{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:22:20Z","timestamp":1771064540240,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:00:00Z","timestamp":1717459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:00:00Z","timestamp":1717459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["71772107"],"award-info":[{"award-number":["71772107"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023MF070"],"award-info":[{"award-number":["ZR2023MF070"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2020MF044"],"award-info":[{"award-number":["ZR2020MF044"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR202102230289"],"award-info":[{"award-number":["ZR202102230289"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund of Anhui Province Engineering Laboratory for Big Data Analysis and Early Warning Technology of Coal Mine Safety","award":["CSBD2022-ZD01"],"award-info":[{"award-number":["CSBD2022-ZD01"]}]},{"name":"Shandong Education Quality Improvement Plan for Postgraduate (2021), the SDUST Research Fund"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate public perception and disrupt fair market competition. This phenomenon has prompted a heightened research focus on spammer groups detection. In the e-commerce domain, current spammer group detection algorithms can be classified into three categories, i.e., Frequent Item Mining-based, graph-based, and burst-based algorithms. However, existing graph-based algorithms have limitations in that they did not adequately consider the redundant relationships within co-review graphs and neglected to detect overlapping members within spammer groups. To address these issues, we introduce an overlapping spammer group detection algorithm based on deep reinforcement learning named DRL-OSG. First, the algorithm filters out highly suspicious products and gets the set of reviewers who have reviewed these products. Secondly, taking these reviewers as nodes and their co-reviewing relationships as edges, we construct a homogeneous co-reviewing graph. Thirdly, to efficiently identify and handle the redundant relationships that are accidentally formed between ordinary users and spammer group members, we propose the Auto-Sim algorithm, which is a specifically tailored algorithm for dynamic optimization of the co-reviewing graph, allowing for adjustments to the reviewers\u2019 relationship network within the graph. Finally, candidate spammer groups are discovered by using the Ego-Splitting overlapping clustering algorithm, allowing overlapping members to exist in these groups. Then, these groups are refined and ranked to derive the final list of spammer groups. Experimental results based on real-life datasets show that our proposed DRL-OSG algorithm performs better than the baseline algorithms in Precision.<\/jats:p>","DOI":"10.1186\/s42400-024-00230-y","type":"journal-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T04:31:15Z","timestamp":1717475475000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization"],"prefix":"10.1186","volume":"7","author":[{"given":"Chaoqun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2650-0161","authenticated-orcid":false,"given":"Shujuan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Xianwen","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,4]]},"reference":[{"key":"230_CR1","doi-asserted-by":"crossref","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013) Opinion fraud detection in online reviews by network effects. In:\u00a0Proceedings of the international AAAI conference on web and social media, Vol 7, No. 1, pp 2\u201311","DOI":"10.1609\/icwsm.v7i1.14380"},{"key":"230_CR2","doi-asserted-by":"crossref","unstructured":"Bom L, Henken R, Wiering M (2013) Reinforcement learning to train Ms. Pac-Man using higher-order action-relative inputs. In: 2013 IEEE symposium on adaptive dynamic programming and reinforcement learning (ADPRL), pp 156\u2013163","DOI":"10.1109\/ADPRL.2013.6615002"},{"key":"230_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4354086","author":"J Chao","year":"2022","unstructured":"Chao J, Zhao C, Zhang F (2022) Network embedding-based approach for detecting collusive spamming groups on E-commerce platforms. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/4354086","journal-title":"Secur Commun Netw"},{"key":"230_CR4","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.865702","author":"T Chen","year":"2022","unstructured":"Chen T, Samaranayake P, Cen X, Qi M, Lan YC (2022) The impact of online reviews on consumers\u2019 purchasing decisions: Evidence from an eye-tracking study. Front Psychol. https:\/\/doi.org\/10.3389\/fpsyg.2022.865702","journal-title":"Front Psychol"},{"key":"230_CR5","doi-asserted-by":"crossref","unstructured":"Choo E, Yu T, Chi M (2015) Detecting opinion spammer groups through community discovery and sentiment analysis. In: Data and applications security and privacy XXIX: 29th annual IFIP WG 11.3 working conference, DBSec 2015, Fairfax, Proceedings 29, pp 170\u2013187","DOI":"10.1007\/978-3-319-20810-7_11"},{"key":"230_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10844-017-0454-7","volume":"50","author":"RK Dewang","year":"2018","unstructured":"Dewang RK, Singh AK (2018) State-of-art approaches for review spammer detection: a survey. J Intell Inf Syst 50:231\u2013264","journal-title":"J Intell Inf Syst"},{"key":"230_CR7","doi-asserted-by":"crossref","unstructured":"Epasto A, Lattanzi S, Paes Leme R (2017) Ego-splitting framework: from non-overlapping to overlapping clusters. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, pp 145\u2013154","DOI":"10.1145\/3097983.3098054"},{"key":"230_CR20","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol 96, 34th edn. pp 226\u2013231"},{"key":"230_CR8","doi-asserted-by":"crossref","unstructured":"Fei G, Mukherjee A, Liu B, Hsu M, Castellanos M, Ghosh R (2013) Exploiting burstiness in reviews for review spammer detection. In:\u00a0Proceedings of the international AAAI conference on web and social media, pp 175\u2013184","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"230_CR9","unstructured":"Fujimoto S, Hoof H, Meger D (2018) Addressing function approximation error in actor-critic methods. In:\u00a0International conference on machine learning, pp 1587\u20131596"},{"key":"230_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06222-4_9","author":"A Gabardo","year":"2019","unstructured":"Gabardo A, Berretta R, Moscato P (2019) Overlapping communities in co-purchasing and social interaction graphs: a memetic approach. Bus Consum Anal New Ideas. https:\/\/doi.org\/10.1007\/978-3-030-06222-4_9","journal-title":"Bus Consum Anal New Ideas"},{"key":"230_CR11","doi-asserted-by":"crossref","unstructured":"Hu M, Xu G, Ma C, Daneshmand M (2019) Detecting review spammer groups in dynamic review networks. In: Proceedings of the ACM turing celebration conference-China, pp 1\u20136","DOI":"10.1145\/3321408.3323077"},{"key":"230_CR12","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.ins.2020.05.084","volume":"536","author":"SJ Ji","year":"2020","unstructured":"Ji SJ, Zhang Q, Li J, Chiu DK, Xu S, Yi L, Gong M (2020) A burst-based unsupervised method for detecting review spammer groups. Inf Sci 536:454\u2013469","journal-title":"Inf Sci"},{"key":"230_CR13","first-page":"1008","volume":"12","author":"V Konda","year":"1999","unstructured":"Konda V, Tsitsiklis J (1999) Actor-critic algorithms. Adv Neural Inf Process Syst 12:1008\u20131014","journal-title":"Adv Neural Inf Process Syst"},{"key":"230_CR14","doi-asserted-by":"crossref","unstructured":"Li H, Fei G, Wang S, Liu B, Shao W, Mukherjee A, Shao J (2017) Bimodal distribution and co-bursting in review spam detection. In: Proceedings of the 26th international conference on World Wide Web, pp 1063\u20131072","DOI":"10.1145\/3038912.3052582"},{"issue":"12","key":"230_CR15","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1109\/TKDE.2018.2876531","volume":"31","author":"S Liu","year":"2018","unstructured":"Liu S, Hooi B, Faloutsos C (2018) A contrast metric for fraud detection in rich graphs. IEEE Trans Knowl Data Eng 31(12):2235\u20132248","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"12","key":"230_CR16","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1287\/mnsc.2015.2304","volume":"62","author":"M Luca","year":"2016","unstructured":"Luca M, Zervas G (2016) Fake it till you make it: reputation, competition, and Yelp review fraud. Manage Sci 62(12):3412\u20133427","journal-title":"Manage Sci"},{"key":"230_CR17","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Liu B, Glance N (2012) Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on World Wide Web, pp 191\u2013200","DOI":"10.1145\/2187836.2187863"},{"key":"230_CR18","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Kumar A, Liu B, Wang J, Hsu M, Castellanos M, Ghosh R (2013a) Spotting opinion spammers using behavioral footprints. In:\u00a0Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 632\u2013640","DOI":"10.1145\/2487575.2487580"},{"key":"230_CR19","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance N (2013b) What yelp fake review filter might be doing?. In:\u00a0Proceedings of the international AAAI conference on web and social media, pp 409\u2013418","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"230_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3123876","author":"S Shehnepoor","year":"2021","unstructured":"Shehnepoor S, Togneri R, Liu W, Bennamoun M (2021) HIN-RNN: a graph representation learning neural network for fraudster group detection with no handcrafted features. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2021.3123876","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"230_CR22","first-page":"1","volume":"99","author":"S Shehnepoor","year":"2022","unstructured":"Shehnepoor S, Togneri R, Liu W, Bennamoun M (2022) Spatio-temporal graph representation learning for fraudster group detection. IEEE Trans Neural Netw Learn Syst 99:1\u201315","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"230_CR23","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1093\/comjnl\/bxv068","volume":"59","author":"Z Wang","year":"2016","unstructured":"Wang Z, Hou T, Song D, Li Z, Kong T (2016) Detecting review spammer groups via bipartite graph projection. Comput J 59(6):861\u2013874","journal-title":"Comput J"},{"issue":"3","key":"230_CR24","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10115-017-1068-7","volume":"55","author":"Z Wang","year":"2018","unstructured":"Wang Z, Gu S, Zhao X, Xu X (2018a) Graph-based review spammer group detection. Knowl Inf Syst 55(3):571\u2013597","journal-title":"Knowl Inf Syst"},{"key":"230_CR25","doi-asserted-by":"crossref","unstructured":"Wang H, Zhou C, Wu J, Dang W, Zhu X, Wang J (2018) Deep structure learning for fraud detection. In: 2018 IEEE international conference on data mining (ICDM), pp 567\u2013576","DOI":"10.1109\/ICDM.2018.00072"},{"key":"230_CR26","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J (2015) Towards collusive fraud detection in online reviews. In:\u00a02015 IEEE international conference on data mining, pp 1051\u20131056","DOI":"10.1109\/ICDM.2015.62"},{"key":"230_CR27","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang J, Chang K, Long C (2013) Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM international conference on information & knowledge management, pp 979\u2013988","DOI":"10.1145\/2505515.2505700"},{"key":"230_CR28","doi-asserted-by":"crossref","unstructured":"Ye J, Akoglu L (2015) Discovering opinion spammer groups by network footprints. In: Machine learning and knowledge discovery in databases: European conference, ECML PKDD 2015, Porto, Portugal, Proceedings, Part I 15.\u00a0pp 267\u2013282","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"230_CR29","doi-asserted-by":"publisher","first-page":"105520","DOI":"10.1016\/j.knosys.2020.105520","volume":"193","author":"F Zhang","year":"2020","unstructured":"Zhang F, Hao X, Chao J, Yuan S (2020) Label propagation-based approach for detecting review spammer groups on e-commerce websites. Knowl-Based Syst 193:105520","journal-title":"Knowl-Based Syst"},{"key":"230_CR30","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.ins.2022.05.086","volume":"606","author":"F Zhang","year":"2022","unstructured":"Zhang F, Yuan S, Zhang P, Chao J, Yu H (2022a) Detecting review spammer groups based on generative adversarial networks. Inf Sci 606:819\u2013836","journal-title":"Inf Sci"},{"key":"230_CR31","doi-asserted-by":"publisher","first-page":"117482","DOI":"10.1016\/j.eswa.2022.117482","volume":"203","author":"F Zhang","year":"2022","unstructured":"Zhang F, Yuan S, Wu J, Zhang P, Chao J (2022b) Detecting collusive spammers on e-commerce websites based on reinforcement learning and adversarial autoencoder. Expert Syst Appl 203:117482","journal-title":"Expert Syst Appl"},{"issue":"1","key":"230_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s42400-023-00159-8","volume":"6","author":"Q Zhang","year":"2023","unstructured":"Zhang Q, Liang Z, Ji S, Xing B, Chiu DK (2023) Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. Cybersecurity 6(1):26","journal-title":"Cybersecurity"},{"key":"230_CR33","doi-asserted-by":"crossref","unstructured":"Zhang R, Peng H, Dou Y, Wu J, Sun Q, Li Y, Yu P S (2022) Automating DBSCAN via deep reinforcement learning. In:\u00a0Proceedings of the 31st acm international conference on information & knowledge management, pp. 2620\u20132630","DOI":"10.1145\/3511808.3557245"},{"key":"230_CR34","doi-asserted-by":"crossref","unstructured":"Zheng K, Li H, Qiu RC, Gong S (2012) Multi-objective reinforcement learning based routing in cognitive radio networks: Walking in a random maze. In:\u00a02012 international conference on computing, networking and communications (ICNC), pp 359\u2013363","DOI":"10.1109\/ICCNC.2012.6167444"},{"key":"230_CR35","doi-asserted-by":"crossref","unstructured":"Zheng M, Zhou C, Wu J, Pan S, Shi J, Guo L (2018) Fraudne: a joint embedding approach for fraud detection. In: 2018 international joint conference on neural networks (IJCNN), IEEE, pp. 1\u20138","DOI":"10.1109\/IJCNN.2018.8489585"},{"issue":"1","key":"230_CR36","first-page":"317","volume":"60","author":"C Zhu","year":"2019","unstructured":"Zhu C, Zhao W, Li Q, Li P, Da Q (2019) Network embedding-based anomalous density searching for multi-group collaborative fraudsters detection in social media. Comput Mater Contin 60(1):317\u2013333","journal-title":"Comput Mater Contin"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00230-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00230-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00230-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T04:33:15Z","timestamp":1717475595000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00230-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,4]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["230"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00230-y","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,4]]},"assertion":[{"value":"15 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}