N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing Environments

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To defend against spam workers in crowdsourcing environments, the existing solutions overlook the fact that a spam worker with guises can easily bypass the defense. To alleviate this problem, in this paper, we propose a Node to Trust Matrix method (N2TM) that represents a worker node in a crowdsourcing network as an un-manipulable Worker Trust Matrix (WTM) for identifying the worker’s identity. In particular, we first present a crowdsourcing trust network consisting of requester nodes, worker nodes, and transaction-based edges. Then, we construct WTMs for workers based on the trust network. A WTM consists of trust indicators measuring the extent to which a worker is trusted by different requesters in different sub-networks. Moreover, we show the un-manipulable property and the usable property of a WTM that are crucial for identifying a worker’s identity. Furthermore, we leverage deep learning techniques to predict a worker’s identity with its WTM as input. Finally, we demonstrate the superior performance of our proposed N2TM in identifying spam workers with extensive experiments.

Cite

CITATION STYLE

APA

Ye, B., Wang, Y., Orgun, M., & Sheng, Q. Z. (2019). N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing Environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11895 LNCS, pp. 119–134). Springer. https://doi.org/10.1007/978-3-030-33702-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free