[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3548608.3559233acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccirConference Proceedingsconference-collections
research-article

Distributed AI Community User Credit Evaluation Method

Published: 14 October 2022 Publication History

Abstract

This research proposed a distributed AI community user credit evaluation method. The existing credibility evaluation methods based on user behavior are mainly concentrated in the financial industry and new media and self-media content industries represented by Facebook, Twitter and Zhihu(in China). There is a lack of quantitative assessment to credit value in AI models and data set community platforms. Based on the theory of social credit risk, this study firstly calculates the original credit by obtaining the direct characteristics of user credit on the community platform of the AI model and the data set, and then analyzes and decomposes the source quality of the direct characteristics of credit. The identification of credit characteristics includes obtaining all review users who have posted reviews and scores in multiple consecutive evaluation periods, and determining the trustworthiness of the review users according to the self-similar algorithm. Finally it obtains the credit that truly reflects the user's contribution in the distributed AI community. This research provides a method reference for the construction of similar communities.

References

[1]
Gitanjali, J., Spam filtering and phishing in facebook. International Journal of Pure and Applied Mathematics, 2018. 119(12): p. 487-493.
[2]
Guo, G., Personal Credit Profiling via Latent User Behavior Dimensions on Social Media. in Conference On, Part II. 2016.
[3]
Staley, D.J., Managing the Platform: Higher Education and the Logic of Wikinomics. Educause Review, 2009. 44(1): p. 7.
[4]
Macdonald, E., O. Reblitz-Richardson and P.V. Ganguri, COLLABORATIVE PRODUCTION OF RICH MEDIA CONTENT. US.
[5]
Shi, M., Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks. in IEEE International Conference on Communications. 2007.
[6]
Pesaran, M.H., T. Schuermann and B.J. Treutler, Global Business Cycles and Credit Risk. Social Science Electronic Publishing.
[7]
Becker, E.D., Systems and methods for minimizing effects of authorized user credit tradelines. US, 2013.
[8]
Dai, T., K.P. Sycara and M. Lewis. A game theoretic queueing approach to self-assessment in human-robot interaction systems. in IEEE International Conference on Robotics & Automation. 2011.
[9]
Jun-Yu, M.A., Z.J. Zhao and Y.E. Xue-Yi, User Behavior Assessment in Trusted Network Based on Fuzzy Decision Analysis. Computer Engineering, 2011. 37(13): p. 125-106.
[10]
Gsba, B., Using a hybrid content-based and behaviour-based featuring approach in a parallel environment to detect fake reviews - ScienceDirect. Electronic Commerce Research and Applications, 2021. 47.
[11]
Yu, C., An individual-group-merchant relation model for identifying fake online reviews: an empirical study on a Chinese e-commerce platform. Information Technology and Management, 2018.
[12]
Fontanarava, J., G. Pasi and M. Viviani. Feature Analysis for Fake Review Detection through Supervised Classification. in 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA). 2018.
[13]
Jing, X., A cloud-user behavior assessment based dynamic access control model. International Journal of System Assurance Engineering and Management, 2017.
[14]
Jauffret, A., How Can a Robot Evaluate its own Behavior ? A Neural Model for Self-Assessment. in Neural Networks (IJCNN), The 2013 International Joint Conference on. 2013.
[15]
Yang, H.Y. and L.X. Meng, Hadoop Cloud Platform Dynamic Access Control Based on User Behavior Assessment. Transactions of Beijing Institute of Technology, 2017. 37(10): p. 1031-1035 and 1042.
[16]
M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCIR '22: Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics
June 2022
905 pages
ISBN:9781450397179
DOI:10.1145/3548608
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2022

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCIR 2022

Acceptance Rates

Overall Acceptance Rate 131 of 239 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 25
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media