Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2488388.2488476acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Latent credibility analysis

Published: 13 May 2013 Publication History

Abstract

A frequent problem when dealing with data gathered from multiple sources on the web (ranging from booksellers to Wikipedia pages to stock analyst predictions) is that these sources disagree, and we must decide which of their (often mutually exclusive) claims we should accept. Current state-of-the-art information credibility algorithms known as "fact-finders" are transitive voting systems with rules specifying how votes iteratively flow from sources to claims and then back to sources. While this is quite tractable and often effective, fact-finders also suffer from substantial limitations; in particular, a lack of transparency obfuscates their credibility decisions and makes them difficult to adapt and analyze: knowing the mechanics of how votes are calculated does not readily tell us what those votes mean, and finding, for example, that a source has a score of 6 is not informative. We introduce a new approach to information credibility, Latent Credibility Analysis (LCA), constructing strongly principled, probabilistic models where the truth of each claim is a latent variable and the credibility of a source is captured by a set of model parameters. This gives LCA models clear semantics and modularity that make extending them to capture additional observed and latent credibility factors straightforward. Experiments over four real-world datasets demonstrate that LCA models can outperform the best fact-finders in both unsupervised and semi-supervised settings.

References

[1]
M. Chang, L. Ratinov, and D. Roth. Structured Learning with Constrained Conditional Models. Machine Learning, 88(3):399--431, 2012.
[2]
A. Dempster, N. Laird, and D. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society. Series B (Methodological), 39(1):1--38, 1977.
[3]
X. Dong, L. Berti-Equille, and D. Srivastava. Truth discovery and copying detection in a dynamic world. VLDB, 2009.
[4]
A. Galland, S. Abiteboul, A. Marian, and P. Senellart. Corroborating information from disagreeing views. In WSDM, 2010.
[5]
K. Ganchev, J. Graca, J. Gillenwater, and B. Taskar. Posterior Regularization for Structured Latent Variable Models. Journal of Machine Learning Research, 2010.
[6]
P. Jorion. Risk management lessons from Long-Term Capital Management. European financial management, 6(3):277--300, 2000.
[7]
A. Josang. Artificial reasoning with subjective logic. 2nd Australian Workshop on Commonsense Reasoning, 1997.
[8]
A. Josang, S. Marsh, and S. Pope. Exploring different types of trust propagation. Lecture Notes in Computer Science, 3986:179, 2006.
[9]
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604--632, 1999.
[10]
H. K. Le, J. Pasternack, H. Ahmadi, M. Gupta, Y. Sun, T. Abdelzaher, J. Han, D. Roth, B. Szymanski, and S. Adali. Apollo : Towards Factfinding in Participatory Sensing. IPSN, 2011.
[11]
B. G. Malkiel. The efficient market hypothesis and its critics. Journal of Economic Perspectives, pages 59--82, 2003.
[12]
Y. Nesterov and I. U. E. Nesterov. Introductory lectures on convex optimization: A basic course, volume 87. Springer, 2004.
[13]
J. Pasternack and D. Roth. Knowing What to Believe (when you already know something). In COLING, 2010.
[14]
J. Pasternack and D. Roth. Making Better Informed Trust Decisions with Generalized Fact-Finding. In IJCAI, 2011.
[15]
G. Shafer. A mathematical theory of evidence. Princeton University Press Princeton, NJ, 1976.
[16]
V. G. Vydiswaran, C. X. Zhai, and D. Roth. Content-driven trust propagation framework. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 974--982. ACM, 2011.
[17]
D. Wang, T. Abdelzaher, H. Ahmadi, J. Pasternack, D. Roth, M. Gupta, J. Han, O. Fatemieh, H. Le, and C. Aggarwal. On bayesian interpretation of fact-finding in information networks. Information Fusion, 2011.
[18]
X. Yin, J. Han, and P. S. Yu. Truth discovery with multiple conflicting information providers on the web. In Proc. of SIGKDD, 2007.
[19]
X. Yin, P. S. Yu, and J. Han. Truth Discovery with Multiple Conflicting Information Providers on the Web. IEEE Transactions on Knowledge and Data Engineering, 20(6):796--808, 2008.
[20]
B. Yu and M. P. Singh. Detecting deception in reputation management. Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03, page 73, 2003.
[21]
B. Zhao, B. I. P. Rubinstein, J. Gemmell, and J. Han. A Bayesian approach to discovering truth from conflicting sources for data integration. Proceedings of the VLDB Endowment, 5(6):550--561, 2012.

Cited By

View all
  • (2024)Knowledge Verification From DataIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.320224435:3(4324-4338)Online publication date: Mar-2024
  • (2024)Quality Evaluation of Triples in Knowledge Graph by Incorporating Internal With External ConsistencyIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.318603335:2(1980-1992)Online publication date: Feb-2024
  • (2024)Claim polarity analysis from conflicting sourcesInternational Journal of Data Science and Analytics10.1007/s41060-024-00634-6Online publication date: 7-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '13: Proceedings of the 22nd international conference on World Wide Web
May 2013
1628 pages
ISBN:9781450320351
DOI:10.1145/2488388

Sponsors

  • NICBR: Nucleo de Informatcao e Coordenacao do Ponto BR
  • CGIBR: Comite Gestor da Internet no Brazil

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. credibility
  2. graphical models
  3. trust
  4. veracity

Qualifiers

  • Research-article

Conference

WWW '13
Sponsor:
  • NICBR
  • CGIBR
WWW '13: 22nd International World Wide Web Conference
May 13 - 17, 2013
Rio de Janeiro, Brazil

Acceptance Rates

WWW '13 Paper Acceptance Rate 125 of 831 submissions, 15%;
Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)3
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Knowledge Verification From DataIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.320224435:3(4324-4338)Online publication date: Mar-2024
  • (2024)Quality Evaluation of Triples in Knowledge Graph by Incorporating Internal With External ConsistencyIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.318603335:2(1980-1992)Online publication date: Feb-2024
  • (2024)Claim polarity analysis from conflicting sourcesInternational Journal of Data Science and Analytics10.1007/s41060-024-00634-6Online publication date: 7-Oct-2024
  • (2024)Truth Discovery Against Disguised Attack Mechanism in CrowdsourcingWeb and Big Data10.1007/978-981-97-2387-4_5(64-79)Online publication date: 28-Apr-2024
  • (2023)TemporalFC: A Temporal Fact Checking Approach over Knowledge GraphsThe Semantic Web – ISWC 202310.1007/978-3-031-47240-4_25(465-483)Online publication date: 27-Oct-2023
  • (2022)Microblog Authenticity Detection Based on Human-machine CollaborationProceedings of the 2022 International Conference on Human Machine Interaction10.1145/3560470.3560473(16-25)Online publication date: 6-May-2022
  • (2022)Trustworthy Knowledge Graph Completion Based on Multi-sourced Noisy DataProceedings of the ACM Web Conference 202210.1145/3485447.3511938(956-965)Online publication date: 25-Apr-2022
  • (2022)Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile CrowdsensingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.305440934:11(5140-5153)Online publication date: 1-Nov-2022
  • (2022)Harnessing Confidence for Report Aggregation in Crowdsourcing Environments2022 IEEE International Conference on Services Computing (SCC)10.1109/SCC55611.2022.00051(305-314)Online publication date: Jul-2022
  • (2022)A comprehensive study of Natural Language processing techniques Based on Big Data2022 International Conference on Decision Aid Sciences and Applications (DASA)10.1109/DASA54658.2022.9765270(1492-1497)Online publication date: 23-Mar-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media