2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784911
|View full text |Cite
|
Sign up to set email alerts
|

A Collusion-Resistant Automation Scheme for Social Moderation Systems

Abstract: Abstract-For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a need for a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…People can already add pages to d.tour's database with the search box; given enough users, the database could expand by crowdsourcing. Social moderation techniques [20] could help maintain quality as the corpus grows organically.…”
Section: Databasementioning
confidence: 99%
“…People can already add pages to d.tour's database with the search box; given enough users, the database could expand by crowdsourcing. Social moderation techniques [20] could help maintain quality as the corpus grows organically.…”
Section: Databasementioning
confidence: 99%
“…Depending on the algorithm this can be the largest or the smallest cluster, but using such a simple criterion will miss some of the correct subsets. Options for selecting the colluding subset can be based in-degree/out-degree [12] or the collusion index Φ(C) = I(C)/E(C), where I(C) is the sum of edges where both vertices are in C, and E(C) is the sum of edges where only other vertex is in C [10]. When using the plain hit matrix values to generate a graph, the inverse of the collusion index is used.…”
Section: Detecting the Colluding Setmentioning
confidence: 99%
“…Van der Knyff et al [5] try to find the colluding subset in a first-person-shooter game using principal component analysis [6]. Outside the field of multiplayer games, collusion has been addressed in tournaments [7], multiple choice examinations [8], covert communication channels [9], stock market trading [10], grid computing [11], social moderation [12] and spectrum auctions [13].…”
Section: Introductionmentioning
confidence: 99%
“…A typical solution is the one given in [5] that relies on cryptography. However, with the existence of side channel attacks [6], the attacker can easily guess the secret keys and compromise the cryptography-based protocols.…”
Section: Previous Workmentioning
confidence: 99%
“…However, this imposes restrictions on training data, as if the algorithm does not process the 'unclean' data during the training, it will not be able to detect attacks. A solution based on graph theory is given in [9]. This solution, instead of using the countbased scheme that considers the number of accusations, uses the community-based scheme that achieves the detection of up to 90% of the attackers, which permits the correct operation of the system.…”
Section: Previous Workmentioning
confidence: 99%