Semantic & Behavioral Feature analysis for Detecting Fake Reviews using Machine Learning
Anjali S Dilliwala, Raghavendra G S, , ,
Affiliations 1*Student, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. 2: Professor, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India.
Background: In this age of technology, online business is playing a vital role in the growth of the economy of the business. Hence, people need feedback on various products, technologies, businesses, etc. Since their opinions are the input for an individual to evaluate and adapt them. Therefore, the Review system is playing a vital role in decision making. So there arises a necessity to evaluate the reviews as well since the business units are trying to generate fake reviews to identify more clients for their products.
Methods/ Statistical Analysis: In this paper, we implement two machine learning algorithms SVM and Naïve Bayes algorithm and analyse the data and predict for the new set of data. We also compare the performance of both algorithms.
Findings: In this paper, we are trying to develop a Machine learning model which analyses the reviews on various factors and obtain the necessary features and classify the reviews as a fake or non-fake review. This helps in identifying fraudulent reviews and predicts the trustworthiness of the reviews in the future.
Improvements: The system can introduce and make available Machine learning techniques and identifying fake reviews at the earliest stage.
Anjali S Dilliwala, Raghavendra G S."Semantic & Behavioral Feature analysis for Detecting Fake Reviews using Machine Learning". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 06,pp.40-45, June - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I606.pdf,
 Esposito, Gennaro. LP-type methods for Optimal Transductive SVMs. Vol. 3. Gennaro Esposito, PhD, 2014.
 N. Jindal and B. Liu, "Review spam detection", Proceedings of the 16th international conference on World Wide Web - WWW 07 (2007), ACM, pp. 1189–1190, 2007
 Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, HLT, 2011.
 S. Xie, G. Wang, S. Lin, and P. S. Yu, "Review spam detection via temporal pattern discovery," p. 823, 2012.
 W. Etaiwi,G.Naymat, "The impact of applying pre-processing steps on review spam detection", The 8th international conference on emerging ubiquitous system and pervasion networks, Elsevier, pp. 273-279, 2017.
 P.Rosso, D.Cabrera, M. Gomez, "Detecting positive and negative deceptive opinions using PU-learning", Elsevier, pp.1-11, 2014.
 S. Feng, L. Xing, A Gogar and Y. Choi, "Distributional footprints of deceptive product reviews". In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM), pp. 98- 105, 2012.
 M. I. Ahsan, T. Nahian, A. A. Kafi, M. I. Hossain, and F. M. Shah, "Review spam detection using active learning," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016.
 M. Singh, L. Kumar, and S. Sinha, "Model for Detecting Fake or Spam Reviews," Advances in Intelligent Systems and Computing ICT Based Innovations, pp. 213–217, Jan. 2017.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.