2012
DOI: 10.1007/978-3-642-35527-1_56
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Tricksy Group Shilling Attack Model against Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…However, the shilling group generated by the group shilling attack model in Ref. [7] shows low similarity between group members, which causes DeR-TIA to fail. When detecting loosely coupled shilling groups on the Netflix dataset, the precision, recall, and F1-measure of CBS are 0.4221, 0.3758, and 0.3976, respectively.…”
Section: Comparison Of Detection Results On the Netflix Datasetmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the shilling group generated by the group shilling attack model in Ref. [7] shows low similarity between group members, which causes DeR-TIA to fail. When detecting loosely coupled shilling groups on the Netflix dataset, the precision, recall, and F1-measure of CBS are 0.4221, 0.3758, and 0.3976, respectively.…”
Section: Comparison Of Detection Results On the Netflix Datasetmentioning
confidence: 99%
“…To generate the effective group shilling profiles and avoid the detection of the existing methods, Wang et al [7] proposed a tricky group shilling attack model which includes a strict version denoted as GSAGen s and a loose version denoted as GSAGen l . In their model, some shilling profiles generated by standard attack models, i.e., random attacks or average attacks, are used as the input.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditional attack models are based on statistics methods, such as random (Ran) attack model, average (Avg) attack model, average over popular (AoP) items attack model, and power item attack (PIA) model. Deep learning-based attack models use deep learning methods to construct shilling profiles by simulating rating profiles of genuine users, such as Graph cOnvolution based generative shilling ATtack (GOAT) model [5].…”
Section: Background and Related Workmentioning
confidence: 99%