2021
DOI: 10.3233/ida-194935
|View full text |Cite
|
Sign up to set email alerts
|

Using the beta distribution technique to detect attacked items from collaborative filtering

Abstract: A recommendation system is based on the user and the items, providing appropriate items to the user and effectively helping the user to find items that may be of interest. The most commonly used recommendation method is collaborative filtering. However, in this case, the recommendation system will be injected with false data to create false ratings to push or nuke specific items. This will affect the user’s trust in the recommendation system. After all, it is important that the recommendation system provides a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Hsu et al solved the problem of data sparsity by principal component analysis. However, this kind of algorithm using matrix dimension reduction not only takes time but also loses some effective scoring information [ 14 ]. Paleti et al put forward a trust calculation algorithm based on project level, topic level, and user outline level, but the calculation of trust is limited by the number of users' scores, so this method needs further improvement [ 15 ].…”
Section: Related Workmentioning
confidence: 99%
“…Hsu et al solved the problem of data sparsity by principal component analysis. However, this kind of algorithm using matrix dimension reduction not only takes time but also loses some effective scoring information [ 14 ]. Paleti et al put forward a trust calculation algorithm based on project level, topic level, and user outline level, but the calculation of trust is limited by the number of users' scores, so this method needs further improvement [ 15 ].…”
Section: Related Workmentioning
confidence: 99%
“…Strategy II is used to synthesize the group matrix before decomposing the user scoring matrix. Strategy III adds weight to user characteristics before user scoring and finally decomposes the group score [ 9 ]. Song and others proposed a matrix decomposition model to add group information features.…”
Section: Related Workmentioning
confidence: 99%
“…The curriculum implementation evaluation is the process of implementing the scheduled plan, and the measurement standard is the degree of achievement of teaching objectives. From the political point of view, the curriculum implementation evaluation is regarded as the interest competition between groups, and different competitive relationships maintain different attitudes towards the curriculum implementation evaluation [2,6,20]. From the culture perspective, curriculum implementation evaluation is regarded as cultural regeneration, and curriculum implementation evaluation is the process of promoting teachers to think over teaching arrangements.…”
Section: Qualitative Evaluation Of Course Implementation Based On Col...mentioning
confidence: 99%