2019
DOI: 10.1007/s12652-019-01321-2
|View full text |Cite
|
Sign up to set email alerts
|

Shilling attack detection in binary data: a classification approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 35 publications
0
13
0
Order By: Relevance
“…There are several limitations and overheads associated with traditional distributed systems. For example, there is no high level parallel programming language, and there is a strong reliance on the network for the management of distributed systems [27]. When working with a large number of computational nodes in a cluster or grid, there is always the possibility of node failures, which might result in the need to reexecute tasks many times.…”
Section: Multivariate Empirical Mode Decomposition-based Gradient Sup...mentioning
confidence: 99%
See 1 more Smart Citation
“…There are several limitations and overheads associated with traditional distributed systems. For example, there is no high level parallel programming language, and there is a strong reliance on the network for the management of distributed systems [27]. When working with a large number of computational nodes in a cluster or grid, there is always the possibility of node failures, which might result in the need to reexecute tasks many times.…”
Section: Multivariate Empirical Mode Decomposition-based Gradient Sup...mentioning
confidence: 99%
“…The base SVEC carry out the classification process through detecting the split with the maximal information gain. Batmaz et al [27] designed classification approach to find the shilling attack in the collaborative recommender system, but the precision of attack detection was not at required level.…”
Section: Gradient Support Vector Entropy Boosting Classifiermentioning
confidence: 99%
“…In the unsupervised detection methods, the user behaviour features are extracted and the clustering algorithms are used to group attackers together [15][16][17][18][19][20][21]. ere are also detection methods that model the dataset as a graph and use the graph mining methods to identify attackers [22][23][24][25].…”
Section: Related Workmentioning
confidence: 99%
“…A support vector machine (SVM) classifier is trained in [31] using suspicious users/items and used additional trust measurement features to discriminate attack profiles. The authors in [33] used K-nearest neighbor (KNN) and SVM. Research work in [7] created separate clusters for items and user profiles to analyze items and discriminate attack users.…”
Section: Related Work and Backgroundmentioning
confidence: 99%