期刊文献+

基于属性优化矩阵补全的抗托攻击推荐算法 被引量:2

Shilling-attack-tolerant recommendation algorithm based on attribute facilitated matrix completion
下载PDF
导出
摘要 托攻击是当前推荐系统面临的严峻挑战之一。由于推荐系统的开放性,恶意用户可轻易对其注入精心设计的评分,从而影响推荐结果,降低用户体验。基于属性优化结构化噪声矩阵补全技术,提出一种鲁棒的抗托攻击个性化推荐(SATPR)算法。将攻击评分视为评分矩阵中的结构化行噪声,并采用L_(2,1)范数进行噪声建模,同时引入用户与物品的属性特征以提高托攻击检测精度。实验表明,SATPR算法在托攻击下可取得比传统推荐算法更精确的个性化评分预测效果。 Shilling attack is one of serious challenges which recommender systems are facing.Malicious users can easily insert well-designed ratings into recommender systems to affect recommendation results and decrease user experiences because of the openness of recommender systems.This paper proposed a robust shilling-attack-tolerant personalized recommendation(SATPR)algorithm based on attribution facilitated matrix completion with structural noise technology,regarded the ratings of attack users in the rating matrix as structural row noise and modeled them with L2,1-norm.This paper also introduced attributive characters of users and items to improve the accuracy of detection of shilling-attack.Experimental results show that SATPR algorithm achieves more accurate results of personalized rating prediction than traditional recommendation algorithms under shilling attacks.
作者 周宇轩 陈蕾 张涵峰 Zhou Yuxuan;Chen Lei;Zhang Hanfeng(School of Computer Science,Nanjing University of Posts&Telecommunications,Nanjing 210003,China;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing University of Posts&Telecommunications,Nanjing 210003,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第3期724-729,780,共7页 Application Research of Computers
基金 江苏省自然科学基金面上项目(BK20161516) 中国博士后科学基金资助项目(2015M581794) 江苏省高校自然科学研究面上项目(15KJB520027) 江苏省博士后科研计划资助项目(1501023C)
关键词 推荐系统 托攻击 L2 1范数正则化 属性特征 recommender system shilling attack L2,1-norm regularization attributive characters
  • 相关文献

参考文献3

二级参考文献21

  • 1Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extension. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(6): 734-749.
  • 2Li Q, Kim B M. Constructing user profiles for collaborative recommender system. In: Proceedings of the 6th Asia Pacific Web Conference. Hangzhou, China: Springer, 2004. 100--110.
  • 3Herlocker J L, Konstan J A, Borchers A, Riedl J. An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, USA: ACM, 1999. 230-237.
  • 4Mobasher B, Burke R, Bhaumik R, Sandvig J J. Attacks and remedies in collaborative recommendation. IEEE InteI1igent Systems, 2007, 22(3): 56-63.
  • 5Burke R, Mobasher B, Zabicki R, Bhaumik R. Identifying attack models for secure recommendation. In: Proceedings of the Beyond Personalization Workshop on the International Conference on Intelligent User Interfaces. San Diego, USA: ACM Press, 2005. 347-361.
  • 6Lam S K, Riedl J. Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web. New York, USA: ACM, 2004. 393-402.
  • 7O'Mahony M, Hurley N J, Kushmerick N, Silvestre G. Collaborative recommendation: a robustness analysis. ACM Transactions on Internet Technology, 2004, 4(4): 344-377.
  • 8Burke R, Mobasher B, Williams C, Bhaumik R. Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, USA: ACM, 2006. 542-547.
  • 9Moba-her B, Burke R, Bhaumik R, Williams C. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on lnternet Technology, 2007, T(4): 1-38.
  • 10Burke R, Mobasher B, Bhaumik R, Williams C. Segment- based injection attacks against collaborative filtering recommender systems. In: Proceedings of the 5th IEEE International Conference on Data Mining. Washington D. C., USA: IEEE, 2005. 577-580.

共引文献42

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部