Research Article

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms

Algorithm 2

Generating the candidate spamming groups.
Input: set of sample objects S
Output: candidate spamming groups CPG
(1), ,
(2)for each object do
(3)for each object do
(4)  
(5)endfor
(6)end for
(7)
(8)while S is not empty do
(9) choose a sample object from S to initialize a canopy set
(10)
(11)for each object in S do
(12)  
(13)  ifthen
(14)   
(15)  end if
(16)  ifthen
(17)   
(18)  end if
(19)end for
(20)
(21)
(22)
(23)end while
(24)
(25)return CPG