Attacks and Threats
in Crowdsourcing
Lecturer: Kenneth Huang
txh710@psu.edu
Mar 31, 2020
Move the Final Project Presentation
From Live to Video Recording
2
3
Attacks and Threats
in Crowdsourcing
Lecturer: Kenneth Huang
txh710@psu.edu
Mar 31, 2020
We’re Going to Talk About…
5
6
7
8
Spammer Workers
9
We’re Going to Talk About…
10
Malicious Users
11
We’re Going to Talk About…
12
13
14
15
16
We’re Going to Talk About…
17
18
19
20
We’re Going to Talk About…
21
Two Types of Attack
22
Lasecki, W. S., Teevan, J., & Kamar, E. (2014, February). Information extraction and manipulation threats in crowd-powered systems. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (pp. 248-256). ACM.
Information Extraction Attack
23
Information Manipulation Attack
24
Conditions
25
Results
26
27
Attacks and Threats
in Crowdsourcing
Lecturer: Kenneth Huang
txh710@psu.edu
Mar 31, 2020