Spam Identification In Social Media Based On Reviews

Authors

  • P. Yamuna  Student, Department of Computer Science, S.G.S Arts College, Tirupathi, Andhra Pradesh, India
  • P. Lakshmipathi  Assistant Professor, Department of Computer Science, S.G.S Arts College, Tirupathi, Andhra Pradesh, India

Keywords:

Net Spam, Reviews, Feedback

Abstract

These days, a gigantic a piece of people consider offered content in online networking in their decisions (e.g. surveys and criticism regarding a matter or item). the shot that anyone will leave an audit gives a brilliant opportunity to spammers to record spam surveys in regards to item and administrations for different interests. recognizing these spammers and in this manner the spam substance could be a hotly debated issue of examination and however a generous assortment of studies are done as of late toward this complete, however to date the philosophies put forward still scarcely see spam audits, and none of them demonstrate the significance of each separated element sort. amid this investigation, we tend to propose a totally one of a kind structure, named NetSpam, that uses spam alternatives for demonstrating audit datasets as heterogeneous information systems to outline identification methodology into a grouping disadvantage in such systems. exploitation the significance of spam choices encourage us to get higher prompts terms of different measurements investigated genuine audit datasets from Yelp and Amazon sites. The outcomes demonstrate that NetSpam beats the present routes and among four classes of choices together with audit behavioral, client behavioral, survey phonetic, client etymological, the essential kind of choices performs higher than the contrary classes.

References

  1. J Donfro, A whopping 20 % of yelp reviews are fake. http://www.businessinsider.com/20-percent-of-yelp-reviews-fake-2013-9 Accessed: 2015-07-30.
  2. M Ott, C. Cardie, and J. T. Hancock. Estimating the prevalence of deception in online review communities. In ACM WWW, 2012.
  3. M Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding deceptive opinion spam by any stretch of the imagination.In ACL, 2011.
  4. Ch. Xu and J. Zhang. Combating product review spam campaigns via multiple heterogeneous pairwise features. In SIAM International Conference on Data Mining, 2014.
  5. N Jindal and B. Liu. Opinion spam and analysis. In WSDM, 2008.
  6. F Li, M. Huang, Y. Yang, and X. Zhu. Learning to identify review spam. Proceedings of the 22nd International Joint Conference on Artificial Intelligence; IJCAI, 2011.
  7. G Fei, A. Mukherjee, B. Liu, M. Hsu, M. Castellanos, and R. Ghosh. Exploiting burstiness in reviews for review spammer detection. In ICWSM, 2013.
  8. A j. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In ACM WWW, 2015.
  9. B Viswanath, M. Ahmad Bashir, M. Crovella, S. Guah, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX, 2014.
  10. H. Li, Z. Chen, B. Liu, X. Wei, and J. Shao. Spotting fake reviews via collective PU learning. In ICDM, 2014.
  11. L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in online reviews bynetwork effects. In ICWSM, 2013.
  12. R. Shebuti and L. Akoglu. Collective opinion spam detection: bridging review networksand metadata. In ACM KDD, 2015.
  13. S. Feng, R. Banerjee and Y. Choi. Syntactic stylometry for deception detection. Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers; ACL, 2012.
  14. N. Jindal, B. Liu, and E.-P. Lim. Finding unusual review patterns using unexpected rules. In ACM CIKM, 2012.
  15. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In ACM CIKM, 2010.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
P. Yamuna, P. Lakshmipathi, " Spam Identification In Social Media Based On Reviews, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.216-219, May-June-2018.