CN107808324B - Online commodity credit value calculation method, network transaction platform and computer - Google Patents
Online commodity credit value calculation method, network transaction platform and computer Download PDFInfo
- Publication number
- CN107808324B CN107808324B CN201710996982.8A CN201710996982A CN107808324B CN 107808324 B CN107808324 B CN 107808324B CN 201710996982 A CN201710996982 A CN 201710996982A CN 107808324 B CN107808324 B CN 107808324B
- Authority
- CN
- China
- Prior art keywords
- evaluation
- representing
- value
- user
- malicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to the technical field of electronic commerce, and discloses an online commodity credit value calculation method, a network transaction platform and a computer, which comprise the following steps: malicious evaluation detection, user interest evaluation and reputation value calculation. The invention utilizes the two-phase detection theory to detect the slight change of the evaluation model, can process the condition when the malicious user carries out malicious evaluation on all commodities, and can also process the condition when the malicious user only carries out the malicious evaluation on the target commodities. According to the method and the system, the similarity between the target item and the user evaluation item is compared to determine the weights of different user evaluations, so that the degree of interest of the user in the target commodity and the reliability of the user can be more accurately reflected.
Description
Technical Field
The invention belongs to the technical field of electronic commerce, and particularly relates to a credit value calculation method of an online commodity, a network transaction platform and a computer.
Background
With the vigorous development of electronic commerce (eBay, Amazon, Taobao, Youtube, Netflix and other network transaction platforms), more than half of the population using the Internet in most regions of the world has experience of online shopping according to the report of the electronic commerce foundation. Electronic commerce has great potential to promote economic development and bring convenience to daily life of people. As more and more goods and services are provided by the network trading platform, the selection range of consumers is also larger and larger. But at the same time, interest-oriented sellers are emerging to offer counterfeit goods. Driven by economic interest, a large number of sellers would like to give their own product an unusually high rating, but have a low rating of their competitor's goods; abnormal evaluations are referred to as malicious evaluations, and those who give malicious evaluations are referred to as attackers. When attackers carry out malicious evaluation on various commodities, the server side can easily determine the credibility of the attackers according to the evaluation history and the existing work of the attackers, and the malicious evaluation of the attackers can be effectively detected. Once an attacker provides only a malicious evaluation of a target commodity (or a small group of target commodities) and gives only a normal evaluation of other commodities, an additional solution is needed. When the malicious evaluation is intensive, it means that a large number of evaluations of the reputation value of the target commodity can be given quickly in a short time. Since the evaluation data is open to all people, an attacker can monitor the evaluation data and give a malicious evaluation. Making it possible for an attacker to manipulate the distribution of malicious evaluations to follow any pattern, with the worst case being that the malicious evaluations are evenly distributed among all the evaluations. How to determine the weights of different user ratings; the weights reflect the reliability of the user. Different users may have different preferences, however, the interests of a user are often concentrated on some topics or categories, rather than being spread across all items; the weight of the rating should reflect the degree of interest of the user in the target good. A patent application "a dynamic Web service trust evaluation method based on user honesty" proposed by southeast university (application No. 2012102796.4 application publication No. CN 102880637B) discloses a dynamic Web service trust evaluation method based on user honesty, which comprises the following specific steps: firstly, automatically mining user preference according to the requirement of a user on service; the method comprises the steps of dividing similar user groups according to user preferences, carrying out evaluation consistency clustering in the preference similar user groups, distinguishing honest users and malicious users, calculating the user honest degree of the preference similar user groups, and dynamically adjusting the weight of subjective evaluation in comprehensive trust calculation according to the change of the user honest degree, so that the influence of the malicious evaluation on Web service trust evaluation is reduced, the accuracy of the trust evaluation is improved, and the user is better guided to select trusted services. The patent application has the following disadvantages: how to deal with the situation that a malicious user only evaluates a target commodity but not all commodities is not considered, once the malicious user only provides malicious evaluation for the target commodity (or a small group of target commodities) and only gives normal evaluation to other commodities, the model cannot sense slight change of the evaluation model and cannot completely evaluate the reputation value of the commodity, so that the user is possibly misled to make wrong decisions. The patent application "a reputation calculation method in a reputation system" (application number 200710122393.3 application publication number CN 10199683B) proposed by the acoustic research institute of the chinese academy of sciences discloses a reputation calculation method in a reputation system, which comprises the following specific steps: the node i sends a request to surrounding nodes of a node j needing to calculate the reputation, and inquires about the evaluation of the surrounding nodes on the node j; returning evaluation to surrounding nodes; according to the deviation degree of each node and the reliability of the deviation degree, the node i corrects the evaluation given by the evaluation node; and the node i fuses the actual experience of the node i and the service node j with the evaluation of the modified evaluation node, and calculates the final credit. The patent application has the following disadvantages: the method model does not consider how to determine the evaluation weights of different nodes (namely different users), and the evaluation weights can reflect the interest degree of the users in the target commodities and the reliability of the users. The evaluation of the user to the service has a great relationship with the preference of the user, and if the evaluation weight of different users cannot be determined, the evaluation or objective ability credibility of a third party cannot cover the users with different preferences, so that the phenomenon of misjudgment is generated.
In summary, the problems of the prior art are as follows: the existing reputation value technical method does not consider how to process the situation that a malicious user only makes malicious evaluation on target commodities, but not on all commodities; how to determine the weights of different node evaluations is not considered, and the evaluation weights cannot reflect the interest degree of the user in the target commodity and the reliability of the user.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a credit value calculation method of an online commodity, a network transaction platform and a computer.
The invention is realized in this way, and a credit value calculation method of online commodities comprises the steps of carrying out malicious evaluation detection and user interest evaluation by a server, and finally carrying out credit value calculation of the commodities by integrating malicious evaluation detection results and user interest. The credit value calculation method of the online commodity comprises the following steps:
step one, malicious evaluation detection:
(1) the server calculates the target commodity i after receiving the user requesttWhen the credit value is requested, the information about the target commodity i is collectedtThe evaluation values of (1) are arranged in time sequence, and every n evaluation values form a group;
Wherein the content of the first and second substances,represents the jth evaluation value in the kth group, and n represents the number of groups of evaluation values;
Wherein the content of the first and second substances,show giving evaluation valueThe set of users of (a) is,show giving evaluation valueThe user of (1);
Wherein the content of the first and second substances,the intermediate vector is represented by a vector representing the intermediate vector,denotes the jth evaluation value, μ, in the kth groupk-1Denotes an average value of evaluations in the (k-1) th group after deletion of a malicious evaluation, and when k is 1, μ0Represents the average value of the evaluation values in the first packet, N+Is a positive integer sign;
where n represents the number of sets of evaluation values,representing intermediate vectorsMean value of (1), s2The variance of the samples is represented by the average,representing a hypothesis testing method, if the inequality holds, thenIf there is a malicious evaluation, the process is executed (6), otherwise, the process is executedIf no malicious evaluation exists, executing the step (7);
Wherein the content of the first and second substances,to representThe average value of (a) of (b),to representEvaluation mean of (1), μk-1Mean values representing the evaluations in group (k-1) after the malicious evaluation was deleted;
(7) calculating the log-likelihood ratio C using the following equationj:
Wherein, CjA log likelihood ratio, C, representing the jth evaluation value0=0,To representMean value of (a)2To representThe variance of the medium normal distribution is,representing the jth intermediate vector in the kth group,representing intermediate vectorsThe mean value of (a); when C is presentjWhen the content of the carbon dioxide is more than or equal to 0.8,is determined to be an abnormal value,is determined to be a malicious evaluation,is judged as a malicious user and is selected fromDeleting to obtain a normal user set corresponding to the k-th evaluation value groupExecuting the step two;
Step two, evaluating the user interest degree:
Wherein the content of the first and second substances,representing the degree of similarity between the target item and items other than the target item, itIndicating a target commodity, i indicating a commodity other than the target commodity,representing a set of labels, theta representsWhere Σ is a sum sign, rel represents the applied intensity, range 0 to 1, 0 represents no intensity at all, 1 represents the maximum intensity;
(2) calculating the interest d of the user u by using the following formulau:
Wherein d isuRepresenting the user's interest level, ncRepresenting a target item itThe number of the (c) component (a),indicating the number of items that user u has evaluated, sigma indicates a sum symbol,representing the degree of similarity between the target item and items other than the target item,representation collectionThe number of elements in (1);
step three, calculating a reputation value:
(1) target product i is calculated using the following formulatReputation value of (c):
where rep represents the reputation value of the good, itRepresenting the target commodity, k representing the k-th group evaluation value, δ representing the weight of the evaluation in the most recent evaluation group, rel representing the application intensity,set of users u representing deleted malicious users, duWhich represents the level of interest of the user,indicating that user u is about target item itA satisfaction degree of 1 to 5, 1 being very unsatisfactory, 5 being very satisfactory;
(2) target commodity itIs returned to the requested user u.
Further, the hypothesis testing methodRefers to a hypothesis testing method for testing whether the overall variances of two normal random variables are equal,representing a first degree of freedom of 1, a second degree of freedom of n-1, with a degree of confidence of alphaChecking the value, and obtaining the result by looking up an F-distribution table.
wherein s is2Representing the sample variance, n representing the number of sets of evaluation values,representing the jth intermediate vector in the kth group,representing intermediate vectorsIs measured.
Further, said CjThe log-likelihood ratio of (d) means:
wherein the content of the first and second substances,andrespectively represent theta0And theta1Probability density function of yjRepresenting a series of samples, N, generated by a random process of a parameter θ+Are positive integer symbols.
Further, the σ2The specific calculation method is as follows:
wherein σ2To representWhere the variance of the normal distribution, n denotes the number of groups of evaluation values, j denotes the number of evaluation values, Σ is the sum sign,representing the jth intermediate vector in the kth group,representing intermediate vectorsIs measured.
Another object of the present invention is to provide a network trading platform using the reputation value calculation method for online goods.
Another object of the present invention is to provide a computer using the reputation value calculation method for an online good.
Another object of the present invention is to provide a server using the reputation value calculation method for an online good.
Another object of the present invention is to provide a computer program using the reputation value calculation method for an online good.
The invention provides a reputation calculation framework to obtain a reliable reputation value of any online commodity to help consumers make correct purchasing decisions. The framework comprises three modules, namely a malicious rating detection module, an interestingness calculation module and a reputation calculation module. Collected by the data collector, the malicious rating detector may detect malicious ratings by a two-phase detection method. Experimental data show that, in the prior art, when malicious evaluations are not filtered, the average absolute error between a calculation result and an ideal value linearly increases along with the increase of the proportion of the malicious evaluations in all evaluations. The invention can maintain the average absolute error of the calculation result near 0, which shows that the calculated reputation value is very close to an ideal value and can effectively process uniformly distributed malicious evaluation. According to the method and the system, the similarity between the target item and the user evaluation item is compared to determine the weights of different user evaluations, so that the degree of interest of the user in the target commodity and the reliability of the user can be more accurately reflected.
Drawings
Fig. 1 is a flowchart of a reputation value calculation method for an online commodity according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
E-commerce has the experience of online shopping in most of the global areas, and more than half of people using the Internet have the experience of online shopping; electronic commerce has great potential to promote economic development and bring convenience to daily life of people.
The following detailed description of the principles of the invention is provided in connection with the accompanying drawings.
As shown in fig. 1, the method for calculating the reputation value of an online commodity according to an embodiment of the present invention includes the following steps:
s101: malicious evaluation detection;
s102: evaluating the interest degree of the user;
s103: and calculating a reputation value.
The application of the principles of the present invention will now be described in further detail with reference to specific embodiments.
The method for calculating the credit value of the online commodity provided by the embodiment of the invention comprises the following steps:
step one, malicious evaluation detection;
(1) the server calculates the target commodity i after receiving the user requesttWhen the credit value is requested, the information about the target commodity i is collectedtThe evaluation values of (a) are arranged in chronological order, one group for every n evaluation values. The server expresses the evaluation value of the kth group asThe specific expression method is as follows:
wherein the content of the first and second substances,represents the jth evaluation value in the kth group, and n represents the number of groups of evaluation values;
Wherein the content of the first and second substances,show giving evaluation valueThe set of users of (a) is,show giving evaluation valueThe user of (1);
Wherein the content of the first and second substances,the intermediate vector is represented by a vector representing the intermediate vector,denotes the jth evaluation value, μ, in the kth groupk-1Denotes an average value of evaluations in the (k-1) th group after deletion of a malicious evaluation, and when k is 1, μ0Represents the average value of the evaluation values in the first packet, N+Is a positive integer sign;
where n represents the number of sets of evaluation values,representing intermediate vectorsThe average value of (a) of (b),s2the variance of the samples is represented by the average,representing hypothesis testing methodsRefers to a hypothesis testing method for testing whether the overall variances of two normal random variables are equal,representing a first degree of freedom of 1, a second degree of freedom of n-1, with a degree of confidence of alphaChecking the value, and obtaining the result by looking up an F-distribution table. If the inequality is true, thenIf there is a malicious evaluation, the process is executed (6), otherwise, the process is executedIf no malicious evaluation exists, executing (7);
Wherein the content of the first and second substances,to representThe average value of (a) of (b),to representEvaluation mean of (1), μk-1Mean values representing the evaluations in group (k-1) after the malicious evaluation was deleted;
(6) the server calculates the log-likelihood ratio C using the following equationj:
Wherein, C0=0,To representMean value of (a)2To representThe variance of the medium normal distribution is, representing the jth intermediate vector in the kth group,representing intermediate vectorsThe mean value of (a); when C is presentjWhen the content of the carbon dioxide is more than or equal to 0.8,is determined to be an abnormal value,is determined to be a malicious evaluation,is judged as a malicious user and is selected fromDeleting to obtain a normal user set corresponding to the k-th evaluation value groupExecuting the step two;
in the above formula CjA log likelihood ratio, C, representing the jth evaluation valuejSpecific calculation method of log likelihood ratioThe method comprises the following steps:
wherein the content of the first and second substances,andrespectively represent theta0And theta1Probability density function of yjRepresenting a series of samples, N, generated by a random process of a parameter θ+Is a positive integer sign;
Step two: and evaluating the interestingness of the user.
Wherein the content of the first and second substances,representing the degree of similarity between the target item and items other than the target item, itIndicating a target commodity, i indicating a commodity other than the target commodity,representing a set of labels, theta representsWith Σ being a sum sign, rel representing the applied intensity, ranging from 0 to 1, 0 representing no intensity at all, 1 representing maximum intensity;
(2) the server calculates the interest d of the user u by using the following formulau:
Wherein d isuRepresenting the user's interest level, ncRepresenting a target item itThe number of the (c) component (a),indicating the number of items that user u has evaluated, sigma indicates a sum symbol,representing the degree of similarity between the target item and items other than the target item,representation collectionNumber of elements in (1).
Step three: and (3) calculating a reputation value:
(1) the server calculates the target commodity i using the following equationtReputation value of (c):
where rep represents the reputation value of the good, itRepresenting the target commodity, k representing the k-th group evaluation value, δ representing the weight of the evaluation in the most recent evaluation group, rel representing the application intensity,to representSet of users u from which malicious users have been deleted, duWhich represents the level of interest of the user,indicating that user u is about target item itA satisfaction degree of 1 to 5, 1 being very unsatisfactory, 5 being very satisfactory;
(2) the server sends the target commodity itIs returned to the requested user u.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (8)
1. A credit value calculation method of an online commodity is characterized by comprising the following steps:
step one, malicious evaluation detection:
(1) the server calculates the target commodity i after receiving the user requesttWhen the credit value is requested, the information about the target commodity i is collectedtThe evaluation values of (1) are arranged in time sequence, and every n evaluation values form a group;
Wherein the content of the first and second substances,represents the jth evaluation value in the kth group, and n represents the number of groups of evaluation values;
Wherein the content of the first and second substances,show giving evaluation valueThe set of users of (a) is,show giving evaluation valueThe user of (1);
Wherein the content of the first and second substances,the intermediate vector is represented by a vector representing the intermediate vector,denotes the jth evaluation value, μ, in the kth groupk-1Denotes an average value of evaluations in the (k-1) th group after deletion of a malicious evaluation, and when k is 1, μ0To representMean value of evaluation values in the first group, N+Is a positive integer sign;
where n represents the number of sets of evaluation values,representing intermediate vectorsMean value of (1), s2The variance of the samples is represented by the average,representing a hypothesis testing method, if the inequality holds, thenIf there is a malicious evaluation, the process is executed (6), otherwise, the process is executedIf no malicious evaluation exists, executing the step (8);
Wherein the content of the first and second substances,to representThe average value of (a) of (b),to representEvaluation mean of (1), μk-1Mean values representing the evaluations in group (k-1) after the malicious evaluation was deleted;
(7) calculating the log-likelihood ratio C using the following equationj:
Wherein, CjA log likelihood ratio, C, representing the jth evaluation value0=0,To representMean value of (a)2To representThe variance of the medium normal distribution is,representing the jth intermediate vector in the kth group,representing intermediate vectorsThe mean value of (a); when C is presentjWhen the content of the carbon dioxide is more than or equal to 0.8,is determined to be an abnormal value,is determined to be a malicious evaluation,is judged as a malicious user and is selected fromDeleting to obtain a normal user set corresponding to the k-th evaluation value groupExecuting the step two;
Step two, evaluating the user interest degree:
Wherein the content of the first and second substances,representing the degree of similarity between the target item and items other than the target item, itIndicating a target commodity, i indicating a commodity other than the target commodity,representing a set of labels, theta representsWhere Σ is a sum sign, rel represents the applied intensity, range 0 to 1, 0 represents no intensity at all, 1 represents the maximum intensity;
(2) calculating the interest d of the user u by using the following formulau:
Wherein d isuRepresenting the user's interest level, ncRepresenting a target item itThe number of the (c) component (a),indicating the number of items that user u has evaluated, sigma indicates a sum symbol,representing the degree of similarity between the target item and items other than the target item,representation collectionThe number of elements in (1);
step three, calculating a reputation value:
(1) target product i is calculated using the following formulatReputation value of (c):
where rep represents the reputation value of the good, itRepresenting the target commodity, k representing the k-th group evaluation value, δ representing the weight of the evaluation in the most recent evaluation group, rel representing the application intensity,set of users u representing deleted malicious users, duIndicates the degree of interest of the user, ru,itIndicating that user u is about target item itA satisfaction degree of 1 to 5, 1 being very unsatisfactory, 5 being very satisfactory;
(2) target commodity itIs returned to the requested user u.
2. The reputation value calculation method of an online good according to claim 1, wherein the hypothesis testing methodRefers to a hypothesis testing method for testing whether the overall variances of two normal random variables are equal,representing a first degree of freedom of 1, a second degree of freedom of n-1, with a degree of confidence of alphaChecking the value, and obtaining the result by looking up an F-distribution table.
3. The reputation value calculation method of an online good according to claim 1, wherein s is2Andis particularly shownThe calculation method comprises the following steps:
4. The method for calculating a reputation value of an online good according to claim 1, wherein C isjThe log-likelihood ratio of (d) means:
5. The method of calculating a reputation value of an online good according to claim 1, wherein σ is the amount of time that the product has been placed on the online good2The specific calculation method is as follows:
6. A network transaction system using the method for calculating the credit value of an online commodity according to any one of claims 1 to 5.
7. A computer using the method for calculating the reputation value of an online good according to any one of claims 1 to 5.
8. A server using the method for calculating the reputation value of an online good according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710996982.8A CN107808324B (en) | 2017-10-20 | 2017-10-20 | Online commodity credit value calculation method, network transaction platform and computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710996982.8A CN107808324B (en) | 2017-10-20 | 2017-10-20 | Online commodity credit value calculation method, network transaction platform and computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107808324A CN107808324A (en) | 2018-03-16 |
CN107808324B true CN107808324B (en) | 2021-05-28 |
Family
ID=61592358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710996982.8A Active CN107808324B (en) | 2017-10-20 | 2017-10-20 | Online commodity credit value calculation method, network transaction platform and computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107808324B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108665339B (en) * | 2018-03-27 | 2021-11-23 | 北京航空航天大学 | E-commerce product reliability index based on subjective emotion measure and implementation method thereof |
CN111915210A (en) * | 2020-08-11 | 2020-11-10 | 曲阜师范大学 | Trust management method in distributed Internet of things based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957062A (en) * | 2014-03-31 | 2014-07-30 | 西安电子科技大学 | Method for evaluating reputation of cognitive users in distributed cognitive radio network |
CN104350490A (en) * | 2012-04-11 | 2015-02-11 | 新加坡国立大学 | Methods, apparatuses and computer-readable mediums for organizing data relating to a product |
CN106296282A (en) * | 2016-08-08 | 2017-01-04 | 南京大学 | A kind of net purchase Product evaluation method marked based on user comment and history |
CN106570525A (en) * | 2016-10-26 | 2017-04-19 | 昆明理工大学 | Method for evaluating online commodity assessment quality based on Bayesian network |
CN106779858A (en) * | 2016-12-26 | 2017-05-31 | 西安理工大学 | A kind of product analysis method based on multidimensional perception information semantic level association |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160034968A1 (en) * | 2014-07-31 | 2016-02-04 | Huawei Technologies Co., Ltd. | Method and device for determining target user, and network server |
-
2017
- 2017-10-20 CN CN201710996982.8A patent/CN107808324B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104350490A (en) * | 2012-04-11 | 2015-02-11 | 新加坡国立大学 | Methods, apparatuses and computer-readable mediums for organizing data relating to a product |
CN103957062A (en) * | 2014-03-31 | 2014-07-30 | 西安电子科技大学 | Method for evaluating reputation of cognitive users in distributed cognitive radio network |
CN106296282A (en) * | 2016-08-08 | 2017-01-04 | 南京大学 | A kind of net purchase Product evaluation method marked based on user comment and history |
CN106570525A (en) * | 2016-10-26 | 2017-04-19 | 昆明理工大学 | Method for evaluating online commodity assessment quality based on Bayesian network |
CN106779858A (en) * | 2016-12-26 | 2017-05-31 | 西安理工大学 | A kind of product analysis method based on multidimensional perception information semantic level association |
Also Published As
Publication number | Publication date |
---|---|
CN107808324A (en) | 2018-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Rev2: Fraudulent user prediction in rating platforms | |
Su et al. | TAP: A personalized trust-aware QoS prediction approach for web service recommendation | |
CN109711955B (en) | Poor evaluation early warning method and system based on current order and blacklist base establishment method | |
US20140122294A1 (en) | Determining a characteristic group | |
Bidgoly et al. | Benchmarking reputation systems: A quantitative verification approach | |
CN112231570B (en) | Recommendation system support attack detection method, device, equipment and storage medium | |
Shi et al. | A social sensing model for event detection and user influence discovering in social media data streams | |
Kaur et al. | A comparative analysis of structural graph metrics to identify anomalies in online social networks | |
CN108335131B (en) | Method and device for estimating age bracket of user and electronic equipment | |
Zhang et al. | A trust model stemmed from the diffusion theory for opinion evaluation | |
Liu et al. | An integrated clustering‐based approach to filtering unfair multi‐nominal testimonies | |
Allahbakhsh et al. | Representation and querying of unfair evaluations in social rating systems | |
Serra et al. | Deeptrust: An automatic framework to detect trustworthy users in opinion-based systems | |
KR20100002915A (en) | Behavior based method for filtering out unfair rating in trust model | |
CN107808324B (en) | Online commodity credit value calculation method, network transaction platform and computer | |
Wang et al. | An unsupervised strategy for defending against multifarious reputation attacks | |
Raghebi et al. | A new trust evaluation method based on reliability of customer feedback for cloud computing | |
CN109313541A (en) | For showing and the user interface of comparison attacks telemetering resource | |
Al-Tamimi et al. | Employing cluster-based class decomposition approach to detect phishing websites using machine learning classifiers | |
Davoudi | Effects of user interactions on online social recommender systems | |
Mohammadinejad et al. | Employing personality feature to rank the influential users in signed networks | |
Huang et al. | A hybrid decision approach to detect profile injection attacks in collaborative recommender systems | |
Guesmi et al. | FFED: a novel strategy based on fast entropy to detect attacks against trust computing in cloud | |
Farooq et al. | A multi source product reputation model | |
CN108985895B (en) | Method for obtaining merchant credit value in electronic commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |