2018
DOI: 10.1002/cpe.4660
|View full text |Cite
|
Sign up to set email alerts
|

A robust recommended system based on attack detection

Abstract: In the increasingly fierce competition in e-commerce sites, the recommendation system has brought great benefits to the site, but some unscrupulous businesses use the recommended system algorithm loopholes, the use of bulk injection of some fake users, and the ratings of these users with the normal user's rating. Therefore, when calculating user similarity, it is easy to enter the user ′ s neighborhood circle, because the false user takes a high score ("push attack") or a low score ("null attack") on the targe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
(26 reference statements)
0
4
0
Order By: Relevance
“…To solve this problem effectively, the recommendation system was born and has been widely used in practise [1,2]. Compared with traditional information search tools, this system can provide users with relevant and interesting information based on historical browsing data, which not only effectively improves the efficiency of information search but also presents the content that users are interested in, thus making many e-commerce enterprises profit [3]. Due to the strong participation of the recommendation system, the attacker will inject a large number of false user profiles into the system and never produce more favourable recommendation results.…”
Section: Introductionmentioning
confidence: 99%
“…To solve this problem effectively, the recommendation system was born and has been widely used in practise [1,2]. Compared with traditional information search tools, this system can provide users with relevant and interesting information based on historical browsing data, which not only effectively improves the efficiency of information search but also presents the content that users are interested in, thus making many e-commerce enterprises profit [3]. Due to the strong participation of the recommendation system, the attacker will inject a large number of false user profiles into the system and never produce more favourable recommendation results.…”
Section: Introductionmentioning
confidence: 99%
“…Another group of models for fraudulent profiles detection exploits diverse collection of statistical metrics for filtering the anomalies. Existing works propose such statistics as (1) deviation from the median value in a suggested recommendation set of products [14], (2) rating items with extreme rating and sentiment values [27] and (3) ratings falling within the tight time windows [28]. Nonetheless, the proposed statistics are easy to circumvent and the more advanced detection metrics should be applied.…”
Section: Related Workmentioning
confidence: 99%
“…The current study focuses on solving the task of filtering out the deceptive opinions and detecting anomalous behavior on a platform with text reviews. The emphasis on text reviews can be explained by the fact that texts are a more informative and a more reliable source of product's and seller's quality, than a star-rating system, which is easy to manipulate (see [19], [14], [27], [28]). The deceptive opinions can be generated in two ways: (1) by hiring the professional human writers to review the product for monetary gains, and (2) by exploitation of state-of-the-art (SOTA, here and after) automated language models to imitate the human speech, and this distinction is crucial, since the existing algorithms do not address this difference and focus merely on filtering out the artificial text reviews [22] and do not account for the problem of hiring the professional writers.…”
Section: Introductionmentioning
confidence: 99%
“…To defend against attacks, the ESSKM periodically changes K S . However, if one node is compromised, the attacker can use it as a zombie node to attack the system . Besides, several messages are transmitted to produce one K S , consuming some amount of energy among nodes.…”
Section: Related Workmentioning
confidence: 99%