Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack

Marianela García Lozano, Johan Fernquist
{"title":"Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack","authors":"Marianela García Lozano, Johan Fernquist","doi":"10.1109/EISIC49498.2019.9108852","DOIUrl":null,"url":null,"abstract":"The temptation to influence and sway public opinion most certainly increases with the growth of open online forums where anyone anonymously can express their views and opinions. Since online review sites are a popular venue for opinion influencing attacks, there is a need to automatically identify deceptive posts. The main focus of this work is on automatic identification of deceptive reviews, both positive and negative biased. With this objective, we build a deceptive review SVM based classification model and explore the performance impact of using different feature types (TF-IDF, word2vec, PCFG). Moreover, we study the transferability of trained classification models applied to review data sets of other types of products, and, the classifier robustness, i.e., the accuracy impact, against attacks by stylometry obfuscation trough machine translation. Our findings show that i) we achieve an accuracy of over 90% using different feature types, ii) the trained classification models do not perform well when applied on other data sets containing reviews of different products, and iii) machine translation only slightly impacts the results and can not be used as a viable attack method.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 European Intelligence and Security Informatics Conference (EISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC49498.2019.9108852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The temptation to influence and sway public opinion most certainly increases with the growth of open online forums where anyone anonymously can express their views and opinions. Since online review sites are a popular venue for opinion influencing attacks, there is a need to automatically identify deceptive posts. The main focus of this work is on automatic identification of deceptive reviews, both positive and negative biased. With this objective, we build a deceptive review SVM based classification model and explore the performance impact of using different feature types (TF-IDF, word2vec, PCFG). Moreover, we study the transferability of trained classification models applied to review data sets of other types of products, and, the classifier robustness, i.e., the accuracy impact, against attacks by stylometry obfuscation trough machine translation. Our findings show that i) we achieve an accuracy of over 90% using different feature types, ii) the trained classification models do not perform well when applied on other data sets containing reviews of different products, and iii) machine translation only slightly impacts the results and can not be used as a viable attack method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
鉴别欺骗性评论:特征探索、模型可转移性和分类攻击
随着开放的在线论坛的增长,任何人都可以匿名表达自己的观点和意见,影响和左右公众舆论的诱惑无疑会增加。由于在线评论网站是影响舆论攻击的热门场所,因此有必要自动识别欺骗性帖子。这项工作的主要重点是自动识别欺骗性评论,包括积极和消极的偏见。为此,我们建立了一个基于欺骗评论SVM的分类模型,并探讨了使用不同特征类型(TF-IDF, word2vec, PCFG)对性能的影响。此外,我们还研究了训练后的分类模型的可移植性,用于审查其他类型产品的数据集,以及分类器的鲁棒性,即通过机器翻译抵御文体混淆攻击的准确性影响。我们的研究结果表明,i)我们使用不同的特征类型获得了超过90%的准确率,ii)训练好的分类模型在应用于包含不同产品评论的其他数据集时表现不佳,iii)机器翻译仅对结果产生轻微影响,不能用作可行的攻击方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Extracting Account Attributes for Analyzing Influence on Twitter Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions Devising and Optimizing Crowd Control Strategies Using Agent-Based Modeling and Simulation Attack Hypothesis Generation Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1