期刊文献+

推荐系统安全问题及技术研究综述 被引量:6

Review of key security threats and countermeasures in recommender systems
下载PDF
导出
摘要 从托(shilling)攻击的分类、攻击模型、影响程度评价、检测和防御等几个方面进行系统评述,着重分析了托攻击所面临的关键议题。最后指出了推荐系统托攻击的研究难点和研究方向。 This paper presented an overview of the five dimensions of shilling attack including category, attack model, power evaluation, detection and defence, and especially emphasized on the analysis of the key issue faced by each dimension. Finally, pointed out some promising directions in shilling attack.
出处 《计算机应用研究》 CSCD 北大核心 2008年第3期656-659,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(70663002) 江西省教育科学"十一五"规划资助项目(06YB141) 江西省社会科学"十一五"规划资助项目(06JY13)
关键词 推荐系统 安全 托攻击 检测 防御 recommender systems security shilling attack detection defence
  • 相关文献

参考文献28

  • 1Sony admits using fake reviewer [ EB/OL ]. [ 2006-11-12 ]. http:// newsvote, bbc, co. uk/2/hi/entertainment/1368666, stm.
  • 2OLSEN S. Amazon blushes over sex link gaffe [ EB/OL]. [ 2006-11-15 ]. http ://news. com. com/2100-1023- 976435. html,
  • 3ADOMAVICIUS G, TUZHILIN A. Toward the next generation of recommender systems: a survey of the state of the art and possible extensions[J]. IEEE Trans on Knowledge and Data Engineering, 2005,17(6) :734-749.
  • 4RESNICK P,IACOVOU N,SUSHAK M,et al. GroupLens:an open architecture for collaborative filtering of netnews [ C ]//Proc of ACM Conference on Computer Supported Cooperative Work. New York:ACM Press, 1994 : 175-186.
  • 5GOOD N, SCHAFER B, KONSTAN J, et al. Combining collaborative filtering with personal agents for better recommendations [ C ]//Proc of the 16th Conference of the American Association of Artificial Intelligence. Orlando, FL : AAAI Press, 1999:439-446.
  • 6HERLOCKER J, KONSTAN J, BORCHERS A,et al. An algorithmic framework for performing collaborative filtering[ C ]//Proc of the 22th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York : ACM Press, 1999 : 230- 237.
  • 7SARWAR B, KARYPIS G, KONSTAN J, et al. Item-based collaborative filtering recommendation algorithms [ C ]//Proc of the 10th International World Wide Web Conference. New York : ACM Press, 2001 : 285-295.
  • 8LI Q,KIM B M. Constructing user profiles for collaborative recommender system[ C]//Proc of the 6th Asia Pacific Web Conference. Berlin : Springer, 2004 : 100-110.
  • 9LAM S K, RIEDL J. Shilling recommender systems for fun and profit [ C ]//Proc of the 13 th International Conference on World Wide Web. New York.. ACM Press, 2004:393- 402.
  • 10BURKE R, MOBASHER B,ZABICKI R, et al. Identifying attack models for secure recommendation [ C ]//Proc of the International Conferece on Intelligent User Interfaces. 2005:347-361.

同被引文献35

引证文献6

二级引证文献357

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部