期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction 被引量:2
1
作者 Yaojun Hao Fuzhi Zhang Jinbo Chao 《China Communications》 SCIE CSCD 2019年第8期130-146,共17页
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extracted by human engineering are usually aimed at some specific types of attacks. To further detect other new types of attacks, the traditional methods have to re-extract detection features with high knowledge cost. To address these limitations, the method for automatic extraction of robust features is proposed and then an Adaboost-based detection method is presented. Firstly, to obtain robust representation with prior knowledge, unlike uniform corruption rate in traditional mLDA(marginalized Linear Denoising Autoencoder), different corruption rates for items are calculated according to the ratings’ distribution. Secondly, the ratings sparsity is used to weight the mapping matrix to extract low-dimensional representation. Moreover, the uniform corruption rate is also set to the next layer in mSLDA(marginalized Stacked Linear Denoising Autoencoder) to extract the stable and robust user features. Finally, under the robust feature space, an Adaboost-based detection method is proposed to alleviate the imbalanced classification problem. Experimental results on the Netflix and Amazon review datasets indicate that the proposed method can effectively detect various attacks. 展开更多
关键词 shilling ATTACK ENSEMBLE detection FEATURES of AUTOMATIC EXTRACTION marginalized linear DENOISING autoencoder
下载PDF
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation 被引量:1
2
作者 Lingtao Qi Haiping Huang +2 位作者 Feng Li Reza Malekian Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第10期112-132,共21页
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGenl) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGenl, a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD,SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM. 展开更多
关键词 shilling attack detection model collaborative filtering recommender systems gravitation-based detection model particle filter algorithm
下载PDF
Generating A New Shilling Attack for Recommendation Systems
3
作者 Pradeep Kumar Singh Pijush Kanti Dutta Pramanik +3 位作者 Madhumita Sardar Anand Nayyar Mehedi Masud Prasenjit Choudhury 《Computers, Materials & Continua》 SCIE EI 2022年第5期2827-2846,共20页
A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing.To keep the recommendation systems reliable,authentic,and superior,the security of these systems is very cr... A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing.To keep the recommendation systems reliable,authentic,and superior,the security of these systems is very crucial.Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks,in this paper,we prove that they fail to detect a new or unknown attack.We develop a new attack model,named Obscure attack,with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended.The Obscure attack is able to push target items to the top-N list as well as remove the actual rated items from the list.Our proposed attack is more effective at a smaller number of k in top-k similar user as compared to other existing attacks.The effectivity of the proposed attack model is tested on the MovieLens dataset,where various classifiers like SVM,J48,random forest,and naïve Bayes are utilized. 展开更多
关键词 shilling attack recommendation system collaborative filtering top-N recommendation BIASING SHUFFLING hit ratio
下载PDF
DPIF:A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks
4
作者 Mohan Li Yanbin Sun +3 位作者 Shen Su Zhihong Tian Yuhang Wang Xianzhi Wang 《Computers, Materials & Continua》 SCIE EI 2019年第4期331-344,共14页
Maliciously manufactured user profiles are often generated in batch for shilling attacks.These profiles may bring in a lot of quality problems but not worthy to be repaired.Since repairing data always be expensive,we ... Maliciously manufactured user profiles are often generated in batch for shilling attacks.These profiles may bring in a lot of quality problems but not worthy to be repaired.Since repairing data always be expensive,we need to scrutinize the data and pick out the data that really deserves to be repaired.In this paper,we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks.A two-steps framework named DPIF is proposed for the distinguishment.Based on the framework,the metrics of homology and suspicious degree are proposed.The homology can be used to represent both the similarities of text and the data quality problems contained by different profiles.The suspicious degree can be used to identify potential attacks.The experiments on real-life data verified that the proposed framework and the corresponding metrics are effective. 展开更多
关键词 Data quality shilling attacks functional dependency suspicious degree HOMOLOGY
下载PDF
Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering 被引量:5
5
作者 张响亮 Tak Man Desmond Lee Georgios Pitsilis 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期616-624,共9页
Abstract Recommender systems (RS) have been found supportive and practical in e-commerce and been established as useful aiding services. Despite their great adoption in the user communities, RS are still vulnerable ... Abstract Recommender systems (RS) have been found supportive and practical in e-commerce and been established as useful aiding services. Despite their great adoption in the user communities, RS are still vulnerable to unscrupulous producers who try to promote their products by shilling the systems. With the advent of social networks new sources of information have been made available which can potentially render RS more resistant to attacks. In this paper we explore the information provided in the form of social links with clustering for diminishing the impact of attacks. We propose two algorithms, CLUTR and WCLUTR, to combine clustering with "trust" among users. We demonstrate that CLuTR and WCLUTR enhance the robustness of RS by experimentally evaluating them on data from a public consumer recommender system Epinions.com. 展开更多
关键词 shilling attack recommender system collaborative filtering social trust CLUSTERING
原文传递
A COMPARATIVE STUDY ON SHILLING DETECTION METHODS FOR TRUSTWORTHY RECOMMENDATIONS 被引量:3
6
作者 Youquan Wang Liqiang Qian +1 位作者 Fanzhang Li Lu Zhang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2018年第4期458-478,共21页
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far,... Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far, and they exhibit complementary advantage and disadvantage towards various types of attackers. In this paper, we provide a thorough experimental comparison of several well-known detectors, including supervised C4.5 and NB, unsupervised PCA and MDS, semi-supervised HySAD methods, as well as statistical analysis methods. MovieLens 100K is the most widely-used dataset in the realm of shilling attack detection, and thus it is selected as the benchmark dataset. Meanwhile, seven types of shilling attacks generated by average-filling and random-filling model are compared in our experiments. As a result of our analysis, we show clearly causes and essential characteristics insider attackers that might determine the success or failure of different kinds of detectors. 展开更多
关键词 Recommender system shilling attack detection supervised classification unsupervisedclustering statistical analysis methods
原文传递
在线拍卖中的Shill出价识别模型 被引量:6
7
作者 李雪峰 刘鲁 张曌 《系统管理学报》 北大核心 2007年第4期360-364,共5页
在线拍卖这种新的交易方式已经开始逐渐深入到人们的日常生活,但消费者在享受在线拍卖自由与便捷的同时,也屡屡受到欺诈,这严重影响了交易的诚信,Shill出价就是在线拍卖中典型的欺诈形式之一。如果能够识别Shill出价,就可以有目标地跟... 在线拍卖这种新的交易方式已经开始逐渐深入到人们的日常生活,但消费者在享受在线拍卖自由与便捷的同时,也屡屡受到欺诈,这严重影响了交易的诚信,Shill出价就是在线拍卖中典型的欺诈形式之一。如果能够识别Shill出价,就可以有目标地跟踪交易过程,使得Shill出价免于发生或尽量减少发生。在不改变费用结构的前提下,本文运用关联规则,在充分考虑Shill出价特点的基础上,分析卖者和买者间的关系,试图为Shill出价的识别提供一种行之有效的方法。实验结果证明了该方法的有效性。 展开更多
关键词 在线拍卖 Shill出价识别 关联规则
下载PDF
A Robust Collaborative Recommendation Algorithm Based on k-distance and Tukey M-estimator 被引量:6
8
作者 YI Huawei ZHANG Fuzhi LAN Jie 《China Communications》 SCIE CSCD 2014年第9期112-123,共12页
The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distanc... The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness. 展开更多
关键词 shilling attacks robust collaborative recommendation matrix factori-zation k-distance Tukey M-estimator
下载PDF
从shill到toadeater
9
作者 齐揆一 《语言教育》 1997年第6期38-38,共1页
人们通常把假装购物以引诱顾客上当的卖假货者的同伙或勾引赌客入局的赌棍同伙称之为“托儿”。英语中的叫法是 shill 或 shillaber。早在中世纪前后外国就有“托儿”了。他们活动的场所往往是 marketfair(集市),最早的“托儿”是走江... 人们通常把假装购物以引诱顾客上当的卖假货者的同伙或勾引赌客入局的赌棍同伙称之为“托儿”。英语中的叫法是 shill 或 shillaber。早在中世纪前后外国就有“托儿”了。他们活动的场所往往是 marketfair(集市),最早的“托儿”是走江湖卖假药的江湖医生的“雇员”,他往往是善于辞令且有表演才能的人;许多世纪以前,蟾蜍(toad) 展开更多
关键词 表演才能 shill toadeater 小计
下载PDF
From similarity perspective: a robust collaborative filtering approach for service recommendations 被引量:2
10
作者 Min GAO Bin LING +3 位作者 Linda YANG Junhao WEN Qingyu XIONG Shun LI 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第2期231-246,共16页
Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profi... Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profiles into the system. In this paper, we first present the shilling attack problem on CF-based QoS recommender systems for Web services. Then, a robust CF recommendation approach is proposed from a user similarity perspective to enhance the resistance of the recommender systems to the shilling attack. In the approach, the generally used similarity measures are analyzed, and the DegSim (the degree of similarities with top k neighbors) with those measures is selected for grouping and weighting the users. Then, the weights are used to calculate the service similarities/differences and predictions. We analyzed and evaluated our algorithms using WS-DREAM and Movielens datasets. The experimental results demonstrate that shilling attacks influence the prediction of QoS values, and our proposed features and algorithms achieve a higher degree of robustness against shilling attacks than the typical CF algorithms. 展开更多
关键词 COLLABORATIVE FILTERING service RECOMMENDATION system ROBUSTNESS shilling ATTACK
原文传递
Robust Recommendation Algorithm Based on Kernel Principal Component Analysis and Fuzzy C-means Clustering 被引量:2
11
作者 YI Huawei NIU Zaiseng +2 位作者 ZHANG Fuzhi LI Xiaohui WANG Yajun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期111-119,共9页
The existing recommendation algorithms have lower robustness in facing of shilling attacks. Considering this problem, we present a robust recommendation algorithm based on kernel principal component analysis and fuzzy... The existing recommendation algorithms have lower robustness in facing of shilling attacks. Considering this problem, we present a robust recommendation algorithm based on kernel principal component analysis and fuzzy c-means clustering. Firstly, we use kernel principal component analysis method to reduce the dimensionality of the original rating matrix, which can extract the effective features of users and items. Then, according to the dimension-reduced rating matrix and the high correlation characteristic between attack profiles, we use fuzzy c-means clustering method to cluster user profiles, which can realize the effective separation of genuine profiles and attack profiles. Finally, we construct an indicator function based on the attack detection results to decrease the influence of attack profiles on the recommendation, and incorporate it into the matrix factorization technology to design the corresponding robust recommendation algorithm. Experiment results indicate that the proposed algorithm is superior to the existing methods in both recommendation accuracy and robustness. 展开更多
关键词 robust recommendation shilling attacks matrixfactorization kernel principal component analysis fuzzy c-meansclustering
原文传递
SOFT CONTROL ON COLLECTIVE BEHAVIOR OF A GROUP OF AUTONOMOUS AGENTS BY A SHILL AGENT 被引量:23
12
作者 Jing HAN Ming LI Lei GUO 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2006年第1期54-62,共9页
This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called 'Soft Control' which keeps the local... This paper asks a new question: how can we control the collective behavior of self-organized multi-agent systems? We try to answer the question by proposing a new notion called 'Soft Control' which keeps the local rule of the existing agents in the system. We show the feasibility of soft control by a case study. Consider the simple but typical distributed multi-agent model proposed by Vicsek et al. for flocking of birds: each agent moves with the same speed but with different headings which are updated using a local rule based on the average of its own heading and the headings of its neighbors. Most studies of this model are about the self-organized collective behavior, such as synchronization of headings. We want to intervene in the collective behavior (headings) of the group by soft control. A specified method is to add a special agent, called a 'Shill', which can be controlled by us but is treated as an ordinary agent by other agents. We construct a control law for the shill so that it can synchronize the whole group to an objective heading. This control law is proved to be effective analytically and numerieally. Note that soft control is different from the approach of distributed control. It is a natural way to intervene in the distributed systems. It may bring out many interesting issues and challenges on the control of complex systems. 展开更多
关键词 Bold model collective behavior multi-agent system shill agent soft control.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部