2015
DOI: 10.1109/jcn.2015.000028
|View full text |Cite
|
Sign up to set email alerts
|

Toward trustworthy social network services: A robust design of recommender systems

Abstract: In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…In [12], a trust model is derived by considering Dempster-Shafer theory and Bayes' theorem based on the spam content in Twitter. Social botnet attacks exist in OSNs to manipulate user's (or item's) popularity [15], thereby spreading spam content [29] and creating multiple fake identities [24]. The above existing works rely on the profile-based, network-based, content-based, and click-based features to detect malicious social bots.…”
Section: Detection Of Social Botsmentioning
confidence: 99%
“…In [12], a trust model is derived by considering Dempster-Shafer theory and Bayes' theorem based on the spam content in Twitter. Social botnet attacks exist in OSNs to manipulate user's (or item's) popularity [15], thereby spreading spam content [29] and creating multiple fake identities [24]. The above existing works rely on the profile-based, network-based, content-based, and click-based features to detect malicious social bots.…”
Section: Detection Of Social Botsmentioning
confidence: 99%
“…6 Since then, the classification of penetration attacks using false contours has been proposed. 2 The work of Gao et al 4 proposed five attack models: sampling attack, random attack, average attack, power flow attack, and staged attack. These five models represent the items sybil wants to work on as a target project.…”
Section: Robust Recommender System (Robust Rs)mentioning
confidence: 99%
“…Malicious users heavily penetrate RSs and use these counterfeit profiles to attack sybil RS first as in the work of Seminario and Wilson . Since then, the classification of penetration attacks using false contours has been proposed . The work of Gao et al proposed five attack models: sampling attack, random attack, average attack, power flow attack, and staged attack.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The providers of these services have enabled countless features that allow users to interact among themselves by creating and sharing different contents (e.g, videos, text, and images). However, by allowing this, the nodes composing the social networks, users and machines, generate a huge amount of data, which can be uncontrolled, unsecured and untrusted [5], [6]. Such amount of generated data are causing a congestion to the networks [7], [8] and posing a new security challenge to the service providers: it becomes hard to handle and analyze all content traversing their networks.…”
Section: Introductionmentioning
confidence: 99%