2011
DOI: 10.3724/sp.j.1004.2011.00160
|View full text |Cite
|
Sign up to set email alerts
|

An Unsupervised Algorithm for Detecting Shilling Attacks on Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…In general, the shilling profiles should be injected with diverse attack sizes and filler sizes to simulate various attack situations. However, the attack size should not be too large (usually below 20%), otherwise the shilling profiles would be easily detected and the attack cost would be raised [12, 38]. Similarly, to evade the detection, the filler size of shilling profiles should be same or similar to the filler sizes of genuine profiles [7, 8].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…In general, the shilling profiles should be injected with diverse attack sizes and filler sizes to simulate various attack situations. However, the attack size should not be too large (usually below 20%), otherwise the shilling profiles would be easily detected and the attack cost would be raised [12, 38]. Similarly, to evade the detection, the filler size of shilling profiles should be same or similar to the filler sizes of genuine profiles [7, 8].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Then, they proposed a PCA-Var Select detection that can effectively detect multiple attack types. Li Cong et al [17] constructed a corresponding object function for genetic optimization through qualifying the group effect of attack profiles and combined it with Bayesian inference in the process of genetic optimization, which is an new unsupervised algorithm for detecting shilling attack -IBIGDA. To some extent, IBIGDA reduces the dependence on prior knowledge, but it still assumes that the number of attack profiles is less than genuine profiles and obtain higher precision with sacrificing recall.…”
Section: Introductionmentioning
confidence: 99%