Data have become valuable assets for enterprises.Data governance aims to manage and reuse data assets,facilitating enterprise management and enabling product innovations.A data lineage graph(DLG)is an abstracted colle...Data have become valuable assets for enterprises.Data governance aims to manage and reuse data assets,facilitating enterprise management and enabling product innovations.A data lineage graph(DLG)is an abstracted collection of data assets and their data lineages in data governance.Analyzing DLGs can provide rich data insights for data governance.However,the progress of data governance technologies is hindered by the shortage of available open datasets for DLGs.This paper introduces an open dataset of DLGs,including the DLG model,the dataset construction process,and applied areas.This real-world dataset is sourced from Huawei Cloud Computing Technology Company Limited,which contains 18 DLGs with three types of data assets and two types of relations.To the best of our knowledge,this dataset is the first open dataset of DLGs for data governance.This dataset can also support the development of other application areas,such as graph analytics and visualization.展开更多
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional col...Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.展开更多
基金the National Natural Science Foundation of China(No.62272480 and 62072470)。
文摘Data have become valuable assets for enterprises.Data governance aims to manage and reuse data assets,facilitating enterprise management and enabling product innovations.A data lineage graph(DLG)is an abstracted collection of data assets and their data lineages in data governance.Analyzing DLGs can provide rich data insights for data governance.However,the progress of data governance technologies is hindered by the shortage of available open datasets for DLGs.This paper introduces an open dataset of DLGs,including the DLG model,the dataset construction process,and applied areas.This real-world dataset is sourced from Huawei Cloud Computing Technology Company Limited,which contains 18 DLGs with three types of data assets and two types of relations.To the best of our knowledge,this dataset is the first open dataset of DLGs for data governance.This dataset can also support the development of other application areas,such as graph analytics and visualization.
基金Supported by the Foundation of Jiangxi Provincial Department of Education under Grant No.GJJ.10696
文摘Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.