Fair ranking: a critical review, challenges, and future directions

GK Patro, L Porcaro, L Mitchell, Q Zhang… - Proceedings of the …, 2022 - dl.acm.org
Ranking, recommendation, and retrieval systems are widely used in online platforms and
other societal systems, including e-commerce, media-streaming, admissions, gig platforms …

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …

Fraudar: Bounding graph fraud in the face of camouflage

B Hooi, HA Song, A Beutel, N Shah, K Shin… - Proceedings of the …, 2016 - dl.acm.org
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …

Automated crowdturfing attacks and defenses in online review systems

Y Yao, B Viswanath, J Cryan, H Zheng… - Proceedings of the 2017 …, 2017 - dl.acm.org
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation
online, but are limited by the costs of hiring and managing human workers. In this paper, we …

Towards detecting anomalous user behavior in online social networks

B Viswanath, MA Bashir, M Crovella, S Guha… - 23rd usenix security …, 2014 - usenix.org
Users increasingly rely on crowdsourced information, such as reviews on Yelp and Amazon,
and liked posts and ads on Facebook. This has led to a market for blackhat promotion …

Silentwhispers: Enforcing security and privacy in decentralized credit networks

G Malavolta, P Moreno-Sanchez, A Kate… - Cryptology ePrint …, 2016 - eprint.iacr.org
Credit networks model transitive trust (or credit) between users in a distributed environment
and have recently seen a rapid increase of popularity due to their flexible design and …

Graph-based fraud detection in the face of camouflage

B Hooi, K Shin, HA Song, A Beutel, N Shah… - ACM Transactions on …, 2017 - dl.acm.org
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …

The doppelgänger bot attack: Exploring identity impersonation in online social networks

O Goga, G Venkatadri, KP Gummadi - Proceedings of the 2015 internet …, 2015 - dl.acm.org
People have long been aware of malicious users that impersonate celebrities or launch
identity theft attacks in social networks. However, beyond anecdotal evidence, there have …

Deceptive opinion spam detection approaches: a literature survey

SK Maurya, D Singh, AK Maurya - Applied intelligence, 2023 - Springer
Nowadays, a large number of customers purchase products and services online. Customers
can write their opinions in reviews to express the value and quality of purchased goods and …

[PDF][PDF] Privacy preserving payments in credit networks

P Moreno-Sanchez, A Kate, M Maffei… - Network and distributed …, 2015 - researchgate.net
A credit network models trust between agents in a distributed environment and enables
payments between arbitrary pairs of agents. With their flexible design and robustness …