2020
DOI: 10.1007/978-3-030-44038-1_39
|View full text |Cite
|
Sign up to set email alerts
|

Shilling Attacks Detection in Collaborative Recommender System: Challenges and Promise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Various methods have been used for this purpose, such as statistical methods [29], graph mining [26], clustering [30], classification [31] and deep learning [32][33] [24]. One general categorization of these methods is based on memory or model-based [34].…”
Section: Attack Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Various methods have been used for this purpose, such as statistical methods [29], graph mining [26], clustering [30], classification [31] and deep learning [32][33] [24]. One general categorization of these methods is based on memory or model-based [34].…”
Section: Attack Detection Methodsmentioning
confidence: 99%
“…Because it follows from a comparison between the target user and other users based solely on the accumulation of ratings, a user with few ratings becomes difficult to categorize [5]. Generally, CF techniques are divided into two types, model-based filtering or memory-based filtering techniques [11]. Model-based techniques include clustering techniques, association techniques, Bayesian networks and neural networks.…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…However, the generated top-N lists by the predicted rating may be vulnerable in the presence of shilling attackers. A shilling attack involves inserting fake user profiles into a database to change the recommended top-N list of items [7]. The general objective of the attacker is to bias the overall top-N list as well as the top-N recommendation of a user.…”
Section: Introductionmentioning
confidence: 99%
“…In [30] and [22], the discussions do not consider the different detection attributes used in supervised and unsupervised detection methods. Both [24] and [25] briefly discuss the various attack and detection methods. There is no discussion on robust algorithms, and the detection methods are not categorized.…”
Section: Introductionmentioning
confidence: 99%