A method for identifying malicious users based on e-commerce reviews
A malicious user and user technology, applied in the fields of e-commerce and social computing, can solve problems such as poor stability, achieve stable performance, good robustness, and improve accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The technical solutions and beneficial effects of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0051] The present invention provides a method for identifying malicious users based on e-commerce reviews, which mainly includes the following four stages:
[0052] First of all, triplets are used to store scoring data; triplets are used to store scoring data, which saves space compared to arrays when the amount of data is large and the scoring data is relatively sparse;
[0053] Secondly, count the size of the weighted group of each product under each rating, and use the user's reputation score as the weight to calculate the proportion of each rating group in each product;
[0054] Then, calculate the user's reputation score based on the average and standard deviation of the proportion of each user's group and the standard deviation of the user's score, and iteratively calculate the user's reputation until the user'...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


