2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information

2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information
Login Paper Search My Schedule Paper Index Help

My ICASSP 2021 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Paper Detail

Paper IDIFS-4.5
Paper Title OPTIMAL ATTACKING STRATEGY AGAINST ONLINE REPUTATION SYSTEMS WITH CONSIDERATION OF THE MESSAGE-BASED PERSUASION PHENOMENON
Authors Zhanjiang Chen, H. Vicky Zhao, Tsinghua University, China
SessionIFS-4: Surveillance, Biometrics and Security
LocationGather.Town
Session Time:Wednesday, 09 June, 16:30 - 17:15
Presentation Time:Wednesday, 09 June, 16:30 - 17:15
Presentation Poster
Topic Information Forensics and Security: [USH] Usability And Human Factors
IEEE Xplore Open Preview  Click here to view in IEEE Xplore
Abstract The past decades witness the rise and proliferation of online reputation systems. These reputation systems are vulnerable to malicious attacks, and most recent studies have focused on how to better defend the system. This paper aims to analyze the optimal attacking strategy, especially when considering the “message-based persuasion” phenomenon where users’ ratings tend to be influenced by earlier ones. Based on a simple model of users’ herding behavior in reputation systems, we study how attackers can explore this phenomenon to attack the system more effectively, and quantitatively analyze the optimal attacking strategies. This investigation is critical to the design of defensive mechanisms, and to the protection of online reputation systems.