TY - GEN
T1 - N2TM
T2 - 17th International Conference on Service-Oriented Computing, ICSOC 2019
AU - Ye, Bin
AU - Wang, Yan
AU - Orgun, Mehmet
AU - Sheng, Quan Z.
PY - 2019
Y1 - 2019
N2 - To defend against spam workers in crowdsourcing environments, the existing solutions overlook the fact that a spam worker with guises can easily bypass the defense. To alleviate this problem, in this paper, we propose a Node to Trust Matrix method (N2TM) that represents a worker node in a crowdsourcing network as an un-manipulable Worker Trust Matrix (WTM) for identifying the worker’s identity. In particular, we first present a crowdsourcing trust network consisting of requester nodes, worker nodes, and transaction-based edges. Then, we construct WTMs for workers based on the trust network. A WTM consists of trust indicators measuring the extent to which a worker is trusted by different requesters in different sub-networks. Moreover, we show the un-manipulable property and the usable property of a WTM that are crucial for identifying a worker’s identity. Furthermore, we leverage deep learning techniques to predict a worker’s identity with its WTM as input. Finally, we demonstrate the superior performance of our proposed N2TM in identifying spam workers with extensive experiments.
AB - To defend against spam workers in crowdsourcing environments, the existing solutions overlook the fact that a spam worker with guises can easily bypass the defense. To alleviate this problem, in this paper, we propose a Node to Trust Matrix method (N2TM) that represents a worker node in a crowdsourcing network as an un-manipulable Worker Trust Matrix (WTM) for identifying the worker’s identity. In particular, we first present a crowdsourcing trust network consisting of requester nodes, worker nodes, and transaction-based edges. Then, we construct WTMs for workers based on the trust network. A WTM consists of trust indicators measuring the extent to which a worker is trusted by different requesters in different sub-networks. Moreover, we show the un-manipulable property and the usable property of a WTM that are crucial for identifying a worker’s identity. Furthermore, we leverage deep learning techniques to predict a worker’s identity with its WTM as input. Finally, we demonstrate the superior performance of our proposed N2TM in identifying spam workers with extensive experiments.
KW - Crowdsourcing
KW - Spam worker identification
KW - Trust
UR - http://www.scopus.com/inward/record.url?scp=85076376449&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-33702-5_10
DO - 10.1007/978-3-030-33702-5_10
M3 - Conference proceeding contribution
AN - SCOPUS:85076376449
SN - 9783030337018
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 119
EP - 134
BT - Service-Oriented Computing
A2 - Yangui, Sami
A2 - Bouassida Rodriguez, Ismael
A2 - Drira, Khalil
A2 - Tari, Zahir
PB - Springer
CY - Switzerland
Y2 - 28 October 2019 through 31 October 2019
ER -