Abstract
With the advancement of social media and mobile technology, any smartphone user can easily become a seller on social media and e-commerce platforms, such as Instagram and Carousell in Hong Kong or Taobao in China. A seller shows images of their products and annotates their images with suitable tags that can be searched easily by others. Those images could be taken by the seller, or the seller could use images shared by other sellers. Among sellers, some sell counterfeit goods, and these sellers may use disguising tags and language, which make detecting them a difficult task. This article proposes a framework to detect counterfeit sellers by using deep learning to discover connections among sellers from their shared images. Based on 473K shared images from Taobao, Instagram, and Carousell, it is proven that the proposed framework can detect counterfeit sellers. The framework is 30% better than approaches using object recognition in detecting counterfeit sellers. To the best of our knowledge, this is the first work to detect online counterfeit sellers from their shared images.
- David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035. Google Scholar
Digital Library
- Luca Bertinetto, Jack Valmadre, João F. Henriques, Andrea Vedaldi, and Philip H. S. Torr. 2016. Fully-convolutional siamese networks for object tracking. In Proceedings of the European Conference on Computer Visualization. Springer, 850--865.Google Scholar
- Ken Chatfield, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531.Google Scholar
- Cheng Chen, Kui Wu, Venkatesh Srinivasan, and Xudong Zhang. 2013. Battling the internet water army: Detection of hidden paid posters. In Proceedings of the IEEE/ACM International Conference on Advances Social Network Analysis Mining (ASONAM’13). IEEE, 116--120. Google Scholar
Digital Library
- Ming Cheung, James She, and Zhanming Jie. 2015. Connection discovery using big data of user-shared images in social media. IEEE Trans. Multimedia 17, 9 (2015), 1417--1428.Google Scholar
Digital Library
- Ming Cheung, James She, and Lufi Liu. 2018. Deep learning-based online counterfeit-seller detection. In Proceedings of theIEEE Conference on Computer Communication Workshops (INFOCOM’18). IEEE.Google Scholar
Cross Ref
- Ming Cheung, James She, and Ning Wang. 2017. Characterizing user connections in social media through user shared image. IEEE Trans. Big Data (2017).Google Scholar
- Haoqiang Fan, Zhimin Cao, Yuning Jiang, Qi Yin, and Chinchilla Doudou. 2014. Learning deep face representation. arXiv preprint arXiv:1403.2802.Google Scholar
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 770--778.Google Scholar
Cross Ref
- Julia Heidemann, Mathias Klier, and Florian Probst. 2010. Identifying key users in online social networks: A pagerank based approach. In Proc. 31st Inform. Syst. Int. Conf. 79.Google Scholar
- Junlin Hu, Jiwen Lu, and Yap-Peng Tan. 2014. Discriminative deep metric learning for face verification in the wild. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 1875--1882. Google Scholar
Digital Library
- Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the ACM International Conference on Multimedia. ACM, 675--678. Google Scholar
Digital Library
- Yuncheng Li, Liangliang Cao, Jiang Zhu, and Jiebo Luo. 2017. Mining fashion outfit composition using an end-to-end deep learning approach on set data. IEEE Trans. Multimedia 19, 8 (2017), 1946--1955.Google Scholar
Digital Library
- Venice Erin Liong, Jiwen Lu, Yap-Peng Tan, and Jie Zhou. 2017. Deep video hashing. IEEE Trans. Multimedia 19, 6 (2017), 1209--1219. Google Scholar
Digital Library
- Andrew McCallum, Kamal Nigam, and Lyle H. Ungar. 2000. Efficient clustering of high-dimensional data sets with application to reference matching. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery Data Mining. ACM, 169--178. Google Scholar
Digital Library
- Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web. ACM, 191--200. Google Scholar
Digital Library
- Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S. Glance. 2013. What yelp fake review filter might be doing? In Proceedings of the International Conference on Web and Social Media (ICWSM’13). 409--418.Google Scholar
- Florian Probst, Laura Grosswiele, and Regina Pfleger. 2013. Who will lead and who will follow: Identifying influential users in online social networks. Busin. Info. Syst. Engin. 5, 3 (2013), 179--193.Google Scholar
Cross Ref
- C. J. Van Rijsbergen. 1979. Information Retrieval (2nd ed.). Butterworth-Heinemann, Newton, MA. Google Scholar
Digital Library
- Geetika Sarna and M. P. S. Bhatia. 2017. Content based approach to find the credibility of user in social networks: An application of cyberbullying. Int. J. Mach. Learn. Cybernet. 8, 2 (2017), 677--689.Google Scholar
Cross Ref
- David Savage, Xiuzhen Zhang, Xinghuo Yu, Pauline Chou, and Qingmai Wang. 2014. Anomaly detection in online social networks. Social Netw. 39 (2014), 62--70.Google Scholar
Cross Ref
- Bernard W. Silverman. 1986. Density Estimation for Statistics and Data Analysis. Vol. 26. CRC Press.Google Scholar
- Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, and Yihong Zhao. 2012. Spammer behavior analysis and detection in user generated content on social networks. In Proceedings of the IEEE 32nd International Conference on Distributed Computer Systems (ICDCS’12). IEEE, 305--314. Google Scholar
Digital Library
- S. L. Ting and Albert H. C. Tsang. 2014. Using social network analysis to combat counterfeiting. Int. J. Prod. Res. 52, 15 (2014), 4456--4468.Google Scholar
Cross Ref
- Michael Trusov, Anand V. Bodapati, and Randolph E. Bucklin. 2010. Determining influential users in internet social networks. J. Market. Res. 47, 4 (2010), 643--658.Google Scholar
Cross Ref
- Alex Hai Wang. 2010. Don’t follow me: Spam detection in Twitter. In Proceedings of the International Conference on on Security and Cryptography. IEEE, 1--10.Google Scholar
- Jiang Wang, Yang Song, Thomas Leung, Chuck Rosenberg, Jingbin Wang, James Philbin, Bo Chen, and Ying Wu. 2014. Learning fine-grained image similarity with deep ranking. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 1386--1393. Google Scholar
Digital Library
- Sergey Zagoruyko and Nikos Komodakis. 2015. Learning to compare image patches via convolutional neural networks. In Proceedings of the IEEE Conference on Computer Visualization and Pattern Recognition. 4353--4361.Google Scholar
Cross Ref
- Qunyan Zhang, Haixin Ma, Weining Qian, and Aoying Zhou. 2013. Duplicate detection for identifying social spam in microblogs. In Proceedings of the IEEE International Congress on Big Data. IEEE, 141--148. Google Scholar
Digital Library
- Xianghan Zheng, Zhipeng Zeng, Zheyi Chen, Yuanlong Yu, and Chunming Rong. 2015. Detecting spammers on social networks. Neurocomputing 159 (2015), 27--34. Google Scholar
Digital Library
Index Terms
Detecting Online Counterfeit-goods Seller using Connection Discovery
Recommendations
Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images
Selling counterfeit online has become a serious problem, especially with the advancement of social media and mobile technology. Instead of investigating the products directly, one can only check the images, tags annotated by the sellers on the images, or ...
Detecting multiple seller collusive shill bidding
Highlights- This is the first paper to examine the scenario of multiple colluding sellers engaging in shill bidding.
AbstractShill bidding occurs when fake bids are introduced into an auction on the seller’s behalf in to artificially inflate the final price. The seller either has associates bid in the seller’s auctions, or the seller controls multiple fake ...
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same information good? Pricing schemes affect buyers' usage levels and thus the ...






Comments