2016
DOI: 10.1587/transinf.2015edp7500
|View full text |Cite
|
Sign up to set email alerts
|

Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis

Abstract: SUMMARYCollaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 29 publications
1
18
0
Order By: Relevance
“…As shown in Figure 2, most ratings of genuine profiles are concentrated on the left side of horizontal axis. This indicates that the genuine users are likely to rate the popular items, which is consistent with the observation in [28]. By contrast, the ratings of shilling profiles are uniformly distributed along the horizontal axis.…”
Section: Definitionssupporting
confidence: 81%
See 4 more Smart Citations
“…As shown in Figure 2, most ratings of genuine profiles are concentrated on the left side of horizontal axis. This indicates that the genuine users are likely to rate the popular items, which is consistent with the observation in [28]. By contrast, the ratings of shilling profiles are uniformly distributed along the horizontal axis.…”
Section: Definitionssupporting
confidence: 81%
“…And then the user features were used by SVM for detection. Li et al [27,28] extracted the user features according to the item popularity distributions. Unfortunately, in these methods, the item popularity is simply computed and observed as a static value, which can be easily influenced by noise and manipulated by attacks.…”
Section: Randomly Chosenmentioning
confidence: 99%
See 3 more Smart Citations