Cutting-Edge Techniques for Detecting Fake Reviews
DOI:
https://doi.org/10.4108/airo.8945Keywords:
Review Classification Techniques, Deep Learning, Hybrid ModelsAbstract
The paper reviews various approaches for detecting fake reviews using different machine learning techniques, each with distinct strengths and limitations. It examines existing literature on supervised learning methods, unsupervised techniques, graph-based models, and hybrid approaches. Among these, unsupervised models rely on pattern recognition, while supervised methods, including SVM and transformer-based models like BERT, offer high accuracy but struggle with class imbalance and computational efficiency. Unsupervised and graph-based models serve as effective alternatives when labeled data is scarce or when complex relationships between reviews and users must be analyzed. Additionally, hybrid approaches that integrate multiple techniques are gaining traction, as they enhance feature selection and model performance. In this paper, we explore different methodologies for fake review classification, analyze their advantages and drawbacks, and highlight key challenges in the field.
Downloads
References
[1] X. Fang, H. Yang, L. Zhang, et al., (2024). Enhancing App Usage Prediction Accuracy With GCN- Transformer Model and Meta-Path Context. IEEE Access, vol. 12, pp. 53031 53044. https://doi.org/10.1109/ACCESS.2024.337239.
[2] Abd-Alhalem, S. M., Ali, H. A., Soliman, N. F., Algarni, A. D., and Marie, H. S. (2024). Advancing E- Commerce Authenticity: A Novel Fusion Approach Based on Deep Learning and Aspect Features for Detecting False Reviews. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3435916.
[3] Liu, D., Zhou,S., Shen, R., and Luo,X.(2023).Color Image Edge Detection Method Based on the Improved Whale Optimization Algorithm. IEEE Access, vol. 11, pp. 5981 5989. https://doi.org/10.1109/ACCESS.2023.3236761.
[4] Li, X., and Chen, L. (2023). Fake Review Detection Using Deep Neural Networks with Multimodal Feature Fusion Method. 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS), pp. 2869-2872. https://doi.org/10.1109/ICPADS60453.2023.00411.
[5] A, A., L, N., P, D., and Gokilavani. (2024). Predicting the Fake Review to Amazon Product Review Dataset Using Fuzzy Optimized Convolution Neural Network. 2024 International Conference on Expert Clouds and Applications (ICOECA), pp. 689- 693. https://doi.org/10.1109/ICOECA62351.2024.00125.
[6] Tajrian, M., Rahman, A., Kabir, M. A., and Islam, M.
R. (2023). A Review of Methodologies for Fake News Analysis. IEEE Access, vol. 11, pp. 73879-73893. https://doi.org/10.1109/ACCESS.2023.3294989.
[7] Abedin, E.,Mendoza, A.,Akbarighatar, P., and Karunas k era, S. (2024). Predicting Credibility of Online Reviews: An Integrated Approach. IEEE Access, vol. 12, pp. 49050 49061. https://doi.org/10.1109/ACCESS.2024.3383846.
[8] Catelli, R., et al. (2023). A New Italian Cultural Heritage Data Set: Detecting Fake Reviews with BERT and ELECTRA Leveraging the Sentiment. IEEE Access, vol. 11, pp. 52214-52225. https://doi.org/10.1109/ACCESS.2023.3277490.
[9] Liu, T., Jiang, A., Zhou, J., Li, M., and Kwan, H. K. (2023). GraphSAGE-Based Dynamic Spatial– Temporal Graph Convolutional Network for Traffic Prediction. IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 10,pp.11210-11224.https://doi.org/10.1109/TITS.2023.3279929.
[10] Hamilton, W., Ying, R., and Leskovec, J. (2017). Inductive Representation Learning on Large Graphs. Dept. Comp. Sci., Stanford Univ., California. https://doi.org/10.48550/arXiv.1706.02216.
[11] Feng, C., Li, Z., Shao, L., Li, J., Li, C., and Liu, H.(2024). Load Prediction of Composite Curing Equipment Cluster Based on Combined EEMD-WOA LSTM Model. 2024 IEEE International Conference on Mechatronics and Automation (ICMA),pp.183-188. https://doi.org/10.1109/ICMA61710.2024.1063294.
[12] Li, W., and Zhang, W. (2024). Research on Selective Harmonic Elimination Technology Based on Enhanced Whale Optimization Algorithm. 2024 IEEE International Conference on Mechatronics and Automation (ICMA), pp. 1-6. https://doi.org/10.1109/ICMA61710.2024.1063299 0.
[13] Ma, X., Gu, W., Lv, S., and Zheng, C. (2024). Optimal Configuration of Grid-Forming Energy Storage System Based on the Whale Optimization Algorithm. 2024 3rd International Conference on Energy, Power and Electrical Technology (ICEPET), pp. 754- 759. https://doi.org/10.1109/ICEPET61938.2024.10627.
[14] Safara, F., et al. (2020). An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network. IEEE Access, vol. 8, pp. 48428 48437. https://doi.org/10.1109/ACCESS.2020.2973509.
[15] Aquino, J. P. J., De Guia, A. P. G., Dela Cruz, D. C., and De Goma, J. C. (2024). Fraud Detection in Online Credit Card Transactions Using Deep Learning. 2024 5th International Conference on Industrial Engineering and Artificial Intelligence (IEAI),pp.85-89. https://doi.org/10.1109/IEAI62569.2024.00023.
[16] Devavarapu, Y., Bedadhala, R. R., Shaik, S. S., Pendela, C. R. K., and Ashesh, K. (2024). Credit Card Fraud Detection Using Outlier Analysis and Detection. 2023 4th International Conference on Intelligent Technologies (CONIT), pp. 1-7. https://doi.org/10.1109/CONIT61985.2024.106264
[17] Riccard, K., and Bandara, D. (2023). Autism Risk Classification Using Graph Neural Networks Applied to Gene Interaction Data. 2023 Congress in Computer Science, Computer Engineering, Applied Computing (CSCE), pp. 1574-1580. https://doi.org/10.1109/CSCE60160.2023.00259.
[18] Pei, G., Tang, Y., Yan, S., and Hu, D. (2024). Is this Real? Image Steganography without Embedding Spoofs Fake Image Detector. 2024 3rd International Conference on Image Processing and Media Computing (ICIPMC), pp. 192-198. https://doi.org/10.1109/ICIPMC62364.2024.105866
[19] Rani,S., and Mittal, A.(2023).Securing Digital Payments a Comprehensive Analysis of AI Driven Fraud Detection with Real Time Transaction Monitoring and Anomaly Detection. 2023 6th International Conference on Contemporary Computing and Informatics(IC3I), pp. 2345-2349. https://doi.org/10.1109/IC3I59117.2023.10397958.
[20] P, A., Bharath, S., Rajendran, N., Devi, S. D., and Saravanakumar, S. (2023). Experimental Evaluation of Smart Credit Card Fraud Detection System using Intelligent Learning Scheme. 2023 International Conference on Innovative Computing, Intelligent Communication and Security (ICIVICS), pp.10-14. https://doi.org/10.1109/ICICICS53744.2023.102827
[21] Mewada, A., and Dewang, R. K. (2022). Research on False Review Detection Methods: A State-of-the- Art Review. Journal of King Saud University- Computer and Information Sciences, vol. 34, no. 9, pp. 7530-7546. https://doi.org/10.1016/j.jksuci.2021.07.021.
[22] Hameed, W., Allami, R., and Ali, Y. (2023). Fake Review Detection Using Machine Learning. Revue d’ Intelligence Artificielle, vol. 37. https://doi.org/10.18280/ria.370507.
[23] Yu, S., Ren, J., Li, S., Parsa, M. N., and Xia, F. (2022). Graph Learning for Fake Review Detection. Frontiers in Artificial Intelligence, vol. 5, pp. 922589. https://doi.org/10.3389/frai.2022.922589.
[24] Kumar, K., George, K. S., Bhatt, D., and Paul, O. P. (2023). A Brief Study on the Fake Review Detection Methods on E-commerce Websites using Machine Learning, Artificial Intelligence, and Data Science. International Journal of Recent Advances in Multidisciplinary Research, vol. 11, no. 4, pp. 52743. https://doi.org/10.22214/ijraset.2023.52743.
[25] Muhawesh, R., Xu, S., Tran, S., Ollington, R., Springer, M., Jararweh, Y., and Maqsood, S. (2021). Fake Reviews Detection: A Survey. IEEEAccess,vol.9,pp.43142-43164. https://doi.org/10.1109/ACCESS.2021.3075573.
[26] Ben Jabeur, S., Ballouk, H., Ben Arfi, W., and Sahut, J.-M. (2023). Artificial Intelligence Applications in Fake Review Detection: Bibliometric Analysis and Future Avenues for Research. Journal of Business Research, vol. 158, pp. 113631. https://doi.org/10.1016/j.jbusres.2022.113631.
[27] Sheikhi, S. (2021). An Effective Fake News Detection Method Using WOA-xgbTree Algorithm and Content Based Features. Applied Soft Computing, vol. 109, pp. 107559. https://doi.org/10.1016/j.asoc.2021.107559.
[28] Oak, R. (2024). Detecting Review Fraud Using Meta heuristic Graph Neural Networks. International Journal of Information Technology, vol. 16, no. 4, pp. 1-10. https://doi.org/10.1007/s41870-024-01896-
[29] Iqbal, A., Rauf, M. A., Zubair, M., and Younis, T. (2023). An Efficient Ensemble Approach for Fake Reviews Detection. 2023 3rd International Conference on Artificial Intelligence (ICAI),pp.7075.https://doi.org/10.1109/ICAI58407.2023.10136652.
[30] Lai, S., Wu, J., Ye, C., and Ma, Z. (2024). UCF PKS: Unforeseen Consumer Fraud Detection with Prior Knowledge and Semantic Features. IEEE Transactions on Computational Social Systems, vol. 11, no. 4, pp. 5454 5467.https://doi.org/10.1109/TCSS.2024.3372519.
[31] Mienye, I. D., and Jere, N. (2024). Deep Learning for Credit Card Fraud Detection: A Review of Algorithms, Challenges, and Solutions. IEEE Access, vol. 12, pp. 96893-96910.https://doi.org/10.1109/ACCESS.2024.3426955.
[32] Abitova, G. A., Abalkanov, M., Shuteyeva, G., Aitmukhanbetova, E., and Kulniyazova, K. (2024). Review of Cloud AI for Real-Time Fraud Detection. 2024 10th International Conference on Automation, Robotics and Applications (ICARA), pp.454-460. https://doi.org/10.1109/ICARA60736.2024.105531
[33] Silpa, C., Prasanth, P., Sowmya, S., Bhumika, Y., Pavan, C. H. S., and Naveed, M. (2023). Detection of Fake Online Reviews by Using Machine Learning. 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), pp. 71-77. https://doi.org/10.1109/ICIDCA56705.2023.100997
[34] Shan, Z., Wang, Y., Liu, X., and Wei, C. (2023). Fuzzy Automatic Disturbance Rejection Control of Quadrotor UAV Based on Improved Whale Optimization Algorithm. IEEE Access, vol. 11, pp. 69117-69130. https://doi.org/10.1109/ACCESS.2023.3292265.
[35] Liu, D., Zhou, S., Shen, R., and Luo, X. (2023). Color Image Edge Detection Method Based on the Improved Whale Optimization Algorithm. IEEE Access, vol. 11, pp. 5981-5989. https://doi.org/10.1109/ACCESS.2023.3236761.
[36] Lu, Z., et al. (2024). Inversion of Bubble Size Distribution Based on Whale Optimization Algorithm. IEEE Photonics Journal, vol. 16, no. 4, pp. 1-6. https://doi.org/10.1109/JPHOT.2024.3406886.
[37] Riccard, K., and Bandara, D. (2023). Autism Risk Classification Using Graph Neural Networks Applied to Gene Interaction Data. 2023 Congress in Computer Science, Computer Engineering, Applied Computing (CSCE), pp. 1574-1580. https://doi.org/10.1109/CSCE60160.2023.00259.
[38] Hao, W., Zhang, W., and Jin, H. (2024). SAGE-Net: Employing Spatial Attention and Geometric Encoding for Point Cloud Based Place Recognition. IEEE Robotics and Automation Letters, vol. 9, no. 6, pp. 4958-4965. https://doi.org/10.1109/LRA.2024.3387112.
[39] Wu, Z., and Savidis, I. (2024). Comparative Analysis of Graph Isomorphism and Graph Neural Networks for Analog Hierarchy Labeling. 2024 25th International Symposium on Quality Electronic Design (ISQED), pp. 1 7. https://doi.org/10.1109/ISQED60706.2024.105287
[40] Tang, S., Jin, L., and Cheng, F. (2021). Fraud Detection in Online Product Review System via Heterogeneous Graph Transformer. IEEE Access, vol. 9, pp. 167364-167373, https://doi.org/10.1109/ACCESS.2021.3084924.
[41] Ren, X., Yuan, Z., and Huang, J. (2022). Research on Fake Reviews Detection Based on Graph Neural Network. Proc. SPIE, vol. 12250, International Symposium on Computer Applications and Information Systems (ISCAIS 2022), 1225015. https://doi.org/10.1117/12.2639534.
[42] Cheng, L.-C., Wu, Y. T., Chao, C.-T., and Wang, J. H. (2024). Detecting Fake Reviewers from the Social Context with a Graph Neural Network Method Decision Support Systems, vol. 179, pp. 114150. https://doi.org/10.1016/j.dss.2023.114150.
[43] Zhao, J., Shao, M., Tang, H., Liu, J., Du, L., and Wang, H. (2023). RHGNN: Fake Reviewer Detection Based on Reinforced Heterogeneous Graph Neural Networks. Knowledge-Based Systems, vol. 280, pp.111029. https://doi.org/10.1016/j.knosys.2023.111029.
[44] Pandey, A. C., and Tikkiwal, V. A. (2021). Stance Detec tion Using Improved Whale Optimization Algorithm. Complex Intelligence and Systems, vol. 7, pp. 1649–1672. https://doi.org/10.1007/s40747-021-00294-0.
[45] Narayan, A., Tharun, D., S. D, M. K., and Chacko,A. (2024). Elevating GraphSAGE for Covertness: A Strategic Approach to Unmasking Fake Reviews in E Commerce. Workshop Proceedings of the 18th International AAAI Conference on Web and social media. https://doi.org/10.36190/2024.65.
[46] Shuaib, M., Abdulhamid, S. M., Adebayo, O. S., et al. (2019). Whale Optimization Algorithm-Based Email Spam Feature Selection Method Using Rotation Forest Algorithm for Classification. SN Applied Sciences, vol. 1, pp. 390. https://doi.org/10.1007/s42452-019-0394-7.
[47] H.Yu, W.Liu, N. Zhu, P. Li, and X. Luo, ”IN-GFD: An Interpretable Graph Fraud Detection Model for Spam Reviews,” IEEE Transactions on Artificial Intelligence. https://doi.org/10.1109/TAI.2024.3420262
[48] A. Shivhare and R. Dubey, ”Deep Learning Model for Classifying Spam Review Over Social Media,” 2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bengaluru, India, pp. 688 694.https://doi.org/10.1109/ICIMIA60377.2023.104 26476
[49] A. A. Ibrahim, M. G. Abdulkareem, and I.Al-Jadir, ”A Comparison of Deep Learning Techniques Used to Identify Social Media Reviews,” 2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT), Al-Muthana, Iraq, pp. 18-22. https://doi.org/10.1109/AICCIT57614.2023.102182
[50] Aritsugi M, et al. ”Exploiting function words feature in classifying deceptive and truthful reviews” In: 2018 Thirteenth International Conference on Digital Information Management (ICDIM). IEEE, 2018, pp. 51–6. https:// 10.1109/ICDIM.2018.8846971
[51] OttM, Cardie C, Hancock J Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on World Wide Web, 2012; pp. 201–10. https://doi.org/10.1145/2187836.21878
[52] Meanin G, Mikolov ,Ranzato M ,and Bengio Y. Ensemble of generative and discriminative techniques for sentiment analysis of movie reviews. arXiv preprint; 2014 https://doi.org/10.48550/arXiv.1412.5335
[53] Yang X and Yu X. Recognizing deceptive reviews based on weighted multi-instance unbalanced support vector machine. In: Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science, 2019, pp. 705–8. https://doi.org/10.1145/3349341.3349494
[54] Kennedy S, Walsh N, Sloka K, Mccarren A, and Foster J. Fact or factitious? Contextualized opinion spam detection. In: Proceedings of the 57th Annual Meeting of the association for computational linguistics: student research workshop, 2019. https:// 10.18653/v1/P19-2048
[55] Devlin J, Chang MW, Lee K, and Toutanova K. Bert: pre train- ing of deep bidirectional transformers for language understand- ing. 2018. https:// 10.18653/v1/N19-1423
[56] Sihombing A and Fong ACM. Fake review detection on yelp dataset using classification techniques in machine learning. In: 2019 International conference on contemporary computing and informatics (IC3I). IEEE, 2019, pp. 64–8. https:// 10.1109/IC3I46837.2019.9055644
[57] R. H. Al-Furaiji and H. Abdulkader, “A Comparison of the Performance of Six Machine Learning Algorithms for Fake News”, EAI Endorsed Trans AI Robotics, vol. 3, Mar. 2024. https://doi.org/10.4108/airo.4153
[58] U. Tank, S. Arirangan, A. R. Paduri, and N. Darapaneni, “A Study Towards Building Content Aware Models in NLP using Genetic Algorithms”, EAI Endorsed Trans AI Robotics, vol. 2, Nov. 2023. https://doi.org/10.4108/airo.4078
[59] M. Tyagi, P. K. Singh, S. K. Yadav, and S. K. Soni, “A Multi-Channel Spam Detection System Utilizing Natural Language Processing and Machine Learning”, EAI Endorsed Trans AI Robotics, vol. 4, Mar. 2025. https://doi.org/10.4108/airo.8309
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Kuldeep Vayadande, Amit Mishra, Gajanan R. Patil, Yogesh Bodhe, Pavitha Nooji, Ninad Kale, Anish Katariya, Amey Kharade, Parth Supekar, Lalit Patil

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.