| 研究生: |
王瑞緣 JUI-YUAN WANG |
|---|---|
| 論文名稱: |
使用圖神經網路偵測 PTT 的低活躍異常帳號 Using Graph Neural Networks to Detect Inactive Spammers on PTT |
| 指導教授: | 陳弘軒 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2022 |
| 畢業學年度: | 110 |
| 語文別: | 中文 |
| 論文頁數: | 73 |
| 中文關鍵詞: | 網軍 、異常帳號 、低活躍異常帳號 、低活躍帳號 、圖神經網路 、批 踢踢 、批踢踢實業坊 |
| 外文關鍵詞: | inactive user, inactive spammer |
| 相關次數: | 點閱:8 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著社群媒體的興起,雇用「公關公司」在網路上散播不實消息,成
為左右時事輿論的新興手法,公關公司的大量帳號,常被各大論壇視為
異常帳號。國內外皆有學者以深度學習偵測異常帳號,但我們發現,現
階段偵測異常帳號的論文中,並沒有針對帳號的活躍程度作探討。
本篇論文中,我們依據帳號在限定時間內的活動次數定義出「活
躍值」的概念,我們觀察到,用簡單的卷積類神經網路 (Convolutional
Neural Network) 模型,即可在偵測高活躍異常帳號的任務中達到 0.9169 的 ROC 曲線下的面積 (AUROC),但是偵測低活躍的異常帳號卻只有 0.7830,顯示出偵測低活躍異常帳號是非常棘手的任務。我們利用使用者與使用者之間的關係建立社群網路,以提供額外的特徵作為訓練的資料,
並引入圖神經網路,成功改善偵測低活躍異常帳號的任務。
With the rise of social media, hiring public relations companies to spread fake news on the Internet has become an emerging method to manipulate public opinions. These large number of accounts owned by public relations companies are regarded as spammers by most online forums. Researchers have used deep learning techniques to detect abnormal accounts.
However, we found that these studies likely conducted experiments mainly on the active users.
In this thesis, we define the concept of ”Active Value” based on the number of activities of an account within a unit period. For active users, even a simple Convolutional Neural Network model can distinguish a spammer from a regular user: the area under the ROC curve (AUROC) achieves
0.9169. However, for the inactive users, the score drops to 0.7830. The result indicates that detecting inactivity spammers is much more challenging. We use user-to-user relationships to build a social network. We apply graph neural networks to the social network and extract additional social features as training clues. Experimental results show that these strategies better distinguish the spammers from regular users, especially when these users have limited activities.
參考文獻
[1] Nhut-Lam Nguyen, Ming-Hung Wang*, Yu-Chen Dai, and Chyi-Ren, “Understanding Malicious Accounts in Online Political Discussions: A Multilayer Network Approach,” MDPI Sensor, 2021.
[2] 蔡榮峰, 陳詠君, “激化情緒對立的口水戰-PTT 八卦板疫情輿論分析,” 國家安全
研究所, 資訊工業策進會, 2021.
[3] Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, “Detecting and Characterizing Social Spam Campaigns,” IMC ’10: Internet Measurement Conference,
2010.
[4] Nhut-Lam Nguyen, Ming-Hung Wang, Chyi-Ren Dow, “Learning to Recognize
Sockpuppets in Online Political Discussions,” IEEE Systems Journal, 2021.
[5] X. Hu, J. Tang, and H. Liu, “Online social spammer detection,” in In AAAI, 2014.
[6] Yuqing Lu, Lei Zhang, Yudong Xiao, Yangguang Li, “Simultaneously detecting fake
reviews and review spammers using factor graph model,” WebSci ’13: Proceedings
of the 5th Annual ACM Web Science Conference, 2013.
[7] Yongji Wu, Defu Lian, Yiheng Xu, Le Wu, Enhong Chen, “Graph Convolutional
Networks with Markov Random Field Reasoning for Social Spammer Detection,”
AAAI Technical Track: Applications, 2020.
[8] Leyan Deng, Chenwang Wu, Defu Lian, Yongji Wu, Enhong Chen, “Markov-Driven
Graph Convolutional Networks for Social Spammer Detection,” IEEE Transactions
on Knowledge and Data Engineering, 2022.
[9] Yu Liu, Bin Wu, Bai Wang, Guanchen Li, “SDHM: A Hybrid Model for Spammer
Detection in Weibo,” 2014 IEEE/ACM International Conference on Advances in
Social Networks Analysis and Mining (ASONAM 2014), 2014.
[10] Hao Fu, Xing Xie, Yong Rui, “Leveraging Careful Microblog Users for Spammer Detection,” WWW ’15 Companion: Proceedings of the 24th International Conference
on World Wide Web, 2015.
[11] L. A. Junting Ye, “Discovering opinion spammer groupsby network footprints,”
ECML Lecture Notes in Computer Science, 2015.
參考文獻
[12] 蔡秉承, “網軍判斷系統—以批踢踢電子布告欄系統為例,” 國立中山大學應用數學
系研究所, 2020.
[13] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammers on
twitter,” in In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS, 2010.
[14] Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, Yihong Zhao, “Spammer
Behavior Analysis and Detection in User Generated Content on Social Networks,”
2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012.
[15] Xia Hu, Jiliang Tang, Yanchao Zhang, Huan Liu, “Social spammer detection in
microblogging,” IJCAI ’13: Proceedings of the Twenty-Third international joint
conference on Artificial Intelligence, 2013.
[16] Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu, “Review Graph Based Online
Store Review Spammer Detection,” IEEE International Conference on Data Mining, 2011.
[17] Ming-Hung Wang, Nhut-Lam Nguyen, Shih-chan Dai, Po-Wen Chi, and Chyi-Ren,
“Understanding Potential Cyber-Armies in Elections: A Study of Taiwan,” MDPI
Sustainability, 2020.
[18] Thomas N. Kipf, Max Welling, “Semi-Supervised Classification with Graph Convolutional Networks,” ICLR 2017 conference submission, 2017.
[19] Jian Du, Shanghang Zhang, Guanhang Wu, José M. F. Moura & Soummya Kar,
“Topology Adaptive Graph Convolutional Networks,” ICLR 2018 Conference Blind
Submission, 2018.
[20] Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro
Liò, Yoshua Bengio, “Graph Attention Networks,” ICLR 2018 Conference Blind
Submission, 2018.