Defending shilling attacks in recommender systems using soft co-clustering

被引:16
作者
Yang, Li [1 ]
Huang, Wei [2 ]
Niu, Xinxin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] Commun Univ China, Informat Secur, Beijing, Peoples R China
关键词
recommender systems; pattern clustering; security of data; shilling attacks; soft co-clustering algorithm; user propensity similarity method; CCPS; co-clustering with propensity similarity model;
D O I
10.1049/iet-ifs.2016.0345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Shilling attacks have been a significant vulnerability to collaborative filtering based recommender systems recently. There are various studies focusing on detecting shilling attack users and developing robust recommendation algorithms against shilling attacks. Although many studies have been devoted in this area, few of them use soft co-clustering and consider both labelled and unlabelled user profiles. In this work, the authors explore the benefits of combining soft co-clustering algorithm with user propensity similarity method and present a soft co-clustering with propensity similarity model or CCPS for short, to detect shilling attacks. Then they perform experiments using MovieLens dataset and Jester dataset to analyse it with respect to shilling attack detection to demonstrate the effectiveness of CCPS model in detecting traditional and hybrid shilling attacks and enhance the robustness of recommender systems.
引用
收藏
页码:319 / 325
页数:7
相关论文
共 26 条
[1]  
Agarwal D, 2007, KDD-2007 PROCEEDINGS OF THE THIRTEENTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P26
[2]  
[Anonymous], 2003, Proceedings of CHI 2003: Human Factorsin Computing Systems
[3]  
Banerjee A, 2005, J MACH LEARN RES, V6, P1705
[4]   Latent Dirichlet conditional naive-Bayes models [J].
Banerjee, Arindam ;
Shan, Hanhuai .
ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, :421-426
[5]  
Bhaumik Runa, 2006, 4 WORKSH INT TECHN W
[6]   Latent Dirichlet allocation [J].
Blei, DM ;
Ng, AY ;
Jordan, MI .
JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) :993-1022
[7]  
Breese J. S., 1998, Uncertainty in Artificial Intelligence. Proceedings of the Fourteenth Conference (1998), P43
[8]   Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis [J].
Chakraborty, Parthasarathi ;
Karforma, Sunil .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :963-969
[9]   Collaborative filtering using orthogonal nonnegative matrix tri-factorization [J].
Chen, Gang ;
Wang, Fei ;
Zhang, Changshui .
INFORMATION PROCESSING & MANAGEMENT, 2009, 45 (03) :368-379
[10]  
Chirita Paul-Alexandru, 2005, P 7 ANN ACM INT WORK, P67