2021
DOI: 10.1109/tifs.2021.3076295
|View full text |Cite
|
Sign up to set email alerts
|

Sequential Attack Detection in Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…Specifically, unsupervised learning algorithms are widely used as they are highly accurate and fast by exploiting the nature of shilling profiles, and can be easily plugged into the CF framework [17]. For example, clustering-based techniques classify the abnormal ratings and normal ones [4], [5], and probability or inference-based techniques detect abnormal ratings with probability distribution [6], [7]. The work in [18] compares the clustering-based methods and probability-based methods.…”
Section: A Anomaly Detection In Recommender Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, unsupervised learning algorithms are widely used as they are highly accurate and fast by exploiting the nature of shilling profiles, and can be easily plugged into the CF framework [17]. For example, clustering-based techniques classify the abnormal ratings and normal ones [4], [5], and probability or inference-based techniques detect abnormal ratings with probability distribution [6], [7]. The work in [18] compares the clustering-based methods and probability-based methods.…”
Section: A Anomaly Detection In Recommender Systemsmentioning
confidence: 99%
“…To maintain the fairness and sustainability of recommender systems, previous research primarily concentrated on discovering the unusual rating patterns caused by shilling attacks. Most anomaly detection studies in CF-based recommender systems are for detecting malicious noise in the rating data, and all rating data without shilling attacks are considered normal data [4]- [7]. However, it should be noted that anomalies can exist unintentionally from a real user due to the user's psychological factors, which is called natural noise [2].…”
Section: Introductionmentioning
confidence: 99%
“…The last term of the estimation error covariance P(k), as in (30), is the only term of ( 29) that depends on the attack; thus, maximizing the trace of the estimation error covariance is equivalent to maximizing the trace of its last term [50]. The last term of P(k) in ( 29) also depends on the selection matrix S(k) and given the attack covariance Σ, we can show that…”
Section: Coordinated Byzantine Attack Designmentioning
confidence: 99%
“…It is also vital to analyze how countermeasures taken by agents can reduce the impact of the attack. One approach is to detect adversaries and then implement corrective measures [28]- [30]. In [31], for example, attack detection is achieved through trusted agents that raise a flag when an adversary is detected.…”
Section: Introductionmentioning
confidence: 99%
“…Malicious software may be transmitted if the attacker is aware of an application vulnerability, such as a SQL injection or false data injection, according to [20] coding that results. [21] created a three-layer IDS for smart homes using a classification algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%