Research Article

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms

Table 1

Summary of methods for collusive spamming group detection.

CategoryMethodData modelingCandidate group discovery methodSpamming behavior evaluationDetection method

Group content and behavior analysis-based methodsMukherjee et al. [3]Construct behavioral and relation modelsFrequent itemset miningThe average of spam indicatorsRanking
Xu et al. [4]Measure the pairwise similarity of groupsFrequent itemset miningNoKNN-based method
Xu and Zhang [7]Use pairwise features to model the relations among colludersNoThe weighted sum of all the pairwise featuresRanking
Xu and Zhang [8]Use homogeneity-based behavior features to model the collusive review fraudFrequent itemset miningSimilarity-based measureUnified probabilistic model
Zhang et al. [9]Use a number of features to model the group spamming behaviorFrequent itemset miningNoSemi-supervised classification

Graph-based methodsYe and Akoglu [10]Model the dataset as a bipartite graphNoReviewers’ network footprint scoresHierarchical clustering
Choo et al. [11]Model the dataset as a user relationship graphNoNoCommunity-based method
Wang et al. [12]Model the dataset as a bipartite graphGraph partitioningThe average of spam indicatorsRanking
Do et al. [13]Model the dataset as a review graphNoThe average of spam indicatorsk-means clustering
Do et al. [14]Model the dataset as a review graphNoThe average of spam indicatorsFuzzy k-means clustering
Han et al. [15]Model the dataset as a user relationship graphNoNoGraph spectrum analysis
Wang et al. [16]Model the dataset as a user relationship graphGraph partitioningThe average of spam indicatorsRanking
Cao et al. [21]Model the dataset as a bipartite graphNoThe average of spam indicatorsHierarchical agglomerative clustering
Zhang et al. [22]Model the dataset as a user relationship graphLabel propagationLinearly weighted sum of spam indicatorsRanking