malicious behavior on the web: characterization and detectionsnap.stanford.edu/malicious behavior on...
TRANSCRIPT
![Page 1: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/1.jpg)
Malicious Behavior on the Web:
Characterization and Detection
Srijan Kumar (@srijankr)
Justin Cheng (@jcccf)
Jure Leskovec (@jure)
Slides are available at http://snap.stanford.edu/www2017tutorial/
![Page 2: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/2.jpg)
Trolling
Tutorial Outline
Sockpuppets Vandals
Fake reviews Hoaxes
Malicious users
Misinformation
http://snap.stanford.edu/www2017tutorial
![Page 3: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/3.jpg)
Web: Source of information
3
![Page 4: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/4.jpg)
Web: Source of false information
4
![Page 5: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/5.jpg)
Types of false information
5
Misinformation
honest mistake
Disinformation
deliberate lie to mislead
![Page 6: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/6.jpg)
Reviews
6
![Page 7: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/7.jpg)
Impact of Fake Reviews
7Makhija et al, 2016, Luca et al., 2011
Rating
Convers
ion
Mean
conversion rate
Conversion
+1 increase in star rating
increases revenue by 5-9%
Flipkart
![Page 8: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/8.jpg)
8
Characteristics of fake reviews
and reviewers
![Page 9: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/9.jpg)
9Ott et al., 2011, Yoo et al., 2009
![Page 10: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/10.jpg)
10
Fake reviewers are more opinionated
Genuine
Fake
Kumar et al., 2017
![Page 11: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/11.jpg)
11
Fake reviewers
Mukherjee et al., 2013
Number of reviews
Fra
ction o
f re
vie
wers
Genuine
Fake
Average Review Length
Fra
ction o
f re
vie
wers
Fake reviewers give
fewer reviews
Fake reviewers write
shorter reviews
![Page 12: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/12.jpg)
12
Fake reviewers are faster and have
bimodal rating pattern
Kumar et al., 2017, Li et al., 2017
Genuine
Fake
![Page 13: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/13.jpg)
Fake reviewers collude
13Kumar et al., 2017
![Page 14: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/14.jpg)
14
Detecting fake reviewers
![Page 15: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/15.jpg)
15
• User is suspicious if his behavior deviates
substantially from that of the global model
• Global Model:
• Users belong to different cluster, each
representing a different behavior
• Each cluster is associated with a
common Dirichlet prior, to model the
common behavior of users in the cluster
• The property is drawn using a
multinomial derived from the cluster’s
Dirichlet prior
BIRDNEST
Hooi et al., SDM 2016
![Page 16: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/16.jpg)
BIRDNEST
16
Cluster 1
User 1 User 2
Cluster 2
User 3
1 2 3 4 5 1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
Each user has a multinomial rating distribution vector, drawn from a
cluster-specific Dirichlet prior
Hooi et al., SDM 2016
![Page 17: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/17.jpg)
BIRDNEST
17
Cluster 1 Cluster 2
Time difference
distributions
Time difference
distributions
Hooi et al., SDM 2016
![Page 18: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/18.jpg)
18
BIRDNEST Results
Hooi et al., SDM 2016
![Page 19: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/19.jpg)
Intuition: Fair reviewers upvote and fake reviewers
downvote good products. Fair reviewers downvote
bad products and fake reviewers upvote bad
products.
Unsupervised Loopy Belief Propagation algorithm
Add behavior property: include a prior to indicate its
suspiciousness
Use cumulative distribution of the property over all
users
19
Fake reviewers
Benign
SpEagle
Rayana et al., KDD 2015
![Page 20: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/20.jpg)
20
SpEagle Results
Rayana et al., KDD 2015
Behavior is more important than text, but it still helps
![Page 21: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/21.jpg)
Iterative algorithm to compute 3 inter-
dependent measures:
Trustworthiness of reviewer which
depends (non-linearly) on its reviews’
honesty scores;
Reliability of store depending on the
trustworthiness of the reviewers
writing reviews for it and the score;
Honesty of review which is a function
of reliability of the store and
trustworthiness of store reviewers.
21
Trustiness
Wang et al., ICDM 2011
![Page 22: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/22.jpg)
Iteratively calculate three interdependent metrics:
Fairness of each user who writes a review: how fair is the user
in giving correct reviews?
Reliability of each review: how trustworthy is each review itself?
Goodness of each product: what is the quality of the product?
22
FairJudge
Kumar et al., 2017
![Page 23: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/23.jpg)
FairJudge
23
Goodness
G(p)
[-1,1]
Fairness
F(u)
[0,1] Reliability
R(u,p)
[0,1]
Kumar et al., 2017
![Page 24: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/24.jpg)
Fairness
24
Goodness
G(p)
Reliability
R(u,p)
Fairness
F(u)
Kumar et al., 2017
![Page 25: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/25.jpg)
Goodness
25
Goodness
G(p)
Reliability
R(u,p)
Fairness
F(u)
Kumar et al., 2017
![Page 26: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/26.jpg)
Reliability
26
Goodness
G(p)
Reliability
R(u,p)
Fairness
F(u)
Kumar et al., 2017
How fair is the user who
gives the rating
How far is the rating from the
goodness of product
![Page 27: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/27.jpg)
Initialization
27
G(p) = 1
G(p) = 1
G(p) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
R(u,p) = 1 R(u,p) = 1
R(u,p) = 1 R(u,p) = 1
![Page 28: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/28.jpg)
Updating Goodness - Iteration 1
28F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
R(r) = 1 R(r) = 1
G(p) = 0.67
G(p) = 0.67
G(p) = -0.67
R(r) = 1 R(r) = 1
![Page 29: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/29.jpg)
Updating Reliability - Iteration 1
29F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
F(u) = 1
R(r) = 0.92 R(r) = 0.92
R(r) = 0.92R(r) = 0.58
R(r) = 0.58
G(p) = 0.67
G(p) = 0.67
G(p) = -0.67
![Page 30: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/30.jpg)
Updating Fairness - Iteration 1
30F(u) = 0.92
F(u) = 0.92
F(u) = 0.58
F(u) = 0.92
F(u) = 0.92
F(u) = 0.92
R(r) = 0.92
R(r) = 0.92R(r) = 0.58
R(r) = 0.58
R(r) = 0.92
G(p) = 0.67
G(p) = 0.67
G(p) = -0.67
![Page 31: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/31.jpg)
FairJudge - After convergence
31
F(u) = 0.83
F(u) = 0.83
F(u) = 0.17
F(u) = 0.83
F(u) = 0.83
F(u) = 0.83
R(r) = 0.83 R(r) = .83
R(r) = 0.83
R(r) = 0.17 R(r) = 0.83
R(r) = 0.17
G(p) = 0.67
G(p) = 0.67
G(p) = -0.67
![Page 32: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/32.jpg)
32
Cold Start Problem
Most reviewers give few ratings
and
most products receive few ratings.
Solution: add Bayesian priors
Kumar et al., 2017
![Page 33: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/33.jpg)
Incorporating Behavioral Properties
33
Rating distribution Timestamp distribution
Use BIRDNEST score of reviewers and products
![Page 34: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/34.jpg)
FairJudge
34
k is the number of iterations, which is bounded. |E| is the number of edges.
Time complexity O(k|E|)
Kumar et al., 2017
![Page 35: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/35.jpg)
Detecting Fair Reviewers
35Kumar et al., 2017
50
0
100
FraudEagle
87
77
Bias
81
Ave
rag
e P
recis
ion
SpEagle
91
46
84
Birdnest Trustiness FairJudge
![Page 36: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/36.jpg)
Detecting Fake Reviewers
36Kumar et al., 2017
80 of 100 reported fake reviewers in Flipkart correct.
FairJudge is in use at Flipkart.
![Page 37: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/37.jpg)
37
N = Network
C = Cold Start Solution
B = Behavior
Importance of components
Kumar et al., 2017
![Page 38: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/38.jpg)
Summary: Fake Reviewers
38
• Fake Reviewers: Users who write non-
truthful reviews for products
• Fake reviews are worse: shorter, more
positive, use more “I”s and more verbs and
adverbs
• Fake reviewers are deceptive: they collude
among themselves and are faster
• Textual, behavioral and network based
algorithms can detect fake reviewers
• Combination of several components
performs the best
![Page 39: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/39.jpg)
References
S. Kumar, B. Hooi, D. Makhija, M. Kumar, C. Faloutsos and V.S.
Subrahmanian. FairJudge: Trustworthy User Prediction in Rating
Platforms. arXiv 1703.10545
B. Hooi, N. Shah, A. Beutel, S. Gunneman, L. Akoglu, M. Kumar, D.
Makhija, and C. Faloutsos. Birdnest: Bayesian inference for ratings-fraud
detection. In SDM, 2016
A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R.
Ghosh. Spotting opinion spammers using behavioral footprints. In KDD,
2013.
A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake
review filter might be doing? In ICWSM, 2013.
S. Rayana and L. Akoglu. Collective opinion spam detection: Bridging
review networks and metadata. In KDD, 2015.
![Page 40: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/40.jpg)
References
G. Wang, S. Xie, B. Liu, and S. Y. Philip. Review graph based online store
review spammer detection. In ICDM, 2011.
N. Jindal and B. Liu. Opinion spam and analysis. In WSDM, 2008.
A. J. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos.
Trueview: Harnessing the power of multiple review sites. In WWW, 2015
A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in
networks based on trust scores. In WWW, 2011.
H. Li, G. Fei, S. Wang, B. Liu, W. Shao, A. Mukherjee, and J. Shao.
Bimodal distribution and co-bursting in review spam detection. In WWW,
2017
![Page 41: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/41.jpg)
Additional slides
41
![Page 42: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/42.jpg)
42
Textual Properties
1
0
2
Use of “I”
1.8
0.7
Mentions
product
0.8
0.3
Genuine
Fake
Yoo et al., 2009
![Page 43: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/43.jpg)
43
Fake reviews are more positive
5
0
10
Positive
sentiment
8.5
4.6
Negative
sentiment
1.5
3.0
Genuine
Fake
Yoo et al., 2009
![Page 44: Malicious Behavior on the Web: Characterization and Detectionsnap.stanford.edu/Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf)](https://reader036.vdocuments.net/reader036/viewer/2022081607/5edd9d8dad6a402d6668c154/html5/thumbnails/44.jpg)
FairJudge Convergence Theorem
44
Lemma:
Error bound:
The error between iterations is bounded, and as t increases, the rating
scores converge. The error bound is given by:
As t increases,
Kumar et al., 2017