Proceedings of the 13th International Conference on World Wide Web 2004
DOI: 10.1145/988672.988726
|View full text |Cite
|
Sign up to set email alerts
|

Shilling recommender systems for fun and profit

Abstract: Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have become particularly common is in e-commerce, where recommendation of items can often help a customer find what she is interested in and, therefore can help drive sales. Unscrupulous producers in the never-ending quest for market penetration may find it profitable to shill recommender systems by lying to the systems in order to have their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

9
320
0
7

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 466 publications
(348 citation statements)
references
References 20 publications
9
320
0
7
Order By: Relevance
“…In 2004, shilling attacks were noticed by researchers who studied the effect of attack models against recommender systems [7]. Since then, numerous efforts have been made to develop methods to detect shilling attacks.…”
Section: Shilling Attack Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2004, shilling attacks were noticed by researchers who studied the effect of attack models against recommender systems [7]. Since then, numerous efforts have been made to develop methods to detect shilling attacks.…”
Section: Shilling Attack Detection Methodsmentioning
confidence: 99%
“…Unlike normal users, attackers aim at promoting or suppressing the target items [7], [13]. Thus, the selecting patterns of attackers differ from those of normal users.…”
Section: Popularity Analysis Of User Profilesmentioning
confidence: 99%
“…And in fact, gaming standard CF techniques is very easy. While this important aspect has been neglected until recently, recently some recent studies have started to look at attacks of Recommender Systems [17,20]. The simplest attack is the copy-profile attack: the attacker can copy the ratings of target users and fool the system into thinking that the attacker is in fact the most similar user to the target user.…”
Section: Motivationsmentioning
confidence: 99%
“…For example, against shilling attacks [20] in which a user pretends to be similar to the user target of the attack. Trust-aware Recommender Systems can be used to consider only ratings provided by users predicted as trustworthy by the trust metric.…”
Section: How Trust Alleviates Rs Weaknessesmentioning
confidence: 99%
“…In most scenarios, the ratings given by people are subjective and unverifiable; therefore the question Are the raters honest? is an important and challenging problem in this field, as discussed in [3,7,10,11].…”
Section: Introductionmentioning
confidence: 99%