a b s t r a c tDue to the open nature of recommender systems, collaborative recommender systems are vulnerable to profile injection attacks, in which malicious users inject attack profiles into the rating matrix in order to bias the systems' ranking list. Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Most of previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles of an attack. There also exist class unbalance problems in supervised detecting methods, the detecting performance is not as good when the amount of samples of attack profiles in training set is smaller. In this paper, we study the use of SVM based method and group characteristics in attack profiles. A two phase detecting method SVM-TIA is proposed based on these two methods. In the first phase, Borderline-SMOTE method is used to alleviate the class unbalance problem in classification; a rough detecting result is obtained in this phase; the second phase is a fine-tuning phase whereby the target items in the potential attack profiles set are analyzed. We conduct tests on the MovieLens 100 K Dataset and compare the performance of SVM-TIA with other shilling detecting methods to demonstrate the effectiveness of the proposed approach.
WLAN-based indoor positioning algorithm has the characteristics of simple layout and low price, and it has gradually become a hotspot in both academia and industry. However, due to the poor stability of Wi-Fi signals, received signal strength (RSS) fingerprints of some adjacent reference positions are difficult to evaluate similarity when utilizing traditional distance-based calculation methods. By clustering these RSS fingerprints into one region, the commonly utilized KNN algorithm in the past cannot achieve accurate positioning in the region. For this, we introduce a concept of the insensitive region of the RSS fingerprint and a new algorithm named DBSCAN-KRF. This algorithm can delete noise sample and detect insensitive region, then, different methods are selected to achieve indoor positioning by judging the region of the estimated fingerprint sample, the KNN algorithm is selected when the region is sensitive, and random forest algorithm is selected when the region is insensitive. The experimental results show that the DBSCAN-KRF algorithm is superior while compared with other alternative indoor positioning algorithms. INDEX TERMS WLAN indoor position, control and optimization, machine learning, DBSCAN-KRF algorithm, fingerprint data.
Health is vital to every human being. To further improve its already respectable medical technology, the medical community is transitioning towards a proactive approach which anticipates and mitigates risks before getting ill. This approach requires measuring the physiological signals of human and analyzes these data at regular intervals. In this paper, we present a novel approach to apply deep learning in physiological signals analysis that allows doctor to identify latent risks. However, extracting high level information from physiological time-series data is a hard problem faced by the machine learning communities. Therefore, in this approach, we apply model based on convolutional neural network that can automatically learn features from raw physiological signals in an unsupervised manner and then based on the learned features use multivariate Gauss distribution anomaly detection method to detect anomaly data. Our experiment is shown to have a significant performance in physiological signals anomaly detection. So it is a promising tool for doctor to identify early signs of illness even if the criteria are unknown a priori.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.