2013
DOI: 10.1007/s10791-013-9224-5
|View full text |Cite
|
Sign up to set email alerts
|

Defending recommender systems by influence analysis

Abstract: Collaborative filtering (CF) is a popular method for personalizing product recommendations for e-commerce applications. In order to recommend a product to a user and predict that user's preference, CF utilizes product evaluation ratings of like-minded users. The process of finding like-minded users forms a social network among all users and each link between two users represents an implicit connection between them. Users having more connections with others are the most influential users. Attacking recommender … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 35 publications
0
18
0
Order By: Relevance
“…The crucial point of the algorithm is HHT-based feature extraction method. To improve the success of attack detection, Morid et al [40] applied a k-NN supervised classification method on influential users, instead of the whole user set. Zhang and Zhou [41] propose an ensemble detection model (EDM) by introducing backpropagation neural network and ensemble learning technique to detect profile injection attacks through selecting and integrating parts of the base classifiers using voting strategy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The crucial point of the algorithm is HHT-based feature extraction method. To improve the success of attack detection, Morid et al [40] applied a k-NN supervised classification method on influential users, instead of the whole user set. Zhang and Zhou [41] propose an ensemble detection model (EDM) by introducing backpropagation neural network and ensemble learning technique to detect profile injection attacks through selecting and integrating parts of the base classifiers using voting strategy.…”
Section: Related Workmentioning
confidence: 99%
“…During the experiments, filler size parameter, I F , is varied from 3 to 60%, whereas attack size parameter, the number of inserted fake profiles, is kept constant at 1% since it is unreasonable to insert more in real-world cases [40]. Also, the attacked movies, i t , in the training set is chosen at random among the ones which have 80 to 100 ratings.…”
Section: A Data Set and Evaluation Criteriamentioning
confidence: 99%
“…However, in the test sets, since the filler sizes of more than 95% genuine profiles are below 10%, the filler sizes are set to {2%, 4%, 6%, 8%, 10%}. In fact, if the filler size of shilling profiles is more than that of genuine profiles, the attacks can be easily detected by the features based on filler size, such as length variance (LengthVar) [5,6] and filler mean variance (FMV) [46]. Therefore, we set the maximum filler size in the test sets to 10%.…”
Section: Generalization Ability Of Mv-edmmentioning
confidence: 99%
“…Su et al [9] presented a spreading similarity algorithm to detect groups of similar attackers. Then, developed different features extracted from user profiles to capture attackers by exploiting classification-based methods [2,4,12,13,14,15]. One of their attributes is Degree of Similarity with Top Neighbors (DegSin) which calculates the similarity between users by using Pearson Correlation Coefficient.…”
Section: Related Workmentioning
confidence: 99%