2018
DOI: 10.1093/comjnl/bxy008
|View full text |Cite
|
Sign up to set email alerts
|

A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…A number of detection techniques exist that reveal unusual or malicious patterns of profile creation and rating data, indicating an attack (Burke et al, 2006). Classical classification techniques (Hurley et al, 2009) such as Bayesian classifier (Wu et al, 2012), peer comparison (OMahony et al, 2005Chirita et al, 2005), but also neural networks are used for detecting deep level features that indicate shilling attacks (Tong et al, 2018). However, the success of classifying the suspicion is dependent on what is defined as malicious in the attack model used to build the classification.…”
Section: Evaluation and Optimizationmentioning
confidence: 99%
“…A number of detection techniques exist that reveal unusual or malicious patterns of profile creation and rating data, indicating an attack (Burke et al, 2006). Classical classification techniques (Hurley et al, 2009) such as Bayesian classifier (Wu et al, 2012), peer comparison (OMahony et al, 2005Chirita et al, 2005), but also neural networks are used for detecting deep level features that indicate shilling attacks (Tong et al, 2018). However, the success of classifying the suspicion is dependent on what is defined as malicious in the attack model used to build the classification.…”
Section: Evaluation and Optimizationmentioning
confidence: 99%
“…For user-item popularity matrix, we first define the novelty of item and then convert the rating records to user-item popularity matrix by replacing rating value with novelty of item. Moreover, since the sequence of items affects the detection results in deep learning methods [22], the items are sorted by novelty of item in order to cluster the similar items and facilitate the learning of SDAEs.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…(6) CNN-SAD: A method based on deep-level features, which are extracted from users rating profiles by convolutional neural network [22]. According to the cross validation, the vector is reshaped into rectangles with the short side length 20.…”
Section: Experiments On the Movielens 1m Datasetmentioning
confidence: 99%
“…Supervised learning methods allow to detect known attacks, but they are not suitable for combined attacks [7]. To increase the efficiency of detecting attacks of various types, a convolutional neural network with deep learning is proposed in [8]. However, learning such a network requires significant computational costs, which makes it difficult to use it when dynamically changing user interests.…”
Section: Introductionmentioning
confidence: 99%