期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A COMPARATIVE STUDY ON SHILLING DETECTION METHODS FOR TRUSTWORTHY RECOMMENDATIONS 被引量:3
1
作者 Youquan Wang Liqiang Qian +1 位作者 Fanzhang Li Lu Zhang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2018年第4期458-478,共21页
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far,... Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far, and they exhibit complementary advantage and disadvantage towards various types of attackers. In this paper, we provide a thorough experimental comparison of several well-known detectors, including supervised C4.5 and NB, unsupervised PCA and MDS, semi-supervised HySAD methods, as well as statistical analysis methods. MovieLens 100K is the most widely-used dataset in the realm of shilling attack detection, and thus it is selected as the benchmark dataset. Meanwhile, seven types of shilling attacks generated by average-filling and random-filling model are compared in our experiments. As a result of our analysis, we show clearly causes and essential characteristics insider attackers that might determine the success or failure of different kinds of detectors. 展开更多
关键词 Recommender system shilling attack detection supervised classification unsupervisedclustering statistical analysis methods
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部