SlideShare a Scribd company logo
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Gaming in Reputation systems
Anjan Goswami
June 9, 2011
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
What is Reputation System?
Computes a reputation score of entities in a domain.
Critical for many applications such as e-commerce.
Domain can often be treated as a graph or network.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Examples
Epinion (product reviews.)
Tripadvisor (hotel reviews.)
Google (search results.)
eBay (seller’s trust.)
Amazon (merchant’s trust.)
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Relationship with Recommandation systems
Conceptually similar.
Goals are different.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Objective
A brief introduction to reputation systems.
A discussion on page ranking.
A discussion on feedback ranking.
Attacks on reputation systems.
Making robust reputation systems.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
A naive page rank
πv =
(w,v)∈E
πw
dw
v
πv = 1
πv ≥ 0 ∀v
dw is number of out links.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
A better page rank
πv = (1 − ϵ)(
(w,v)∈E
πw
dw
) +
ϵ
N
v
πv = 1
πv ≥ 0 ∀v
N is total number of web pages.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Collusion in page rank
Number of hotels linking each other.
Page rank in the collusive community will be high.
Zero sum game between search engine companies and seo
companies.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Feedback based reputation system
The mechanism asks every buyer to provide feedback.
Every feedback is used to update the seller’s reputation.
A feedback score is computed based on some features related
to feedbacks.
A Bayesian scheme can be used.
Example: eBay, RentACoder, Slashdot
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Features for reputation score
The percentage of positive feedback received by the user.
The number of unique users who left positive feedback.
The number of unique users who left negative feedback.
The total number of positive feedback received for all
transactions.
The average of the ratings for the additional dimensions,
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Bayesian reputation
The posterior probability of the reputation of a product of
type θ
Given the feedback qj ∈ Q
p(θ|qj ) =
p(qj |θ)p(θ)
p(qj)
p(qj ) is the probability that buyer observes a signal qj ∈ Q
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Threats to Reputation systems
Sybil attacks (Bad mouthing or Ballot stuffing).
Bootstrap issues.
Presentation bias.
Attacks on underlying network. (DoS)
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Sybil Attack
Bad mouthing: Falsely produce negative feedback on others.
Ballot stuffing: Produce positive feedback on self.
Collusions.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Bootstrap issues
Disadvantage of new comers.
Managing reputation over time.
Cold start in recommendation systems.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Presentation bias
Bias on current reputation.
Conceptually same as positional bias in Search.
Lots of literature on positional bias models.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
P2p network
Symmetric: one in which, an elements reputation depends
solely on the topology of the trust graph, and not on the
naming or identity of nodes
Asymmetric: one in which, there are specifically trusted nodes
from which all reputation values propagate
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Symmetric network
Symmetric: Sybil elements to create a copy of the existing
graph representing trust relationships.
cannot distinguish original nodes from the copies.
Not Sybil proof.
Example: Google page rank.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Asymmetric network
Asymmetric: each entity separately computes a trust value
along their unique paths to every other identity in the system.
Trusted nodes cannot be impersonated, so no gain by
duplicating the graph.
Sybil proof.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Sybil attack on search engine
Community of web sites having out links pointing to each
others.
Many websites with same or nearly content but different url.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Sybil attack in online marketplaces
Bad mouthing or ballot stuffing.
Fake account and purchasing low priced items from a seller.
Writing positive review of the seller and negative review of
competitor.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
How to defend against Sybil attacks
Near duplicate detection in search.
Linked spam community detection.
Demoting reputation of linked spam sites.
Detect spam blogs or spam sites.
Find multiple low price purchase for a seller.
Bad buyer experience.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Incentive compatible reputation
Mechanism design problem.
Design a system where gaming is costly.
Lots of literature on incentive compatible reputation.
Basic idea is to formulate an optimization problem.
Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems
Conclusion
Mechanism design.
Machine learning.
Algorithms.
Challenging area in computer science.

More Related Content

Viewers also liked

La carta de encargo como oportunidad en el plan de desarrollo profesional
La carta de encargo como oportunidad en el plan de desarrollo profesionalLa carta de encargo como oportunidad en el plan de desarrollo profesional
La carta de encargo como oportunidad en el plan de desarrollo profesionalJosé Manuel Vecino P.
 
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen Transformator Design Group
 
Haal de online wereld in uw les.
Haal de online wereld in uw les.Haal de online wereld in uw les.
Haal de online wereld in uw les.Bonopoly
 
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)Bonopoly
 
Freetochoose
FreetochooseFreetochoose
FreetochooseJaco Ba
 
Birgit Mager - Journey map into the future
Birgit Mager - Journey map into the futureBirgit Mager - Journey map into the future
Birgit Mager - Journey map into the futureService Design Network
 
Ash Maurya, Running Lean Presentation at Lean Startup SXSW
Ash Maurya, Running Lean Presentation at Lean Startup SXSWAsh Maurya, Running Lean Presentation at Lean Startup SXSW
Ash Maurya, Running Lean Presentation at Lean Startup SXSW500 Startups
 
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, AustinJoe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin500 Startups
 
Wie kann ich mich auf einen Testkauf bewerben?
Wie kann ich mich auf einen Testkauf bewerben?Wie kann ich mich auf einen Testkauf bewerben?
Wie kann ich mich auf einen Testkauf bewerben?Multi-Value Europe
 

Viewers also liked (9)

La carta de encargo como oportunidad en el plan de desarrollo profesional
La carta de encargo como oportunidad en el plan de desarrollo profesionalLa carta de encargo como oportunidad en el plan de desarrollo profesional
La carta de encargo como oportunidad en el plan de desarrollo profesional
 
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen
Frukostseminarium 4 september: Växthusfrukost med Arbetsförmedlingen
 
Haal de online wereld in uw les.
Haal de online wereld in uw les.Haal de online wereld in uw les.
Haal de online wereld in uw les.
 
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)
Bevrijd de ziel in uw organisatie (keynote tijdens Puntig)
 
Freetochoose
FreetochooseFreetochoose
Freetochoose
 
Birgit Mager - Journey map into the future
Birgit Mager - Journey map into the futureBirgit Mager - Journey map into the future
Birgit Mager - Journey map into the future
 
Ash Maurya, Running Lean Presentation at Lean Startup SXSW
Ash Maurya, Running Lean Presentation at Lean Startup SXSWAsh Maurya, Running Lean Presentation at Lean Startup SXSW
Ash Maurya, Running Lean Presentation at Lean Startup SXSW
 
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, AustinJoe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin
Joe Zadeh, Airbnb presentation at Lean Startup SXSW, Austin
 
Wie kann ich mich auf einen Testkauf bewerben?
Wie kann ich mich auf einen Testkauf bewerben?Wie kann ich mich auf einen Testkauf bewerben?
Wie kann ich mich auf einen Testkauf bewerben?
 

Similar to Reputation systems

Online feedback correlation using clustering
Online feedback correlation using clusteringOnline feedback correlation using clustering
Online feedback correlation using clusteringawesomesos
 
How to Fix Failing SEO Efforts
How to Fix Failing SEO EffortsHow to Fix Failing SEO Efforts
How to Fix Failing SEO EffortsAffiliate Summit
 
An approach to app security - For beginners
An approach to app security - For beginnersAn approach to app security - For beginners
An approach to app security - For beginnersvodQA
 
Getting the Most out of Linkscape
Getting the Most out of LinkscapeGetting the Most out of Linkscape
Getting the Most out of LinkscapeNick Gerner
 
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search Rhea Drysdale
 
Recommender Systems in E-Commerce
Recommender Systems in E-CommerceRecommender Systems in E-Commerce
Recommender Systems in E-CommerceRoger Chen
 
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...eMadrid network
 
Web Page Ranking using Machine Learning
Web Page Ranking using Machine LearningWeb Page Ranking using Machine Learning
Web Page Ranking using Machine LearningPradip Rahul
 
Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConmattthemathman
 
Search engine optimization (seo) workshop 2
Search engine optimization (seo) workshop 2Search engine optimization (seo) workshop 2
Search engine optimization (seo) workshop 2Pinny
 
Recsys2016 Tutorial by Xavier and Deepak
Recsys2016 Tutorial by Xavier and DeepakRecsys2016 Tutorial by Xavier and Deepak
Recsys2016 Tutorial by Xavier and DeepakDeepak Agarwal
 
Web Credibility Variables Public
Web Credibility Variables PublicWeb Credibility Variables Public
Web Credibility Variables Publicwinniejjw
 
Advanced Web Analytics - Penn State Web Conference 2010
Advanced Web Analytics - Penn State Web Conference 2010Advanced Web Analytics - Penn State Web Conference 2010
Advanced Web Analytics - Penn State Web Conference 2010Shelby Thayer
 
SEO-HIGH TRAFFIC ROUTING
SEO-HIGH TRAFFIC ROUTINGSEO-HIGH TRAFFIC ROUTING
SEO-HIGH TRAFFIC ROUTINGBUDNET
 
Optimizing Your Website in a Port Penguin World
Optimizing Your Website in a Port Penguin WorldOptimizing Your Website in a Port Penguin World
Optimizing Your Website in a Port Penguin WorldInnoTech
 
Free Traffic Seo Smo 101 (Search Engine Social Media Optimization) Present...
Free Traffic  Seo Smo 101 (Search Engine   Social Media Optimization) Present...Free Traffic  Seo Smo 101 (Search Engine   Social Media Optimization) Present...
Free Traffic Seo Smo 101 (Search Engine Social Media Optimization) Present...jward5519
 
Internet 信息检索中的数学
Internet 信息检索中的数学Internet 信息检索中的数学
Internet 信息检索中的数学Xu jiakon
 
06 conclusions and whats ahead
06 conclusions and whats ahead06 conclusions and whats ahead
06 conclusions and whats aheadMeasureWorks
 

Similar to Reputation systems (20)

Online feedback correlation using clustering
Online feedback correlation using clusteringOnline feedback correlation using clustering
Online feedback correlation using clustering
 
How to Fix Failing SEO Efforts
How to Fix Failing SEO EffortsHow to Fix Failing SEO Efforts
How to Fix Failing SEO Efforts
 
An approach to app security - For beginners
An approach to app security - For beginnersAn approach to app security - For beginners
An approach to app security - For beginners
 
Getting the Most out of Linkscape
Getting the Most out of LinkscapeGetting the Most out of Linkscape
Getting the Most out of Linkscape
 
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search
SMX West 2011 - Ratings, Reviews & Reputation: Their Growing Impact On Search
 
Recommender Systems in E-Commerce
Recommender Systems in E-CommerceRecommender Systems in E-Commerce
Recommender Systems in E-Commerce
 
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...
V Jornadas eMadrid sobre “Educación Digital”. Roberto Centeno, Universidad Na...
 
Web Page Ranking using Machine Learning
Web Page Ranking using Machine LearningWeb Page Ranking using Machine Learning
Web Page Ranking using Machine Learning
 
Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozCon
 
Search engine optimization (seo) workshop 2
Search engine optimization (seo) workshop 2Search engine optimization (seo) workshop 2
Search engine optimization (seo) workshop 2
 
Recsys2016 Tutorial by Xavier and Deepak
Recsys2016 Tutorial by Xavier and DeepakRecsys2016 Tutorial by Xavier and Deepak
Recsys2016 Tutorial by Xavier and Deepak
 
Web Credibility Variables Public
Web Credibility Variables PublicWeb Credibility Variables Public
Web Credibility Variables Public
 
Advanced Web Analytics - Penn State Web Conference 2010
Advanced Web Analytics - Penn State Web Conference 2010Advanced Web Analytics - Penn State Web Conference 2010
Advanced Web Analytics - Penn State Web Conference 2010
 
SEO-HIGH TRAFFIC ROUTING
SEO-HIGH TRAFFIC ROUTINGSEO-HIGH TRAFFIC ROUTING
SEO-HIGH TRAFFIC ROUTING
 
Optimizing Your Website in a Port Penguin World
Optimizing Your Website in a Port Penguin WorldOptimizing Your Website in a Port Penguin World
Optimizing Your Website in a Port Penguin World
 
Free Traffic Seo Smo 101 (Search Engine Social Media Optimization) Present...
Free Traffic  Seo Smo 101 (Search Engine   Social Media Optimization) Present...Free Traffic  Seo Smo 101 (Search Engine   Social Media Optimization) Present...
Free Traffic Seo Smo 101 (Search Engine Social Media Optimization) Present...
 
Mazhiming
MazhimingMazhiming
Mazhiming
 
Audit
AuditAudit
Audit
 
Internet 信息检索中的数学
Internet 信息检索中的数学Internet 信息检索中的数学
Internet 信息检索中的数学
 
06 conclusions and whats ahead
06 conclusions and whats ahead06 conclusions and whats ahead
06 conclusions and whats ahead
 

More from Anjan Goswami

Learning to Diversify for E-commerce Search with Multi-Armed Bandit}
Learning to Diversify for E-commerce Search with Multi-Armed Bandit}Learning to Diversify for E-commerce Search with Multi-Armed Bandit}
Learning to Diversify for E-commerce Search with Multi-Armed Bandit}Anjan Goswami
 
Discovery In Commerce Search
Discovery In Commerce SearchDiscovery In Commerce Search
Discovery In Commerce SearchAnjan Goswami
 
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...Anjan Goswami
 
Controlled Experiments for Decision-Making in e-Commerce Search
Controlled Experiments for Decision-Making in e-Commerce SearchControlled Experiments for Decision-Making in e-Commerce Search
Controlled Experiments for Decision-Making in e-Commerce SearchAnjan Goswami
 
Spelling correction systems for e-commerce platforms
Spelling correction systems for e-commerce platformsSpelling correction systems for e-commerce platforms
Spelling correction systems for e-commerce platformsAnjan Goswami
 
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...Anjan Goswami
 

More from Anjan Goswami (7)

Learning to Diversify for E-commerce Search with Multi-Armed Bandit}
Learning to Diversify for E-commerce Search with Multi-Armed Bandit}Learning to Diversify for E-commerce Search with Multi-Armed Bandit}
Learning to Diversify for E-commerce Search with Multi-Armed Bandit}
 
Discovery In Commerce Search
Discovery In Commerce SearchDiscovery In Commerce Search
Discovery In Commerce Search
 
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...
Machine-Learned Ranking Algorithms for E-commerce Search and Recommendation A...
 
Controlled Experiments for Decision-Making in e-Commerce Search
Controlled Experiments for Decision-Making in e-Commerce SearchControlled Experiments for Decision-Making in e-Commerce Search
Controlled Experiments for Decision-Making in e-Commerce Search
 
Spelling correction systems for e-commerce platforms
Spelling correction systems for e-commerce platformsSpelling correction systems for e-commerce platforms
Spelling correction systems for e-commerce platforms
 
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...
Topic Models Based Understanding of Supply and Demand Side of an eCommerce En...
 
Clustering
ClusteringClustering
Clustering
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Reputation systems

  • 1. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Gaming in Reputation systems Anjan Goswami June 9, 2011
  • 2. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems What is Reputation System? Computes a reputation score of entities in a domain. Critical for many applications such as e-commerce. Domain can often be treated as a graph or network.
  • 3. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Examples Epinion (product reviews.) Tripadvisor (hotel reviews.) Google (search results.) eBay (seller’s trust.) Amazon (merchant’s trust.)
  • 4. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Relationship with Recommandation systems Conceptually similar. Goals are different.
  • 5. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Objective A brief introduction to reputation systems. A discussion on page ranking. A discussion on feedback ranking. Attacks on reputation systems. Making robust reputation systems.
  • 6. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems A naive page rank πv = (w,v)∈E πw dw v πv = 1 πv ≥ 0 ∀v dw is number of out links.
  • 7. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems A better page rank πv = (1 − ϵ)( (w,v)∈E πw dw ) + ϵ N v πv = 1 πv ≥ 0 ∀v N is total number of web pages.
  • 8. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Collusion in page rank Number of hotels linking each other. Page rank in the collusive community will be high. Zero sum game between search engine companies and seo companies.
  • 9. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Feedback based reputation system The mechanism asks every buyer to provide feedback. Every feedback is used to update the seller’s reputation. A feedback score is computed based on some features related to feedbacks. A Bayesian scheme can be used. Example: eBay, RentACoder, Slashdot
  • 10. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Features for reputation score The percentage of positive feedback received by the user. The number of unique users who left positive feedback. The number of unique users who left negative feedback. The total number of positive feedback received for all transactions. The average of the ratings for the additional dimensions,
  • 11. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Bayesian reputation The posterior probability of the reputation of a product of type θ Given the feedback qj ∈ Q p(θ|qj ) = p(qj |θ)p(θ) p(qj) p(qj ) is the probability that buyer observes a signal qj ∈ Q
  • 12. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Threats to Reputation systems Sybil attacks (Bad mouthing or Ballot stuffing). Bootstrap issues. Presentation bias. Attacks on underlying network. (DoS)
  • 13. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Sybil Attack Bad mouthing: Falsely produce negative feedback on others. Ballot stuffing: Produce positive feedback on self. Collusions.
  • 14. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Bootstrap issues Disadvantage of new comers. Managing reputation over time. Cold start in recommendation systems.
  • 15. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Presentation bias Bias on current reputation. Conceptually same as positional bias in Search. Lots of literature on positional bias models.
  • 16. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems P2p network Symmetric: one in which, an elements reputation depends solely on the topology of the trust graph, and not on the naming or identity of nodes Asymmetric: one in which, there are specifically trusted nodes from which all reputation values propagate
  • 17. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Symmetric network Symmetric: Sybil elements to create a copy of the existing graph representing trust relationships. cannot distinguish original nodes from the copies. Not Sybil proof. Example: Google page rank.
  • 18. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Asymmetric network Asymmetric: each entity separately computes a trust value along their unique paths to every other identity in the system. Trusted nodes cannot be impersonated, so no gain by duplicating the graph. Sybil proof.
  • 19. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Sybil attack on search engine Community of web sites having out links pointing to each others. Many websites with same or nearly content but different url.
  • 20. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Sybil attack in online marketplaces Bad mouthing or ballot stuffing. Fake account and purchasing low priced items from a seller. Writing positive review of the seller and negative review of competitor.
  • 21. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems How to defend against Sybil attacks Near duplicate detection in search. Linked spam community detection. Demoting reputation of linked spam sites. Detect spam blogs or spam sites. Find multiple low price purchase for a seller. Bad buyer experience.
  • 22. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Incentive compatible reputation Mechanism design problem. Design a system where gaming is costly. Lots of literature on incentive compatible reputation. Basic idea is to formulate an optimization problem.
  • 23. Introduction Topics Page rank Feedback based reputation Threats and Robust Reputation systems Conclusion Mechanism design. Machine learning. Algorithms. Challenging area in computer science.