skip to main content
research-article

Detecting Online Counterfeit-goods Seller using Connection Discovery

Authors Info & Claims
Published:05 June 2019Publication History
Skip Abstract Section

Abstract

With the advancement of social media and mobile technology, any smartphone user can easily become a seller on social media and e-commerce platforms, such as Instagram and Carousell in Hong Kong or Taobao in China. A seller shows images of their products and annotates their images with suitable tags that can be searched easily by others. Those images could be taken by the seller, or the seller could use images shared by other sellers. Among sellers, some sell counterfeit goods, and these sellers may use disguising tags and language, which make detecting them a difficult task. This article proposes a framework to detect counterfeit sellers by using deep learning to discover connections among sellers from their shared images. Based on 473K shared images from Taobao, Instagram, and Carousell, it is proven that the proposed framework can detect counterfeit sellers. The framework is 30% better than approaches using object recognition in detecting counterfeit sellers. To the best of our knowledge, this is the first work to detect online counterfeit sellers from their shared images.

References

  1. David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Luca Bertinetto, Jack Valmadre, João F. Henriques, Andrea Vedaldi, and Philip H. S. Torr. 2016. Fully-convolutional siamese networks for object tracking. In Proceedings of the European Conference on Computer Visualization. Springer, 850--865.Google ScholarGoogle Scholar
  3. Ken Chatfield, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531.Google ScholarGoogle Scholar
  4. Cheng Chen, Kui Wu, Venkatesh Srinivasan, and Xudong Zhang. 2013. Battling the internet water army: Detection of hidden paid posters. In Proceedings of the IEEE/ACM International Conference on Advances Social Network Analysis Mining (ASONAM’13). IEEE, 116--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ming Cheung, James She, and Zhanming Jie. 2015. Connection discovery using big data of user-shared images in social media. IEEE Trans. Multimedia 17, 9 (2015), 1417--1428.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ming Cheung, James She, and Lufi Liu. 2018. Deep learning-based online counterfeit-seller detection. In Proceedings of theIEEE Conference on Computer Communication Workshops (INFOCOM’18). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ming Cheung, James She, and Ning Wang. 2017. Characterizing user connections in social media through user shared image. IEEE Trans. Big Data (2017).Google ScholarGoogle Scholar
  8. Haoqiang Fan, Zhimin Cao, Yuning Jiang, Qi Yin, and Chinchilla Doudou. 2014. Learning deep face representation. arXiv preprint arXiv:1403.2802.Google ScholarGoogle Scholar
  9. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  10. Julia Heidemann, Mathias Klier, and Florian Probst. 2010. Identifying key users in online social networks: A pagerank based approach. In Proc. 31st Inform. Syst. Int. Conf. 79.Google ScholarGoogle Scholar
  11. Junlin Hu, Jiwen Lu, and Yap-Peng Tan. 2014. Discriminative deep metric learning for face verification in the wild. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 1875--1882. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the ACM International Conference on Multimedia. ACM, 675--678. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yuncheng Li, Liangliang Cao, Jiang Zhu, and Jiebo Luo. 2017. Mining fashion outfit composition using an end-to-end deep learning approach on set data. IEEE Trans. Multimedia 19, 8 (2017), 1946--1955.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Venice Erin Liong, Jiwen Lu, Yap-Peng Tan, and Jie Zhou. 2017. Deep video hashing. IEEE Trans. Multimedia 19, 6 (2017), 1209--1219. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Andrew McCallum, Kamal Nigam, and Lyle H. Ungar. 2000. Efficient clustering of high-dimensional data sets with application to reference matching. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery Data Mining. ACM, 169--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web. ACM, 191--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S. Glance. 2013. What yelp fake review filter might be doing? In Proceedings of the International Conference on Web and Social Media (ICWSM’13). 409--418.Google ScholarGoogle Scholar
  18. Florian Probst, Laura Grosswiele, and Regina Pfleger. 2013. Who will lead and who will follow: Identifying influential users in online social networks. Busin. Info. Syst. Engin. 5, 3 (2013), 179--193.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. J. Van Rijsbergen. 1979. Information Retrieval (2nd ed.). Butterworth-Heinemann, Newton, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Geetika Sarna and M. P. S. Bhatia. 2017. Content based approach to find the credibility of user in social networks: An application of cyberbullying. Int. J. Mach. Learn. Cybernet. 8, 2 (2017), 677--689.Google ScholarGoogle ScholarCross RefCross Ref
  21. David Savage, Xiuzhen Zhang, Xinghuo Yu, Pauline Chou, and Qingmai Wang. 2014. Anomaly detection in online social networks. Social Netw. 39 (2014), 62--70.Google ScholarGoogle ScholarCross RefCross Ref
  22. Bernard W. Silverman. 1986. Density Estimation for Statistics and Data Analysis. Vol. 26. CRC Press.Google ScholarGoogle Scholar
  23. Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, and Yihong Zhao. 2012. Spammer behavior analysis and detection in user generated content on social networks. In Proceedings of the IEEE 32nd International Conference on Distributed Computer Systems (ICDCS’12). IEEE, 305--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. L. Ting and Albert H. C. Tsang. 2014. Using social network analysis to combat counterfeiting. Int. J. Prod. Res. 52, 15 (2014), 4456--4468.Google ScholarGoogle ScholarCross RefCross Ref
  25. Michael Trusov, Anand V. Bodapati, and Randolph E. Bucklin. 2010. Determining influential users in internet social networks. J. Market. Res. 47, 4 (2010), 643--658.Google ScholarGoogle ScholarCross RefCross Ref
  26. Alex Hai Wang. 2010. Don’t follow me: Spam detection in Twitter. In Proceedings of the International Conference on on Security and Cryptography. IEEE, 1--10.Google ScholarGoogle Scholar
  27. Jiang Wang, Yang Song, Thomas Leung, Chuck Rosenberg, Jingbin Wang, James Philbin, Bo Chen, and Ying Wu. 2014. Learning fine-grained image similarity with deep ranking. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 1386--1393. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sergey Zagoruyko and Nikos Komodakis. 2015. Learning to compare image patches via convolutional neural networks. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 4353--4361.Google ScholarGoogle ScholarCross RefCross Ref
  29. Qunyan Zhang, Haixin Ma, Weining Qian, and Aoying Zhou. 2013. Duplicate detection for identifying social spam in microblogs. In Proceedings of the IEEE International Congress on Big Data. IEEE, 141--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xianghan Zheng, Zhipeng Zeng, Zheyi Chen, Yuanlong Yu, and Chunming Rong. 2015. Detecting spammers on social networks. Neurocomputing 159 (2015), 27--34. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detecting Online Counterfeit-goods Seller using Connection Discovery

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Multimedia Computing, Communications, and Applications
            ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 15, Issue 2
            May 2019
            375 pages
            ISSN:1551-6857
            EISSN:1551-6865
            DOI:10.1145/3339884
            Issue’s Table of Contents

            Copyright © 2019 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 June 2019
            • Accepted: 1 February 2019
            • Revised: 1 December 2018
            • Received: 1 September 2018
            Published in tomm Volume 15, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!