Generating unfair ratings

With an increasing popularity of online voting systems in cyberspace, there has been a growing concern with regards to whether the votes given are honest or dishonest. Dealing with unfair ratings in such systems has always been recognized as an important but challenging problem. As a result many onl...

Full description

Bibliographic Details
Main Author: Lee, Sin Wah.
Other Authors: School of Computer Engineering
Format: Final Year Project (FYP)
Language:English
Published: 2011
Subjects:
Online Access:http://hdl.handle.net/10356/44247
_version_ 1811684271240249344
author Lee, Sin Wah.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Lee, Sin Wah.
author_sort Lee, Sin Wah.
collection NTU
description With an increasing popularity of online voting systems in cyberspace, there has been a growing concern with regards to whether the votes given are honest or dishonest. Dealing with unfair ratings in such systems has always been recognized as an important but challenging problem. As a result many online detection algorithms have been developed and evaluated against simple attack models. However the style of attack performed by the attackers is always changing, thus there is not one detection algorithm which can be used against all forms of attacks.
first_indexed 2024-10-01T04:25:58Z
format Final Year Project (FYP)
id ntu-10356/44247
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:25:58Z
publishDate 2011
record_format dspace
spelling ntu-10356/442472023-03-03T20:25:03Z Generating unfair ratings Lee, Sin Wah. School of Computer Engineering Zhang Jie DRNTU::Engineering::Computer science and engineering With an increasing popularity of online voting systems in cyberspace, there has been a growing concern with regards to whether the votes given are honest or dishonest. Dealing with unfair ratings in such systems has always been recognized as an important but challenging problem. As a result many online detection algorithms have been developed and evaluated against simple attack models. However the style of attack performed by the attackers is always changing, thus there is not one detection algorithm which can be used against all forms of attacks. Bachelor of Engineering (Computer Engineering) 2011-05-31T06:59:50Z 2011-05-31T06:59:50Z 2011 2011 Final Year Project (FYP) http://hdl.handle.net/10356/44247 en Nanyang Technological University 55 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering
Lee, Sin Wah.
Generating unfair ratings
title Generating unfair ratings
title_full Generating unfair ratings
title_fullStr Generating unfair ratings
title_full_unstemmed Generating unfair ratings
title_short Generating unfair ratings
title_sort generating unfair ratings
topic DRNTU::Engineering::Computer science and engineering
url http://hdl.handle.net/10356/44247
work_keys_str_mv AT leesinwah generatingunfairratings