期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
DPIF:A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks
1
作者 Mohan Li Yanbin Sun +3 位作者 Shen Su Zhihong Tian Yuhang Wang Xianzhi Wang 《Computers, Materials & Continua》 SCIE EI 2019年第4期331-344,共14页
Maliciously manufactured user profiles are often generated in batch for shilling attacks.These profiles may bring in a lot of quality problems but not worthy to be repaired.Since repairing data always be expensive,we ... Maliciously manufactured user profiles are often generated in batch for shilling attacks.These profiles may bring in a lot of quality problems but not worthy to be repaired.Since repairing data always be expensive,we need to scrutinize the data and pick out the data that really deserves to be repaired.In this paper,we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks.A two-steps framework named DPIF is proposed for the distinguishment.Based on the framework,the metrics of homology and suspicious degree are proposed.The homology can be used to represent both the similarities of text and the data quality problems contained by different profiles.The suspicious degree can be used to identify potential attacks.The experiments on real-life data verified that the proposed framework and the corresponding metrics are effective. 展开更多
关键词 Data quality shilling attacks functional dependency suspicious degree HOMOLOGY
下载PDF
Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering 被引量:5
2
作者 张响亮 Tak Man Desmond Lee Georgios Pitsilis 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期616-624,共9页
Abstract Recommender systems (RS) have been found supportive and practical in e-commerce and been established as useful aiding services. Despite their great adoption in the user communities, RS are still vulnerable ... Abstract Recommender systems (RS) have been found supportive and practical in e-commerce and been established as useful aiding services. Despite their great adoption in the user communities, RS are still vulnerable to unscrupulous producers who try to promote their products by shilling the systems. With the advent of social networks new sources of information have been made available which can potentially render RS more resistant to attacks. In this paper we explore the information provided in the form of social links with clustering for diminishing the impact of attacks. We propose two algorithms, CLUTR and WCLUTR, to combine clustering with "trust" among users. We demonstrate that CLuTR and WCLUTR enhance the robustness of RS by experimentally evaluating them on data from a public consumer recommender system Epinions.com. 展开更多
关键词 shilling attack recommender system collaborative filtering social trust CLUSTERING
原文传递
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation 被引量:1
3
作者 Lingtao Qi Haiping Huang +2 位作者 Feng Li Reza Malekian Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第10期112-132,共21页
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGenl) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGenl, a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD,SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM. 展开更多
关键词 shilling attack detection model collaborative filtering recommender systems gravitation-based detection model particle filter algorithm
下载PDF
Generating A New Shilling Attack for Recommendation Systems
4
作者 Pradeep Kumar Singh Pijush Kanti Dutta Pramanik +3 位作者 Madhumita Sardar Anand Nayyar Mehedi Masud Prasenjit Choudhury 《Computers, Materials & Continua》 SCIE EI 2022年第5期2827-2846,共20页
A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing.To keep the recommendation systems reliable,authentic,and superior,the security of these systems is very cr... A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing.To keep the recommendation systems reliable,authentic,and superior,the security of these systems is very crucial.Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks,in this paper,we prove that they fail to detect a new or unknown attack.We develop a new attack model,named Obscure attack,with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended.The Obscure attack is able to push target items to the top-N list as well as remove the actual rated items from the list.Our proposed attack is more effective at a smaller number of k in top-k similar user as compared to other existing attacks.The effectivity of the proposed attack model is tested on the MovieLens dataset,where various classifiers like SVM,J48,random forest,and naïve Bayes are utilized. 展开更多
关键词 shilling attack recommendation system collaborative filtering top-N recommendation BIASING SHUFFLING hit ratio
下载PDF
A COMPARATIVE STUDY ON SHILLING DETECTION METHODS FOR TRUSTWORTHY RECOMMENDATIONS 被引量:3
5
作者 Youquan Wang Liqiang Qian +1 位作者 Fanzhang Li Lu Zhang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2018年第4期458-478,共21页
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far,... Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far, and they exhibit complementary advantage and disadvantage towards various types of attackers. In this paper, we provide a thorough experimental comparison of several well-known detectors, including supervised C4.5 and NB, unsupervised PCA and MDS, semi-supervised HySAD methods, as well as statistical analysis methods. MovieLens 100K is the most widely-used dataset in the realm of shilling attack detection, and thus it is selected as the benchmark dataset. Meanwhile, seven types of shilling attacks generated by average-filling and random-filling model are compared in our experiments. As a result of our analysis, we show clearly causes and essential characteristics insider attackers that might determine the success or failure of different kinds of detectors. 展开更多
关键词 Recommender system shilling attack detection supervised classification unsupervisedclustering statistical analysis methods
原文传递
Robust Recommendation Algorithm Based on Kernel Principal Component Analysis and Fuzzy C-means Clustering 被引量:2
6
作者 YI Huawei NIU Zaiseng +2 位作者 ZHANG Fuzhi LI Xiaohui WANG Yajun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期111-119,共9页
The existing recommendation algorithms have lower robustness in facing of shilling attacks. Considering this problem, we present a robust recommendation algorithm based on kernel principal component analysis and fuzzy... The existing recommendation algorithms have lower robustness in facing of shilling attacks. Considering this problem, we present a robust recommendation algorithm based on kernel principal component analysis and fuzzy c-means clustering. Firstly, we use kernel principal component analysis method to reduce the dimensionality of the original rating matrix, which can extract the effective features of users and items. Then, according to the dimension-reduced rating matrix and the high correlation characteristic between attack profiles, we use fuzzy c-means clustering method to cluster user profiles, which can realize the effective separation of genuine profiles and attack profiles. Finally, we construct an indicator function based on the attack detection results to decrease the influence of attack profiles on the recommendation, and incorporate it into the matrix factorization technology to design the corresponding robust recommendation algorithm. Experiment results indicate that the proposed algorithm is superior to the existing methods in both recommendation accuracy and robustness. 展开更多
关键词 robust recommendation shilling attacks matrixfactorization kernel principal component analysis fuzzy c-meansclustering
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部