Sybil Defense in Crowdsourcing Platforms

作者: Dong Yuan , Guoliang Li , Qi Li , Yudian Zheng

DOI: 10.1145/3132847.3133039

关键词:

摘要: Crowdsourcing platforms have been widely deployed to solve many computer-hard problems, e.g., image recognition and entity resolution. Quality control is an important issue in crowdsourcing, which has extensively addressed by existing quality-control algorithms, voting-based algorithms probabilistic graphical models. However, these cannot ensure quality under sybil attacks, leverages a large number of accounts generate results for dominating answers normal workers. To address this problem, we propose defense framework can help crowdsourcing identify workers the attack. We develop similarity function quantify worker similarity. Based on similarity, cluster into different groups such that utilize small golden questions accurately groups. also devise online instantly detect throttle attacks. Our method ability multi-attackers one task. best our knowledge, first crowdsourcing. Experimental real-world datasets demonstrate effectively

参考文章(41)
Bhaskar Mehta, Thomas Hofmann, A Survey of Attack-Resistant Collaborative Filtering Algorithms. IEEE Data(base) Engineering Bulletin. ,vol. 31, pp. 14- 22 ,(2008)
Jaime G. Carbonell, Peter J. Jansen, Ashiqur R. KhudaBukhsh, Detecting Non-Adversarial Collusion in Crowdsourcing national conference on artificial intelligence. ,(2014)
Rupesh Gunturu, Survey of Sybil Attacks in Social Networks. arXiv: Cryptography and Security. ,(2015)
Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, Jiawei Han, A Survey on Truth Discovery Sigkdd Explorations. ,vol. 17, pp. 1- 16 ,(2016) , 10.1145/2897350.2897352
Xian Li, Xin Luna Dong, Kenneth B. Lyons, Weiyi Meng, Divesh Srivastava, Scaling up copy detection international conference on data engineering. pp. 89- 100 ,(2015) , 10.1109/ICDE.2015.7113275
Guo-Jun Qi, Charu C. Aggarwal, Jiawei Han, Thomas Huang, Mining collective intelligence in diverse groups Proceedings of the 22nd international conference on World Wide Web - WWW '13. pp. 1041- 1052 ,(2013) , 10.1145/2488388.2488479
Ben Y. Zhao, Haitao Zheng, Christo Wilson, Tristan Konolige, Gang Wang, Xiao Wang, You are how you click: clickstream analysis for Sybil detection usenix security symposium. pp. 241- 256 ,(2013)
Adam Marcus, David Karger, Samuel Madden, Robert Miller, Sewoong Oh, None, Counting with the crowd Proceedings of the VLDB Endowment. ,vol. 6, pp. 109- 120 ,(2012) , 10.14778/2535568.2448944
Rion Snow, Brendan O'Connor, Daniel Jurafsky, Andrew Y. Ng, Cheap and fast---but is it good? Proceedings of the Conference on Empirical Methods in Natural Language Processing - EMNLP '08. pp. 254- 263 ,(2008) , 10.3115/1613715.1613751
Ihsan Gunes, Cihan Kaleli, Alper Bilge, Huseyin Polat, Shilling attacks against recommender systems: a comprehensive survey Artificial Intelligence Review. ,vol. 42, pp. 767- 799 ,(2014) , 10.1007/S10462-012-9364-9