Spam review detection using self-organizing maps and convolutional neural networks

被引:16
|
作者
Neisari, Ashraf [1 ]
Rueda, Luis [1 ]
Saad, Sherif [1 ]
机构
[1] Univ Windsor, Sch Comp Sci, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Spam review detection; Machine leaming; Convolutional neural networks; Self-organizing maps; Word2Vec; GloVe; Fake review detection; IMPACT;
D O I
10.1016/j.cose.2021.102274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online public reviews have significant influenced customers who purchase products or seek services. Fake reviews are posted online to promote or demote targeted products or repu-tation of the organizations and businesses. Spam review detection has been the focus of many researchers in recent years. As the online services have been growing rapidly, the im-portance of the issue is ever increasing and needs to be addressed properly. In this regard, there is a variety of approaches that have been introduced to distinguish truthful reviews from the fake ones. The main features engineered in the past studies typically involve two types of linguistic-based and behavioral-based characteristics of the reviews. Unsupervised, supervised and semi-supervised machine leaming methods have been widely utilized to perform such a classification. This paper introduces a novel approach to detect fake reviews from the genuine ones using linguistic features. Unsupervised learning via self-organizing maps (SOM) in conjunction with a convolutional neural networks (CNN) are employed to perform classification of the reviews. We transform the reviews into images by arranging semantically-similar words around a pixel of the image or equivalently a SOM grid cell. The resulting review images are consequently fed to the CNN for supervised training and then classification. Comprehensive tests on two gold-standard datasets show the effectiveness of the proposed method on single and multi-domain contexts with accuracy of 88% and 87%, respectively. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Using artificial neural networks and self-organizing maps for detection of airframe icing
    Johnson, MD
    Rokhsaz, K
    [J]. JOURNAL OF AIRCRAFT, 2001, 38 (02): : 224 - 230
  • [2] Using Neural Networks and Self-Organizing Maps for Image Connecting
    Ding, Yi
    Wang, Tianjiang
    Fu, Xian
    [J]. COGNITIVE COMPUTATION, 2013, 5 (01) : 13 - 18
  • [3] Using Neural Networks and Self-Organizing Maps for Image Connecting
    Yi Ding
    Tianjiang Wang
    Xian Fu
    [J]. Cognitive Computation, 2013, 5 : 13 - 18
  • [4] Novelty detection using Self-Organizing Maps
    Ypma, A
    Duin, RPW
    [J]. PROGRESS IN CONNECTIONIST-BASED INFORMATION SYSTEMS, VOLS 1 AND 2, 1998, : 1322 - 1325
  • [5] Defensive Islanding Using Self-Organizing Maps Neural Networks and Hierarchical Clustering
    Mahdi, Mohammed
    Genc, Istemihan
    [J]. 2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [6] Modelling of anaerobic digestion using self-organizing maps and artificial neural networks
    Holubar, P
    Zani, L
    Hager, M
    Fröschl, W
    Radak, Z
    Braun, R
    [J]. WATER SCIENCE AND TECHNOLOGY, 2000, 41 (12) : 149 - 156
  • [7] Local modeling using self-organizing maps and single layer neural networks
    Fontenla-Romero, O
    Alonso-Betanzos, A
    Castillo, E
    Principe, JC
    Guijarro-Berdiñas, B
    [J]. ARTIFICIAL NEURAL NETWORKS - ICANN 2002, 2002, 2415 : 945 - 950
  • [8] SOMDNCD: Image Change Detection Based on Self-Organizing Maps and Deep Neural Networks
    Xiao, Ruliang
    Cui, Runxi
    Lin, Mingwei
    Chen, Lifei
    Ni, Youcong
    Lin, Xinhong
    [J]. IEEE ACCESS, 2018, 6 : 35915 - 35925
  • [9] Intrusion detection using Emergent Self-Organizing Maps
    Mitrokotsa, Aikaterini
    Douligeris, Christos
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 3955 : 559 - 562
  • [10] Intrusion Detection System using Self-Organizing Maps
    Alsulaiman, Mansour M.
    Alyahya, Aasem N.
    Alkharboush, Raed A.
    Alghafis, Nasser S.
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 397 - +