
- URL: http://arxiv.org/abs/2111.05645v1
- Date: Wed, 10 Nov 2021 11:25:20 GMT
- Title: Social Fraud Detection Review: Methods, Challenges and Analysis
- Authors: Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun
- Abstract summary: Social reviews have dominated the web and become a plausible source of product information.
Business make use of social information to spread fake information using a single user, groups of users, or a bot trained to generate fraudulent content.
Many studies proposed approaches based on user behaviors and review text to address the challenges of fraud detection.
- Score: 42.30892608083864
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Social reviews have dominated the web and become a plausible source of
product information. People and businesses use such information for
decision-making. Businesses also make use of social information to spread fake
information using a single user, groups of users, or a bot trained to generate
fraudulent content. Many studies proposed approaches based on user behaviors
and review text to address the challenges of fraud detection. To provide an
exhaustive literature review, social fraud detection is reviewed using a
framework that considers three key components: the review itself, the user who
carries out the review, and the item being reviewed. As features are extracted
for the component representation, a feature-wise review is provided based on
behavioral, text-based features and their combination. With this framework, a
comprehensive overview of approaches is presented including supervised,
semi-supervised, and unsupervised learning. The supervised approaches for fraud
detection are introduced and categorized into two sub-categories; classical,
and deep learning. The lack of labeled datasets is explained and potential
solutions are suggested. To help new researchers in the area develop a better
understanding, a topic analysis and an overview of future directions is
provided in each step of the proposed systematic framework.
Related papers
- SyROCCo: Enhancing Systematic Reviews using Machine Learning [6.805429133535976]
This paper explores the use of machine learning techniques to help navigate the systematic review process.
The application of ML techniques to subsequent stages of a review, such as data extraction and evidence mapping, is in its infancy.
arXiv Detail & Related papers (2024-06-24T11:04:43Z) - Rethinking the Evaluation of Dialogue Systems: Effects of User Feedback on Crowdworkers and LLMs [57.16442740983528]
In ad-hoc retrieval, evaluation relies heavily on user actions, including implicit feedback.
The role of user feedback in annotators' assessment of turns in a conversational perception has been little studied.
We focus on how the evaluation of task-oriented dialogue systems ( TDSs) is affected by considering user feedback, explicit or implicit, as provided through the follow-up utterance of a turn being evaluated.
arXiv Detail & Related papers (2024-04-19T16:45:50Z) - Beyond Opinion Mining: Summarizing Opinions of Customer Reviews [20.534293365703427]
This three-hour tutorial will provide a comprehensive overview over major advances in opinion summarization.
The listeners will be well-equipped with the knowledge that is both useful for research and practical applications.
arXiv Detail & Related papers (2022-06-03T12:43:40Z) - A Comprehensive Overview of Recommender System and Sentiment Analysis [1.370633147306388]
This paper gives a comprehensive overview to help researchers who aim to work with recommender system and sentiment analysis.
It includes a background of the recommender system concept, including phases, approaches, and performance metrics used in recommender systems.
Then, it discusses the sentiment analysis concept and highlights the main points in the sentiment analysis, including level, approaches, and focuses on aspect-based sentiment analysis.
arXiv Detail & Related papers (2021-09-18T01:08:41Z) - SIFN: A Sentiment-aware Interactive Fusion Network for Review-based Item
Recommendation [48.1799451277808]
We propose a Sentiment-aware Interactive Fusion Network (SIFN) for review-based item recommendation.
We first encode user/item reviews via BERT and propose a light-weighted sentiment learner to extract semantic features of each review.
Then, we propose a sentiment prediction task that guides the sentiment learner to extract sentiment-aware features via explicit sentiment labels.
arXiv Detail & Related papers (2021-08-18T08:04:38Z) - DFraud3- Multi-Component Fraud Detection freeof Cold-start [50.779498955162644]
The Cold-start is a significant problem referring to the failure of a detection system to recognize the authenticity of a new user.
In this paper, we model a review system as a Heterogeneous InformationNetwork (HIN) which enables a unique representation to every component.
HIN with graph induction helps to address the camouflage issue (fraudsterswith genuine reviews) which has shown to be more severe when it is coupled with cold-start, i.e., new fraudsters with genuine first reviews.
arXiv Detail & Related papers (2020-06-10T08:20:13Z) - A Unified Dual-view Model for Review Summarization and Sentiment
Classification with Inconsistency Loss [51.448615489097236]
Acquiring accurate summarization and sentiment from user reviews is an essential component of modern e-commerce platforms.
We propose a novel dual-view model that jointly improves the performance of these two tasks.
Experiment results on four real-world datasets from different domains demonstrate the effectiveness of our model.
arXiv Detail & Related papers (2020-06-02T13:34:11Z) - Topic Detection and Summarization of User Reviews [6.779855791259679]
We propose an effective new summarization method by analyzing both reviews and summaries.
A new dataset comprising product reviews and summaries about 1028 products are collected from Amazon and CNET.
arXiv Detail & Related papers (2020-05-30T02:19:08Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.