首页 > 最新文献

IEEE Transactions on Computational Social Systems最新文献

英文 中文
HateThaiSent: Sentiment-Aided Hate Speech Detection in Thai Language HateThaiSent: 泰语句子辅助仇恨言论检测
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-08 DOI: 10.1109/TCSS.2024.3376958
Krishanu Maity;A. S. Poornash;Shaubhik Bhattacharya;Salisa Phosit;Sawarod Kongsamlit;Sriparna Saha;Kitsuchart Pasupa
Social media platforms are a double-edged sword: on the one hand, they enable the dissemination of information; but on the other hand, they also provide an avenue for spreading online abuse and harassment, such as hate speech. While significant research efforts are being devoted to detecting online hate speech in the English language, little attention has been paid to the Thai language. In this study, we created a benchmark dataset, called HateThaiSent, which labels each post with both hate speech and sentiment information. To detect hate speech, we created a multitask model that uses a dual-channel deep learning approach based on FastText and BERT embeddings, with an added capsule network. One channel utilizes pretrained FastText embeddings while the other uses embeddings from the BERT language model. We aimed to answer two research questions: (Q1) Does incorporating sentiment information improves the performance of hate speech detection (HD) in the Thai language? (Q2) What is the comparative effectiveness of two different approaches for sentiment-aware HD in the Thai language: feature engineering versus multitasking? Our proposed approach outperformed other baselines and state-of-the-art models on the HateThaiSent dataset, with overall accuracy/macro-$F_{1}$ values of 89.67%/89.79%, and 80.92%/80.97% for hate speech and sentiment detection tasks, respectively. We concluded that multitasking is more effective than feature engineering in enhancing the performance of the main task (HD).
社交媒体平台是一把双刃剑:一方面,它可以传播信息;但另一方面,它也为传播仇恨言论等网上谩骂和骚扰行为提供了渠道。尽管人们正致力于检测英语中的网络仇恨言论,但对泰语的关注却很少。在本研究中,我们创建了一个名为 HateThaiSent 的基准数据集,该数据集为每个帖子都贴上了仇恨言论和情感信息的标签。为了检测仇恨言论,我们创建了一个多任务模型,该模型使用基于 FastText 和 BERT 嵌入的双通道深度学习方法,并添加了一个胶囊网络。一个通道使用预训练的 FastText 嵌入,另一个通道使用 BERT 语言模型的嵌入。我们旨在回答两个研究问题:(问题 1)纳入情感信息是否能提高泰语中仇恨言论检测(HD)的性能? 问题 2)泰语中情感感知 HD 的两种不同方法:特征工程与多任务处理的比较效果如何?我们提出的方法在 HateThaiSent 数据集上的表现优于其他基线和最先进的模型,在仇恨言论和情感检测任务上的总体准确率/宏观-$F_{1}$值分别为 89.67%/89.79% 和 80.92%/80.97%。我们的结论是,在提高主要任务(HD)的性能方面,多任务比特征工程更有效。
{"title":"HateThaiSent: Sentiment-Aided Hate Speech Detection in Thai Language","authors":"Krishanu Maity;A. S. Poornash;Shaubhik Bhattacharya;Salisa Phosit;Sawarod Kongsamlit;Sriparna Saha;Kitsuchart Pasupa","doi":"10.1109/TCSS.2024.3376958","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3376958","url":null,"abstract":"Social media platforms are a double-edged sword: on the one hand, they enable the dissemination of information; but on the other hand, they also provide an avenue for spreading online abuse and harassment, such as hate speech. While significant research efforts are being devoted to detecting online hate speech in the English language, little attention has been paid to the Thai language. In this study, we created a benchmark dataset, called \u0000<italic>HateThaiSent</i>\u0000, which labels each post with both hate speech and sentiment information. To detect hate speech, we created a multitask model that uses a dual-channel deep learning approach based on FastText and BERT embeddings, with an added capsule network. One channel utilizes pretrained FastText embeddings while the other uses embeddings from the BERT language model. We aimed to answer two research questions: (Q1) Does incorporating sentiment information improves the performance of hate speech detection (HD) in the Thai language? (Q2) What is the comparative effectiveness of two different approaches for sentiment-aware HD in the Thai language: feature engineering versus multitasking? Our proposed approach outperformed other baselines and state-of-the-art models on the \u0000<italic>HateThaiSent</i>\u0000 dataset, with overall accuracy/macro-\u0000<inline-formula><tex-math>$F_{1}$</tex-math></inline-formula>\u0000 values of 89.67%/89.79%, and 80.92%/80.97% for hate speech and sentiment detection tasks, respectively. We concluded that multitasking is more effective than feature engineering in enhancing the performance of the main task (HD).","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"5714-5727"},"PeriodicalIF":4.5,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142368395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Can Recognize Whether a Job Applicant Is Selling and/or Lying According to Facial Expressions and Head Movements Much More Correctly Than Human Interviewers 人工智能能根据面部表情和头部动作识别求职者是否在推销和/或撒谎,正确率远高于人类面试官
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-08 DOI: 10.1109/TCSS.2024.3376732
Hung-Yue Suen;Kuo-En Hung;Che-Wei Liu;Yu-Sheng Su;Han-Chih Fan
Whether an interviewee’s honest and deceptive responses can be detected by the signals of facial expressions in videos has been debated and called to be researched. We developed deep learning models enabled by computer vision to extract the temporal patterns of job applicants’ facial expressions and head movements to identify self-reported honest and deceptive impression management (IM) tactics from video frames in real asynchronous video interviews. A 12- to 15-min video was recorded for each of the N = 121 job applicants as they answered five structured behavioral interview questions. Each applicant completed a survey to self-evaluate their trustworthiness on four IM measures. Additionally, a field experiment was conducted to compare the concurrent validity associated with self-reported IMs between our modeling and human interviewers. Human interviewers’ performance in predicting these IM measures from another subset of 30 videos was obtained by having N = 30 human interviewers evaluate three recordings. Our models explained 91% and 84% of the variance in honest and deceptive IMs, respectively, and showed a stronger correlation with self-reported IM scores compared to human interviewers.
能否通过视频中的面部表情信号检测出面试者的诚实和欺骗性回答一直是人们争论的焦点,也是有待研究的问题。我们利用计算机视觉技术开发了深度学习模型,以提取求职者面部表情和头部运动的时间模式,从而从真实异步视频面试的视频帧中识别出求职者自述的诚实和欺骗性印象管理(IM)策略。在 N = 121 名求职者回答五个结构化行为面试问题时,为他们每人录制了 12 至 15 分钟的视频。每位求职者都填写了一份调查问卷,就四项即时通讯措施对自己的可信度进行自我评估。此外,我们还进行了一项现场实验,以比较我们的建模与人类面试官之间与自我报告的即时通讯相关的并发有效性。通过让 N = 30 名人类访谈者对三段录像进行评估,获得了人类访谈者从另一个 30 段录像子集中预测这些即时信息测量结果的表现。我们的模型分别解释了 91% 和 84% 的诚实即时信息和欺骗性即时信息的变异,与人类访谈者相比,我们的模型与自我报告的即时信息得分显示出更强的相关性。
{"title":"Artificial Intelligence Can Recognize Whether a Job Applicant Is Selling and/or Lying According to Facial Expressions and Head Movements Much More Correctly Than Human Interviewers","authors":"Hung-Yue Suen;Kuo-En Hung;Che-Wei Liu;Yu-Sheng Su;Han-Chih Fan","doi":"10.1109/TCSS.2024.3376732","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3376732","url":null,"abstract":"Whether an interviewee’s honest and deceptive responses can be detected by the signals of facial expressions in videos has been debated and called to be researched. We developed deep learning models enabled by computer vision to extract the temporal patterns of job applicants’ facial expressions and head movements to identify self-reported honest and deceptive impression management (IM) tactics from video frames in real asynchronous video interviews. A 12- to 15-min video was recorded for each of the \u0000<italic>N</i>\u0000 = 121 job applicants as they answered five structured behavioral interview questions. Each applicant completed a survey to self-evaluate their trustworthiness on four IM measures. Additionally, a field experiment was conducted to compare the concurrent validity associated with self-reported IMs between our modeling and human interviewers. Human interviewers’ performance in predicting these IM measures from another subset of 30 videos was obtained by having \u0000<italic>N</i>\u0000 = 30 human interviewers evaluate three recordings. Our models explained 91% and 84% of the variance in honest and deceptive IMs, respectively, and showed a stronger correlation with self-reported IM scores compared to human interviewers.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"5949-5960"},"PeriodicalIF":4.5,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Temporal Privacy-Preserving Model for Social Recommendation 用于社交推荐的新型时态隐私保护模型
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-05 DOI: 10.1109/TCSS.2024.3378349
Lina Gao;Jiguo Yu;Jianli Zhao;Chunqiang Hu
Social recommendation improved the quality and efficiency of recommendation but increased the risk of privacy leakage, especially with the introduction of social networks. Consequently, the social recommendation considering user privacy has drawn tremendous attention from academia to industry. Nevertheless, most of the existing work regards the recommender systems as static, ignoring the diffusion of social influence over time. In this article, we propose a secure and efficient framework, temporal privacy-preserving social recommendation model (PrivTSR), to capture the changes of user preference for items and item types with time. PrivTSR first utilizes differential privacy to encrypt the data owned by the data owner. Then, inspired by the long short-term memory (LSTM), at each time step the initial user embedding and the initial item embedding are generated via DeepWalk as new ratings of users for items emerges in the user–item-type graph. The initial user-preference embedding is generated randomly at the first time step, and it is equivalent to the updated embedding of the previous time step for the later time steps. Most importantly, on the social graph, PrivTSR updates the user embedding and the user-preference embedding with graph attention convolutional network and graph attention diffused network, which aggregates (diffuses) social influence from (to) neighbors in depth and breadth. On the user–item-type graph, the user embedding and the item embedding are updated by aggregating the embedding of users and items in the six paths. Final, taking into account the users’ preference for items and item types, PrivTSR predicts the ratings of users to the items for the next time step. The extensive experiments are conducted on two real-world datasets, which demonstrated the superiority of our model over several competitive baselines.
社交推荐提高了推荐的质量和效率,但也增加了隐私泄露的风险,尤其是在引入社交网络之后。因此,考虑到用户隐私的社交推荐引起了从学术界到产业界的极大关注。然而,现有的大多数研究都将推荐系统视为静态的,忽略了社交影响随时间的扩散。在本文中,我们提出了一个安全高效的框架--时间隐私保护社会推荐模型(PrivTSR),以捕捉用户对项目和项目类型的偏好随时间的变化。PrivTSR 首先利用差分隐私对数据所有者的数据进行加密。然后,受长短时记忆(LSTM)的启发,在用户-物品-类型图中出现用户对物品的新评价时,通过 DeepWalk 在每个时间步生成初始用户嵌入和初始物品嵌入。初始用户偏好嵌入在第一个时间步随机生成,在后面的时间步中等同于前一个时间步的更新嵌入。最重要的是,在社交图上,PrivTSR 利用图注意力卷积网络和图注意力扩散网络更新用户嵌入和用户偏好嵌入,从深度和广度上聚合(扩散)来自(到)邻居的社交影响。在用户-物品-类型图上,通过聚合六条路径中用户和物品的嵌入,更新用户嵌入和物品嵌入。最后,考虑到用户对项目和项目类型的偏好,PrivTSR 会预测下一时间步骤用户对项目的评分。我们在两个真实世界的数据集上进行了大量实验,结果表明我们的模型优于几种竞争基线模型。
{"title":"A Novel Temporal Privacy-Preserving Model for Social Recommendation","authors":"Lina Gao;Jiguo Yu;Jianli Zhao;Chunqiang Hu","doi":"10.1109/TCSS.2024.3378349","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3378349","url":null,"abstract":"Social recommendation improved the quality and efficiency of recommendation but increased the risk of privacy leakage, especially with the introduction of social networks. Consequently, the social recommendation considering user privacy has drawn tremendous attention from academia to industry. Nevertheless, most of the existing work regards the recommender systems as static, ignoring the diffusion of social influence over time. In this article, we propose a secure and efficient framework, temporal privacy-preserving social recommendation model (PrivTSR), to capture the changes of user preference for items and item types with time. PrivTSR first utilizes differential privacy to encrypt the data owned by the data owner. Then, inspired by the long short-term memory (LSTM), at each time step the initial user embedding and the initial item embedding are generated via DeepWalk as new ratings of users for items emerges in the user–item-type graph. The initial user-preference embedding is generated randomly at the first time step, and it is equivalent to the updated embedding of the previous time step for the later time steps. Most importantly, on the social graph, PrivTSR updates the user embedding and the user-preference embedding with graph attention convolutional network and graph attention diffused network, which aggregates (diffuses) social influence from (to) neighbors in depth and breadth. On the user–item-type graph, the user embedding and the item embedding are updated by aggregating the embedding of users and items in the six paths. Final, taking into account the users’ preference for items and item types, PrivTSR predicts the ratings of users to the items for the next time step. The extensive experiments are conducted on two real-world datasets, which demonstrated the superiority of our model over several competitive baselines.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"5658-5670"},"PeriodicalIF":4.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142368319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RumorGraphXplainer: Do Structures Really Matter in Rumor Detection RumorGraphXplainer:结构在谣言检测中真的很重要吗?
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-05 DOI: 10.1109/TCSS.2024.3378065
Daniel Wai Kit Chin;Kwan Hui Lim;Roy Ka-Wei Lee
The rise of social media has enabled individuals to rapidly share information, including rumors, which can have significant impacts on various domains. Traditional approaches to rumor control are impractical for social media platforms due to the volume and speed of information. Automated detection methods are needed that not only identify rumors early but also provide explanations for their decisions to protect free speech. Recent advancements in deep learning have shown promise in automating rumor detection. Graph-based models, such as bidirectional graph convolution network (Bi-GCN), capture propagation, and dispersion patterns to differentiate rumors from the truth. However, the interpretability of these deep learning models is a challenge. This article focuses on graph convolution networks (GCNs), which lack attention maps for easy model attribution but excel at capturing global structural features. We investigate the importance of graph structure in rumor detection using two GCN models on a real-world dataset, analyzing the learned latent propagation and dispersion features. To the best of our knowledge, this is the first study to explore GCNs in rumor detection and investigate the significance of graph structure in this task. Our research addresses three primary questions: 1) the primary contributors to GCN-based rumor detection models and their differences across models; 2) the importance of graph structure for accurate predictions in GCN-based models; and 3) the latent propagation and dispersion features learned by GCN-based detection models during the rumor detection process.
社交媒体的兴起使个人能够快速分享信息,包括对各个领域产生重大影响的谣言。由于信息量大、传播速度快,传统的谣言控制方法对于社交媒体平台来说并不实用。我们需要的自动检测方法不仅能及早识别谣言,还能为谣言的决定提供解释,以保护言论自由。最近在深度学习方面取得的进展显示了谣言自动检测的前景。基于图的模型,如双向图卷积网络(Bi-GCN),可以捕捉传播和分散模式,从而将谣言与真相区分开来。然而,这些深度学习模型的可解释性是一个挑战。本文的重点是图卷积网络(GCN),它缺乏便于模型归因的注意力图,但擅长捕捉全局结构特征。我们在真实世界的数据集上使用两个 GCN 模型研究了图结构在谣言检测中的重要性,并分析了学习到的潜在传播和分散特征。据我们所知,这是第一项在谣言检测中探索 GCN 并研究图结构在这项任务中的重要性的研究。我们的研究主要解决三个问题:1)基于 GCN 的谣言检测模型的主要贡献者及其在不同模型中的差异;2)基于 GCN 的模型中图结构对于准确预测的重要性;3)基于 GCN 的检测模型在谣言检测过程中学习到的潜在传播和分散特征。
{"title":"RumorGraphXplainer: Do Structures Really Matter in Rumor Detection","authors":"Daniel Wai Kit Chin;Kwan Hui Lim;Roy Ka-Wei Lee","doi":"10.1109/TCSS.2024.3378065","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3378065","url":null,"abstract":"The rise of social media has enabled individuals to rapidly share information, including rumors, which can have significant impacts on various domains. Traditional approaches to rumor control are impractical for social media platforms due to the volume and speed of information. Automated detection methods are needed that not only identify rumors early but also provide explanations for their decisions to protect free speech. Recent advancements in deep learning have shown promise in automating rumor detection. Graph-based models, such as bidirectional graph convolution network (Bi-GCN), capture propagation, and dispersion patterns to differentiate rumors from the truth. However, the interpretability of these deep learning models is a challenge. This article focuses on graph convolution networks (GCNs), which lack attention maps for easy model attribution but excel at capturing global structural features. We investigate the importance of graph structure in rumor detection using two GCN models on a real-world dataset, analyzing the learned latent propagation and dispersion features. To the best of our knowledge, this is the first study to explore GCNs in rumor detection and investigate the significance of graph structure in this task. Our research addresses three primary questions: 1) the primary contributors to GCN-based rumor detection models and their differences across models; 2) the importance of graph structure for accurate predictions in GCN-based models; and 3) the latent propagation and dispersion features learned by GCN-based detection models during the rumor detection process.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"6038-6055"},"PeriodicalIF":4.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Let's All Laugh Together: A Novel Multitask Framework for Humor Detection in Internet Memes 让我们一起笑吧:互联网备忘录中幽默检测的新型多任务框架
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-03 DOI: 10.1109/TCSS.2024.3362811
Gitanjali Kumari;Dibyanayan Bandyopadhyay;Asif Ekbal;Santanu Pal;Arindam Chatterjee;Vinutha B. N.
Recognizing humor in meme data is a challenging task in natural language processing (NLP) and computer vision (CV) due to the complexity and variability of humor. With the explosive growth of Internet memes on social media platforms such as Facebook, Twitter, and Instagram, this task has become more important. However, there have been few studies that investigate humor recognition from memes, particularly in languages other than English. In this work, we hypothesize that humor is closely related to the valence and arousal dimensions of sentiment. We make the first attempt to release a new meme dataset for humor recognition in Hindi and propose a multitask deep learning framework to simultaneously solve three problems: humor recognition (the primary task) and valence and arousal classification (the two secondary tasks) for Internet memes. Empirical results on the Hindi meme dataset demonstrate the efficacy of our multitask learning approach over traditional pretrained models such as BERT and VGG19. The complete resources and codes will be made available for further research after acceptance of the manuscript.
由于幽默的复杂性和多变性,在备忘录数据中识别幽默是自然语言处理(NLP)和计算机视觉(CV)领域的一项具有挑战性的任务。随着网络流行语在 Facebook、Twitter 和 Instagram 等社交媒体平台上的爆炸式增长,这项任务变得更加重要。然而,很少有研究调查从备忘录中识别幽默,尤其是用英语以外的语言。在这项工作中,我们假设幽默与情感的情绪和唤醒维度密切相关。我们首次尝试发布了一个新的印地语幽默识别meme数据集,并提出了一种多任务深度学习框架,以同时解决三个问题:互联网memes的幽默识别(主要任务)以及情绪和唤起分类(两个次要任务)。在印地语备忘录数据集上的实证结果表明,我们的多任务学习方法比传统的预训练模型(如 BERT 和 VGG19)更有效。稿件被接受后,我们将提供完整的资源和代码,供进一步研究使用。
{"title":"Let's All Laugh Together: A Novel Multitask Framework for Humor Detection in Internet Memes","authors":"Gitanjali Kumari;Dibyanayan Bandyopadhyay;Asif Ekbal;Santanu Pal;Arindam Chatterjee;Vinutha B. N.","doi":"10.1109/TCSS.2024.3362811","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3362811","url":null,"abstract":"Recognizing humor in meme data is a challenging task in natural language processing (NLP) and computer vision (CV) due to the complexity and variability of humor. With the explosive growth of Internet memes on social media platforms such as Facebook, Twitter, and Instagram, this task has become more important. However, there have been few studies that investigate humor recognition from memes, particularly in languages other than English. In this work, we hypothesize that humor is closely related to the valence and arousal dimensions of sentiment. We make the first attempt to release a new meme dataset for humor recognition in Hindi and propose a multitask deep learning framework to simultaneously solve three problems: humor recognition (the primary task) and valence and arousal classification (the two secondary tasks) for Internet memes. Empirical results on the Hindi meme dataset demonstrate the efficacy of our multitask learning approach over traditional pretrained models such as BERT and VGG19. The complete resources and codes will be made available for further research after acceptance of the manuscript.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 3","pages":"4385-4395"},"PeriodicalIF":5.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Honest or Dishonest? Promoting Integrity in Loot Box Games Through Evolutionary Game Theory 诚实还是不诚实?通过进化博弈论促进掠夺箱游戏中的诚信
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-03 DOI: 10.1109/TCSS.2024.3376718
Haoran Yin;Jiaxiang Sun;Wei Cai
With the rapid advancement of free-to-play games featuring in-game payments, the loot box sales model challenges traditional fixed-price purchases by stimulating players’ psychological desires. However, concerns have arisen among players regarding the transparency of loot box drop rates as claimed by game companies. Considering players’ “partial information” and “bounded rationality” in-game, this study explores strategic interactions and evolutionary outcomes under various decision-making scenarios through a bipartite evolutionary game model, employing the replication dynamics approach. In contrast to conventional studies that examine market manipulation post hoc, evolutionary game theory enables a proactive examination of strategies to foster fairness within the loot box game market. The findings indicate that the dynamic between companies and players may ultimately converge to either a lose–lose or win–win scenario. Through simulation analysis, the impact of stakeholders’ initial strategic ratios and critical parameters on the evolutionary trajectory is examined. It is observed that companies hold a dominant position in enhancing cooperation, whereas regulatory bodies can foster industry development through heightened regulation. This assertion is substantiated with real-world examples. The goal of this research is to advocate for integrity and transparency within the gaming industry, ensuring a fair environment for players.
随着以游戏内付费为特色的免费游戏的快速发展,战利品箱销售模式通过刺激玩家的心理欲望,对传统的固定价格购买模式提出了挑战。然而,玩家对游戏公司宣称的战利品宝箱掉落率的透明度产生了担忧。考虑到玩家在游戏中的 "部分信息 "和 "有限理性",本研究采用复制动力学方法,通过双元进化博弈模型探讨了各种决策情景下的战略互动和进化结果。与事后研究市场操纵行为的传统研究不同,进化博弈论能够前瞻性地研究促进掠夺盒游戏市场公平性的策略。研究结果表明,公司与玩家之间的动态关系最终可能会趋于双输或双赢的局面。通过模拟分析,研究了利益相关者的初始战略比率和关键参数对演变轨迹的影响。结果表明,企业在加强合作方面占据主导地位,而监管机构则可以通过加强监管促进行业发展。这一论断通过实际案例得到了证实。本研究的目标是倡导博彩业的诚信和透明,确保为玩家提供一个公平的环境。
{"title":"Honest or Dishonest? Promoting Integrity in Loot Box Games Through Evolutionary Game Theory","authors":"Haoran Yin;Jiaxiang Sun;Wei Cai","doi":"10.1109/TCSS.2024.3376718","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3376718","url":null,"abstract":"With the rapid advancement of free-to-play games featuring in-game payments, the loot box sales model challenges traditional fixed-price purchases by stimulating players’ psychological desires. However, concerns have arisen among players regarding the transparency of loot box drop rates as claimed by game companies. Considering players’ “partial information” and “bounded rationality” in-game, this study explores strategic interactions and evolutionary outcomes under various decision-making scenarios through a bipartite evolutionary game model, employing the replication dynamics approach. In contrast to conventional studies that examine market manipulation post hoc, evolutionary game theory enables a proactive examination of strategies to foster fairness within the loot box game market. The findings indicate that the dynamic between companies and players may ultimately converge to either a lose–lose or win–win scenario. Through simulation analysis, the impact of stakeholders’ initial strategic ratios and critical parameters on the evolutionary trajectory is examined. It is observed that companies hold a dominant position in enhancing cooperation, whereas regulatory bodies can foster industry development through heightened regulation. This assertion is substantiated with real-world examples. The goal of this research is to advocate for integrity and transparency within the gaming industry, ensuring a fair environment for players.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"5961-5972"},"PeriodicalIF":4.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems, Man, and Cybernetics Society Information 电气和电子工程师学会系统、人和控制论学会信息
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-02 DOI: 10.1109/TCSS.2024.3377349
{"title":"IEEE Systems, Man, and Cybernetics Society Information","authors":"","doi":"10.1109/TCSS.2024.3377349","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3377349","url":null,"abstract":"","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 2","pages":"C3-C3"},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10488769","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140342725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sora for Computational Social Systems: From Counterfactual Experiments to Artificiofactual Experiments With Parallel Intelligence 用于计算社会系统的 Sora:从反事实实验到并行智能的人工事实实验
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-02 DOI: 10.1109/TCSS.2024.3373928
Rui Qin;Fei-Yue Wang;Xiaolong Zheng;Qinghua Ni;Juanjuan Li;Xiao Xue;Bin Hu
Welcome to the second issue of IEEE Transactions on Computational Social Systems (TCSS) of 2024. This issue showcases an impressive array of 104 regular papers alongside our Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security, highlighting cutting-edge research aimed at harnessing big data and computational techniques to fortify financial security amidst the digital finance evolution. With a focus on addressing the intricate challenges of financial big data, enhancing the efficacy of artificial intelligence, and covering critical topics from data mining to digital currencies, this issue underscores the vital role of cross-disciplinary efforts in mitigating financial security risks.
欢迎阅读 2024 年第二期《电气和电子工程师学会计算社会系统期刊》(IEEE Transactions on Computational Social Systems,TCSS)。本期展示了令人印象深刻的 104 篇常规论文,以及 "大数据和计算社会智能保障金融安全 "特刊,重点介绍了旨在利用大数据和计算技术在数字金融发展中加强金融安全的前沿研究。本期特刊重点关注解决金融大数据的复杂挑战,提高人工智能的效率,并涵盖从数据挖掘到数字货币等关键主题,强调了跨学科工作在降低金融安全风险方面的重要作用。
{"title":"Sora for Computational Social Systems: From Counterfactual Experiments to Artificiofactual Experiments With Parallel Intelligence","authors":"Rui Qin;Fei-Yue Wang;Xiaolong Zheng;Qinghua Ni;Juanjuan Li;Xiao Xue;Bin Hu","doi":"10.1109/TCSS.2024.3373928","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3373928","url":null,"abstract":"Welcome to the second issue of IEEE Transactions on Computational Social Systems (TCSS) of 2024. This issue showcases an impressive array of 104 regular papers alongside our Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security, highlighting cutting-edge research aimed at harnessing big data and computational techniques to fortify financial security amidst the digital finance evolution. With a focus on addressing the intricate challenges of financial big data, enhancing the efficacy of artificial intelligence, and covering critical topics from data mining to digital currencies, this issue underscores the vital role of cross-disciplinary efforts in mitigating financial security risks.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 2","pages":"1531-1550"},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10488825","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Computational Social Systems Information for Authors 电气和电子工程师学会计算社会系统论文集 作者信息
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-02 DOI: 10.1109/TCSS.2024.3377351
{"title":"IEEE Transactions on Computational Social Systems Information for Authors","authors":"","doi":"10.1109/TCSS.2024.3377351","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3377351","url":null,"abstract":"","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 2","pages":"C4-C4"},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10488823","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140342783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security 特邀编辑:保障金融安全的大数据和计算社会智能特刊
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-04-02 DOI: 10.1109/TCSS.2024.3373929
Changjun Jiang;Fei-Yue Wang;Mengchu Zhou;Asoke K. Nandi;Guanjun Liu
The innovations in technologies have led to the emergence of digital finance such as online payment, online insurance, online lending, and supply chain finance. Digital finance has greatly facilitated people’s lives, accelerated the circulation of capital in various fields, and enhanced the vitality of financial markets. However, it exposes many increasing risks and hidden dangers such as stock volatility, trading fraud, credit card fraud, and privacy leakage [1], [2], [3], [4], [5], [6], [7]. How to effectively calculate, control, manage, and utilize financial big data and make full use of artificial intelligence technology to ensure financial security is an important research question. Solving it faces many challenges. These challenges not only include the complexity of data and computation but also the effectiveness of intelligent optimization algorithms and ways to deal with human behaviors and social environments [8], [9].
技术的革新催生了在线支付、在线保险、在线借贷、供应链金融等数字金融的出现。数字金融极大地方便了人们的生活,加速了各领域资金的流通,增强了金融市场的活力。然而,其暴露出的股票波动、交易欺诈、信用卡诈骗、隐私泄露等风险和隐患也日益增多[1], [2], [3], [4], [5], [6], [7]。如何有效计算、控制、管理和利用金融大数据,充分利用人工智能技术确保金融安全,是一个重要的研究课题。解决这一问题面临诸多挑战。这些挑战不仅包括数据和计算的复杂性,还包括智能优化算法的有效性以及处理人类行为和社会环境的方法[8],[9]。
{"title":"Guest Editorial: Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security","authors":"Changjun Jiang;Fei-Yue Wang;Mengchu Zhou;Asoke K. Nandi;Guanjun Liu","doi":"10.1109/TCSS.2024.3373929","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3373929","url":null,"abstract":"The innovations in technologies have led to the emergence of digital finance such as online payment, online insurance, online lending, and supply chain finance. Digital finance has greatly facilitated people’s lives, accelerated the circulation of capital in various fields, and enhanced the vitality of financial markets. However, it exposes many increasing risks and hidden dangers such as stock volatility, trading fraud, credit card fraud, and privacy leakage \u0000<xref>[1]</xref>\u0000, \u0000<xref>[2]</xref>\u0000, \u0000<xref>[3]</xref>\u0000, \u0000<xref>[4]</xref>\u0000, \u0000<xref>[5]</xref>\u0000, \u0000<xref>[6]</xref>\u0000, \u0000<xref>[7]</xref>\u0000. How to effectively calculate, control, manage, and utilize financial big data and make full use of artificial intelligence technology to ensure financial security is an important research question. Solving it faces many challenges. These challenges not only include the complexity of data and computation but also the effectiveness of intelligent optimization algorithms and ways to deal with human behaviors and social environments \u0000<xref>[8]</xref>\u0000, \u0000<xref>[9]</xref>\u0000.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 2","pages":"1551-1555"},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10488826","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Computational Social Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1