{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:42Z","timestamp":1761581982823,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T00:00:00Z","timestamp":1595548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-18-1-2670, N00014-16-1-2896, and N00014-20-1-2407"],"award-info":[{"award-number":["N00014-18-1-2670, N00014-16-1-2896, and N00014-20-1-2407"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2020,10,31]]},"abstract":"<jats:p>Customers of virtually all online marketplaces rely upon reviews in order to select the product or service they wish to buy. These marketplaces in turn deploy review fraud detection systems so that the integrity of reviews is preserved. A well-known problem with review fraud detection systems is their underlying assumption that the majority of reviews are honest-this assumption leads to a vulnerability where an attacker can try to generate many fake reviews of a product. In this article, we consider the case where a company wishes to fraudulently promote its product through fake reviews and propose the Sockpuppet-based Targeted Attack on Reviewing Systems (STARS for short). STARS enables an attacker to enter fake reviews for a product from multiple, apparently independent, sockpuppet accounts. We show that the STARS attack enables companies to successfully promote their product against seven recent, well-known review fraud detectors on four datasets (Amazon, Epinions, and the BitcoinAlpha and OTC exchanges) by significant margins. To protect against the STARS attack, we propose a new fraud detection algorithm called RTV. RTV introduces a new class of users (called trusted users) and also considers reviews left by verified users which were not considered in existing review fraud detectors. We show that RTV significantly mitigates the impact of the STARS attack across the four datasets listed above.<\/jats:p>","DOI":"10.1145\/3397463","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:36:50Z","timestamp":1594125410000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["STARS"],"prefix":"10.1145","volume":"11","author":[{"given":"Rui","family":"Liu","sequence":"first","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"given":"Runze","family":"Liu","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4385-958X","authenticated-orcid":false,"given":"Andrea","family":"Pugliese","sequence":"additional","affiliation":[{"name":"University of Calabria, Rende, Italy"}]},{"given":"V. S.","family":"Subrahmanian","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,24]]},"reference":[{"volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media","year":"2013","author":"Akoglu Leman","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492637"},{"volume-title":"You just got attacked by fake 1-star reviews. Now what? https:\/\/www.forbes.com\/sites\/ryanerskine\/2018\/05\/15\/you-just-got-attacked-by-fake-1-star-reviews-now-what. Forbes Magazine (May","year":"2018","author":"Erskine Ryan","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767742"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2014.04.004"},{"volume-title":"Proceedings of the 21st World Wide Web Conference 2012 (WWW\u201912)","author":"Ghosh Saptarshi","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.56"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.012"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623632"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.5"},{"volume-title":"Proceedings of the 11th International Conference on Web and Social Media (ICWSM 2017)","year":"2017","author":"Kaghazgaran Parisa","key":"e_1_2_1_12_1"},{"volume-title":"Proceedings of the 11th ACM International Conference on Web Search and Data Mining (WSDM\u201918)","author":"Kumar Srijan","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0674"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.53"},{"key":"e_1_2_1_16_1","unstructured":"Rui Liu Runze Liu Andrea Pugliese and V. S. Subrahmanian. 2019. STARS-RTV: Additional material. http:\/\/people.dimes.unical.it\/andreapugliese\/stars-rtv.  Rui Liu Runze Liu Andrea Pugliese and V. S. Subrahmanian. 2019. STARS-RTV: Additional material. http:\/\/people.dimes.unical.it\/andreapugliese\/stars-rtv."},{"volume-title":"Com (March 15","year":"2016","author":"Luca Michael","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2304"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741655"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742570"},{"volume-title":"Study finds 61 percent of electronics reviews on Amazon are \u2018fake\u2019. https:\/\/marketingland.com\/study-finds-61-percent-of-electronics-reviews-on-amazon-are-fake-254055. Marketing Land (December","year":"2018","author":"Sterling Greg","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487688"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817946.2817964"},{"volume-title":"Proceedings of the11th IEEE International Conference on Data Mining (ICDM\u201911)","author":"Wang Guan","key":"e_1_2_1_26_1"},{"volume-title":"Yu","year":"2012","author":"Wang Guan","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864757"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835816"},{"volume-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201912)","author":"Xie Sihong","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.62"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098859"},{"volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917)","author":"Yao Yuanshun","key":"e_1_2_1_33_1"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397463","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:33Z","timestamp":1750200093000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397463"}},"subtitle":["Defending against Sockpuppet-Based Targeted Attacks on Reviewing Systems"],"short-title":[],"issued":{"date-parts":[[2020,7,24]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10,31]]}},"alternative-id":["10.1145\/3397463"],"URL":"https:\/\/doi.org\/10.1145\/3397463","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2020,7,24]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}