SlideShare a Scribd company logo
CCNC

A Collusion-Resistant Automation
Scheme for Social Moderation Systems
        Jing-Kai Lou12, Kuan-Ta Chen1, Chin-Laung Lei2
            Institute of Information Science, Academia Sinica1
     Department of Electrical Engineering, National Taiwan University2
The Rise of User-Generated Content
• eMarketer projects that the number of US
  UGC creators will rise to 108 million in 2012,
  from 77 million in 2007.




2009/1/12          CCNC 2009 / Jing‐Kai Lou        2
Inappropriate UGC
• While most UGC creators behave responsibly, a minority of
  creators may upload inappropriate content, such like
      • pictures that violate copyright laws
      • splatter movies
      • …
• Content censorship is essential for Web 2.0 services

• One Solution:
      • hiring lots of official moderators
      • But, such high labor cost is a great burden to the service provider

• Another Solution:
  Social moderation has been proposed to solve the content
  censorship problem

2009/1/12                        CCNC 2009 / Jing‐Kai Lou                     3
Social Moderation System
                                                                            X

   • A user-assist moderation                             O       X
                                                                       X
   • Every user is a reviewer!
                    ?
               ??       !?
                                                              Official moderators 
                                                              inspect and evaluate 
You report/accuse                                             what your report
while browsing

                                               Blogger
                             Album                                    Video
   2009/1/12                   CCNC 2009 / Jing‐Kai Lou                               4
Is Social Moderation good enough?
• Advantages of social moderation system:
      1. Fewer official moderators
      2. Detecting inappropriate content quickly


• BUT, the number of the reports is still large.
      • Even 1% uploading photos in Flickr are problematic,
        there are about 43,200 reports each day.
• Can we help?
2009/1/12                 CCNC 2009 / Jing‐Kai Lou            5
Social Moderation Automation
• This is our motivation for proposing social
  moderation automation, which automatically
  summarizes the reports submitted by users.

• A preprocess:
  For eliminating manual inspection by official
  moderators as much as possible.


2009/1/12          CCNC 2009 / Jing‐Kai Lou       6
There is an intuitive way…
• Count-based Scheme identifies misbehaving users by
  considering the number of accusations (reports).




                                                     37
                3                                         47
 These photos are accused no                   These photos are accused
 more than (N =20) users                       more than (N =20) users
2009/1/12               CCNC 2009 / Jing‐Kai Lou                          7
However, there are many colluders…
 2009/1/12   CCNC 2009 / Jing‐Kai Lou   8
Not All Users Are Trustable
• While most users report responsibly, colluders
  report fake results to gain some benefits.
• Counted-based scheme may misidentify!




2009/1/12             CCNC 2009 / Jing‐Kai Lou   9
Research Question

• CAN we automatically infers which
  accusations (reports) are fair or malicious?

• Need a better automation scheme to deal with
  collusion attacks




2009/1/12           CCNC 2009 / Jing‐Kai Lou     10
Our Scheme
• Community-based scheme analyzes the
  accusation relations between the accusing
  users and accused users.

• Based on the derived information, the scheme
  infers whether the accusations are fair or
  malicious;
    that is, it distinguishes users that genuinely
    misbehave from victims of collusion attacks.
2009/1/12               CCNC 2009 / Jing‐Kai Lou     11
Our Contributions
• The evaluation results show that our scheme
      – Achieves accuracy rate higher than 90%

      – Prevents at least 90% victims from collusion
        attacks




2009/1/12               CCNC 2009 / Jing‐Kai Lou       12
Accusation Relation
• Accusation Relation(R): a subset of A x A,
  A := {reporters, UGC creators}
• E.g. 5 users in this system, namely U1, U2, U3, U4, U5
• Accusation Relation Matrix(M):        User 1    2   3             4   5
   – U1 accuses (reports) U2
                                          1   0   1   0             0   0
   – U2 accuses U4
                                          2   0   0   0             1   0
   – U3 accuses U2 & U5
   – U4 accuses none                      3   0   1   0             0   1
   – U5 accuses U2                        4 0     0   0             0   0
                                                    5   0   1   0   0   0

2009/1/12                CCNC 2009 / Jing‐Kai Lou                       13
Accusing Graph
• Input for our community-based scheme
• Accusing Graph(G):
      – An undirected bipartite graph G(A+B, E)
      – A: {accusing identity of users}
      – B: {accused identity of users}
            User   1    2   3        4         5
             1     0    1   0        0         0
             2     0    0   0        1         0
             3     0    1   0        0         1
             4     0    0   0        0         0
             5     0    1   0        0         0
2009/1/12                   CCNC 2009 / Jing‐Kai Lou   14
Meanings of Nodes

                                                           V

                            C
                                                           L   Identity of accused user
Identity of accusing user
•   Colluders                                              O   •   Victim
•   Careless accuser                                           •   Unfortunate user
•   Honest accuser                                         M   •   Misbehaving user
•   User doesn’t accuse                                        •   Low-abiding user
                            H
                                                           L


                                                           M


     2009/1/12                  CCNC 2009 / Jing‐Kai Lou                         15
Accusing Community
• Adopting Girvan-Newman Algorithm to detect the communities
  and the inter-community edges




                                                                                ge
                                                                           y ed
                                                                      it
                                                                  m un
                                                             om
                                                        er -c
                                                    Int



2009/1/12                CCNC 2009 / Jing‐Kai Lou                           16
Inter-community edge
• Property 1:
    It is unlikely that an inter-community edge is an accusing edge
    between a colluder and a victim.
• Property 2:
    It is unlikely that an inter-community edge is an accusing edge
    between a careless accuser and an unfortunate user.
• Property 3:
    An inter-community edge most likely is an accusing edge
    between an honest accuser and a misbehaving user.



2009/1/12                  CCNC 2009 / Jing‐Kai Lou               17
Features for each User
• inter-community edges    fair accusations
• Base on the inter-community edges, we design
  features for nodes
   – Incoming Accusation, IA(k) = 2,
      – Outgoing Accusation, OA(k) = 5
                  a
                                                     k
                  b


                      c
                                                         W = {a, b, c}
2009/1/12                 CCNC 2009 / Jing‐Kai Lou                       18
Clustering (IA, OA) pairs
                                                                                                    Picked
Outgoing Accusation




                                  Unpicked                Incoming Accusation


                                     Unpicked unfortunat users                     Picked Unfortunate users

                                     Unpicked misbehaving users                    Picked misbehaving users

                                     Unpicked victims                              Picked victims
                      2009/1/12                         CCNC 2009 / Jing‐Kai Lou                              19
Algorithm
1. Partitioning accusing graph into communities.

2. Computing the feature pair (IA, OA) of each user

3. Clustering based on their (IA, OA) pairs, and label
   users in the cluster with larger (IA, OA) as
   misbehaving users.



2009/1/12             CCNC 2009 / Jing‐Kai Lou        20
Simulation Setup
• We use simulations to evaluate the performance of
  our scheme in detecting real misbehaving users in a
  social moderation system.

• Simulation Assumption:
1. A honest user should only accuses users that
   definitely misbehave.
2. A colluder accuses victims.
3. All users including colluders have a probability of
   making an accusation by mistake.
2009/1/12              CCNC 2009 / Jing‐Kai Lou          21
Evaluation Metric
• What we care is, False Negative
      – Misidentifying victims as misbehaving users


• Collusion Resistance




2009/1/12               CCNC 2009 / Jing‐Kai Lou      22
Effect of #(Misbehaving users)
                       Our method
  Count-based method




2009/1/12                           CCNC 2009 / Jing‐Kai Lou   23
Conclusion
• We propose a community-based scheme based on the
  community structure of an accusing graph.

• The results show that the collusion resistance of our scheme is
  around 90%.


• We believe that collusion-resistant schemes will play an
  important role in the design of social moderation systems for
  Web 2.0 services



2009/1/12                 CCNC 2009 / Jing‐Kai Lou                24
Thank you for your listening



            Q&A

More Related Content

More from Academia Sinica

Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client Gaming
Academia Sinica
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Academia Sinica
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired Comparisons
Academia Sinica
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming System
Academia Sinica
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Academia Sinica
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game Addictiveness
Academia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
Academia Sinica
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Academia Sinica
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
Academia Sinica
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar Trajectory
Academia Sinica
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessAcademia Sinica
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Academia Sinica
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player Interaction
Academia Sinica
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Academia Sinica
 
An Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game HoursAn Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game Hours
Academia Sinica
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG Perspective
Academia Sinica
 
An Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP GamesAn Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP Games
Academia Sinica
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking Schemes
Academia Sinica
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Academia Sinica
 
Game Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold LearningGame Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold Learning
Academia Sinica
 

More from Academia Sinica (20)

Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client Gaming
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired Comparisons
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming System
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game Addictiveness
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar Trajectory
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player Interaction
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
 
An Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game HoursAn Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game Hours
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG Perspective
 
An Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP GamesAn Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP Games
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking Schemes
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of Warcraft
 
Game Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold LearningGame Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold Learning
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

A Collusion-Resistant Automation Scheme for Social Moderation Systems

  • 1. CCNC A Collusion-Resistant Automation Scheme for Social Moderation Systems Jing-Kai Lou12, Kuan-Ta Chen1, Chin-Laung Lei2 Institute of Information Science, Academia Sinica1 Department of Electrical Engineering, National Taiwan University2
  • 2. The Rise of User-Generated Content • eMarketer projects that the number of US UGC creators will rise to 108 million in 2012, from 77 million in 2007. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 2
  • 3. Inappropriate UGC • While most UGC creators behave responsibly, a minority of creators may upload inappropriate content, such like • pictures that violate copyright laws • splatter movies • … • Content censorship is essential for Web 2.0 services • One Solution: • hiring lots of official moderators • But, such high labor cost is a great burden to the service provider • Another Solution: Social moderation has been proposed to solve the content censorship problem 2009/1/12 CCNC 2009 / Jing‐Kai Lou 3
  • 4. Social Moderation System X • A user-assist moderation O X X • Every user is a reviewer! ? ?? !? Official moderators  inspect and evaluate  You report/accuse  what your report while browsing Blogger Album Video 2009/1/12 CCNC 2009 / Jing‐Kai Lou 4
  • 5. Is Social Moderation good enough? • Advantages of social moderation system: 1. Fewer official moderators 2. Detecting inappropriate content quickly • BUT, the number of the reports is still large. • Even 1% uploading photos in Flickr are problematic, there are about 43,200 reports each day. • Can we help? 2009/1/12 CCNC 2009 / Jing‐Kai Lou 5
  • 6. Social Moderation Automation • This is our motivation for proposing social moderation automation, which automatically summarizes the reports submitted by users. • A preprocess: For eliminating manual inspection by official moderators as much as possible. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 6
  • 7. There is an intuitive way… • Count-based Scheme identifies misbehaving users by considering the number of accusations (reports). 37 3 47 These photos are accused no These photos are accused more than (N =20) users more than (N =20) users 2009/1/12 CCNC 2009 / Jing‐Kai Lou 7
  • 8. However, there are many colluders… 2009/1/12 CCNC 2009 / Jing‐Kai Lou 8
  • 9. Not All Users Are Trustable • While most users report responsibly, colluders report fake results to gain some benefits. • Counted-based scheme may misidentify! 2009/1/12 CCNC 2009 / Jing‐Kai Lou 9
  • 10. Research Question • CAN we automatically infers which accusations (reports) are fair or malicious? • Need a better automation scheme to deal with collusion attacks 2009/1/12 CCNC 2009 / Jing‐Kai Lou 10
  • 11. Our Scheme • Community-based scheme analyzes the accusation relations between the accusing users and accused users. • Based on the derived information, the scheme infers whether the accusations are fair or malicious; that is, it distinguishes users that genuinely misbehave from victims of collusion attacks. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 11
  • 12. Our Contributions • The evaluation results show that our scheme – Achieves accuracy rate higher than 90% – Prevents at least 90% victims from collusion attacks 2009/1/12 CCNC 2009 / Jing‐Kai Lou 12
  • 13. Accusation Relation • Accusation Relation(R): a subset of A x A, A := {reporters, UGC creators} • E.g. 5 users in this system, namely U1, U2, U3, U4, U5 • Accusation Relation Matrix(M): User 1 2 3 4 5 – U1 accuses (reports) U2 1 0 1 0 0 0 – U2 accuses U4 2 0 0 0 1 0 – U3 accuses U2 & U5 – U4 accuses none 3 0 1 0 0 1 – U5 accuses U2 4 0 0 0 0 0 5 0 1 0 0 0 2009/1/12 CCNC 2009 / Jing‐Kai Lou 13
  • 14. Accusing Graph • Input for our community-based scheme • Accusing Graph(G): – An undirected bipartite graph G(A+B, E) – A: {accusing identity of users} – B: {accused identity of users} User 1 2 3 4 5 1 0 1 0 0 0 2 0 0 0 1 0 3 0 1 0 0 1 4 0 0 0 0 0 5 0 1 0 0 0 2009/1/12 CCNC 2009 / Jing‐Kai Lou 14
  • 15. Meanings of Nodes V C L Identity of accused user Identity of accusing user • Colluders O • Victim • Careless accuser • Unfortunate user • Honest accuser M • Misbehaving user • User doesn’t accuse • Low-abiding user H L M 2009/1/12 CCNC 2009 / Jing‐Kai Lou 15
  • 16. Accusing Community • Adopting Girvan-Newman Algorithm to detect the communities and the inter-community edges ge y ed it m un om er -c Int 2009/1/12 CCNC 2009 / Jing‐Kai Lou 16
  • 17. Inter-community edge • Property 1: It is unlikely that an inter-community edge is an accusing edge between a colluder and a victim. • Property 2: It is unlikely that an inter-community edge is an accusing edge between a careless accuser and an unfortunate user. • Property 3: An inter-community edge most likely is an accusing edge between an honest accuser and a misbehaving user. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 17
  • 18. Features for each User • inter-community edges fair accusations • Base on the inter-community edges, we design features for nodes – Incoming Accusation, IA(k) = 2, – Outgoing Accusation, OA(k) = 5 a k b c W = {a, b, c} 2009/1/12 CCNC 2009 / Jing‐Kai Lou 18
  • 19. Clustering (IA, OA) pairs Picked Outgoing Accusation Unpicked Incoming Accusation Unpicked unfortunat users Picked Unfortunate users Unpicked misbehaving users Picked misbehaving users Unpicked victims Picked victims 2009/1/12 CCNC 2009 / Jing‐Kai Lou 19
  • 20. Algorithm 1. Partitioning accusing graph into communities. 2. Computing the feature pair (IA, OA) of each user 3. Clustering based on their (IA, OA) pairs, and label users in the cluster with larger (IA, OA) as misbehaving users. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 20
  • 21. Simulation Setup • We use simulations to evaluate the performance of our scheme in detecting real misbehaving users in a social moderation system. • Simulation Assumption: 1. A honest user should only accuses users that definitely misbehave. 2. A colluder accuses victims. 3. All users including colluders have a probability of making an accusation by mistake. 2009/1/12 CCNC 2009 / Jing‐Kai Lou 21
  • 22. Evaluation Metric • What we care is, False Negative – Misidentifying victims as misbehaving users • Collusion Resistance 2009/1/12 CCNC 2009 / Jing‐Kai Lou 22
  • 23. Effect of #(Misbehaving users) Our method Count-based method 2009/1/12 CCNC 2009 / Jing‐Kai Lou 23
  • 24. Conclusion • We propose a community-based scheme based on the community structure of an accusing graph. • The results show that the collusion resistance of our scheme is around 90%. • We believe that collusion-resistant schemes will play an important role in the design of social moderation systems for Web 2.0 services 2009/1/12 CCNC 2009 / Jing‐Kai Lou 24
  • 25. Thank you for your listening Q&A