[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2487575.2487612acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
poster

Multi-source deep learning for information trustworthiness estimation

Published: 11 August 2013 Publication History

Abstract

In recent years, information trustworthiness has become a serious issue when user-generated contents prevail in our information world. In this paper, we investigate the important problem of estimating information trustworthiness from the perspective of correlating and comparing multiple data sources. To a certain extent, the consistency degree is an indicator of information reliability--Information unanimously agreed by all the sources is more likely to be reliable. Based on this principle, we develop an effective computational approach to identify consistent information from multiple data sources. Particularly, we analyze vast amounts of information collected from multiple review platforms (multiple sources) in which people can rate and review the items they have purchased. The major challenge is that different platforms attract diverse sets of users, and thus information cannot be compared directly at the surface. However, latent reasons hidden in user ratings are mostly shared by multiple sources, and thus inconsistency about an item only appears when some source provides ratings deviating from the common latent reasons. Therefore, we propose a novel two-step procedure to calculate information consistency degrees for a set of items which are rated by multiple sets of users on different platforms. We first build a Multi-Source Deep Belief Network (MSDBN) to identify the common reasons hidden in multi-source rating data, and then calculate a consistency score for each item by comparing individual sources with the reconstructed data derived from the latent reasons. We conduct experiments on real user ratings collected from Orbitz, Priceline and TripAdvisor on all the hotels in Las Vegas and New York City. Experimental results demonstrate that the proposed approach successfully finds the hotels that receive inconsistent, and possibly unreliable, ratings.

References

[1]
Y. Bengio. Learning deep architectures for ai. Foundations and Trends in Machine Learning, 2009.
[2]
S. Bickel and T. Scheffer. Multi-view clustering. In International Conference on Data Mining, 2004.
[3]
L. Ge, J. Gao, X. Yu, W. Fan, and A. Zhang. Estimating local information trustworthiness via multi-source joint matrix factorization. In International Conference on Data Mining, 2012.
[4]
G. Hinton. Training products of experts by minimizing contrastive divergence. Neural Computation, 2002.
[5]
G. Hinton. A practical guide to training restricted boltzmann machines. Technical report, The Unversity of Toronto, 2010.
[6]
G. Hinton, S. Osindero, and W. Teh. A fast learning algorithm for deep belief netts. Neural Computation, 2006.
[7]
N. Jindal and B. Liu. Opinion spam and analysis. In International Conference on Web Search and Data Mining, 2008.
[8]
Y. Kang and S. Choi. Restricted deep belief networks for multi-view learning. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2011.
[9]
S. Lam and J. Riedl. Shilling recommender systems for fun and profit. In International World Wide Web Conference, 2004.
[10]
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots+machine learning. In International Conference on Information Retrieval, 2010.
[11]
X. Li, X. L. Dong, K. B. Lyons, W. Meng, and D. Sirvastava. Truth finding on the deep web: Is the problem solved? PVLDB, 2013.
[12]
E. Lim, V. Nguyen, N. Jindal, B. Liu, and H. Lauw. Detecting product review spammers using rating behaviors. In International Conference on Information and Knowledge Management, 2010.
[13]
B. Mehta. Unsupervised shilling detection for collaborative ltering. In Advancement of Artificial Intelligence, 2007.
[14]
A. Mohamed, G. Dahl, and G. Hinton. Deep belief networks for phone recognition. In Advances in Neural Information Processing Systems workshop, 2009.
[15]
J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Ng. Multimodal deep learning. In International Conference on Machine Learning, 2011.
[16]
S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos. Netprobe: A fast and scalable system for fraud detection in online auction networks. In International World Wide Web Conference, 2007.
[17]
J. Pasternack and D. Roth. Making better informed trust decisions with generalized fact-finding. In International Joint Conference on Aritifical Intelligence, 2011.
[18]
R. Salakhutdinov and G. Hinton. Replicated softmax: An undirected topic model. In Advances in Neural Information Processing Systems, 2009.
[19]
R. Salakhutdinov, A. Mnih, and G. Hinton. Restricted boltzmann machines for collaborative filtering. In International Conference on Machine Learning, 2007.
[20]
N. Sirvastava and R. Salakhutdinov. Multimodal learning with deep boltzmann machines. In Advances in Neural Information Processing Systems, 2012.
[21]
X. Su and T. M. Khoshgoftaar. A survey of collaborative ltering techniques. In Advancement of Artificial Intelligence, 2009.
[22]
X. Yin, J. Han, and P. Yu. Truth discovery with multiple con icting information providers on the web. IEEE Transactions on Knowledge and Data Engineering, 2008.

Cited By

View all
  • (2022)Multimodal Medical Imaging Using Modern Deep Learning Approaches2022 IEEE VLSI Device Circuit and System (VLSI DCS)10.1109/VLSIDCS53788.2022.9811498(184-187)Online publication date: 26-Feb-2022
  • (2022)TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action LocalizationMachine Intelligence Research10.1007/s11633-022-1333-419:3(227-246)Online publication date: 28-May-2022
  • (2022)Do Not ‘Fake It Till You Make It’! Synopsis of Trending Fake News Detection Methodologies Using Deep LearningDeep Learning for Social Media Data Analytics10.1007/978-3-031-10869-3_12(213-235)Online publication date: 19-Sep-2022
  • Show More Cited By

Index Terms

  1. Multi-source deep learning for information trustworthiness estimation

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2013
    1534 pages
    ISBN:9781450321747
    DOI:10.1145/2487575
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. deep learning
    2. information trustworthiness
    3. multiple-source

    Qualifiers

    • Poster

    Conference

    KDD' 13
    Sponsor:

    Acceptance Rates

    KDD '13 Paper Acceptance Rate 125 of 726 submissions, 17%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Multimodal Medical Imaging Using Modern Deep Learning Approaches2022 IEEE VLSI Device Circuit and System (VLSI DCS)10.1109/VLSIDCS53788.2022.9811498(184-187)Online publication date: 26-Feb-2022
    • (2022)TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action LocalizationMachine Intelligence Research10.1007/s11633-022-1333-419:3(227-246)Online publication date: 28-May-2022
    • (2022)Do Not ‘Fake It Till You Make It’! Synopsis of Trending Fake News Detection Methodologies Using Deep LearningDeep Learning for Social Media Data Analytics10.1007/978-3-031-10869-3_12(213-235)Online publication date: 19-Sep-2022
    • (2021)Beyond Relevance: Trustworthy Answer Selection via Consensus VerificationProceedings of the 14th ACM International Conference on Web Search and Data Mining10.1145/3437963.3441781(562-570)Online publication date: 8-Mar-2021
    • (2021)Early Detection of Fake News with Multi-source Weak Social SupervisionMachine Learning and Knowledge Discovery in Databases10.1007/978-3-030-67664-3_39(650-666)Online publication date: 25-Feb-2021
    • (2020)A Novel Integrative Approach for Non-coding RNA Classification Based on Deep LearningCurrent Bioinformatics10.2174/157489361466619110516063315:4(338-348)Online publication date: 11-Jun-2020
    • (2020)Learning with Weak Supervision for Email Intent DetectionProceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3397271.3401121(1051-1060)Online publication date: 25-Jul-2020
    • (2020)DeepMVProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33809804:1(1-26)Online publication date: 18-Mar-2020
    • (2020)Big Data and Emergency Management: Concepts, Methodologies, and ApplicationsIEEE Transactions on Big Data10.1109/TBDATA.2020.2972871(1-1)Online publication date: 2020
    • (2020)Claim verification under positive unlabeled learningProceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1109/ASONAM49781.2020.9381336(143-150)Online publication date: 7-Dec-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media