Collaborative Shilling Detection Bridging Factorization and User Embedding

被引:14
作者
Dou, Tong [1 ,2 ]
Yu, Junliang [1 ,2 ]
Xiong, Qingyu [1 ,2 ]
Gao, Min [1 ,2 ]
Song, Yuqi [1 ,2 ]
Fang, Qianqi [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
来源
COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017 | 2018年 / 252卷
关键词
Collaborative filtering; Shilling attack; User embedding; Matrix factorization; ATTACK DETECTION; RECOMMENDER;
D O I
10.1007/978-3-030-00916-8_43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The recommender system based on collaborative filtering is vulnerable to shilling attacks due to its open nature. With the wide employment of recommender systems, an increasing number of attackers are disordering the system in order to benefit from the manipulated recommendation results. Therefore, how to effectively detect shilling attacks now becomes more and more crucial. Most existing detection models recognize attackers in statistics-based manners. However, they failed in capturing the fine-grained interactions between users and items, leading to a degradation in detection accuracy. In this paper, inspired by the success of word embedding models, we propose a collaborative shilling detection model, CoDetector, which jointly decomposes the user-item interaction matrix and the user-user co-occurrence matrix with shared user latent factors. Then, the learned user latent factors containing network embedding information are used as features to detect attackers. Experiments conducted on simulated and real-world datasets show that CoDetector has a good performance and generalization capacity and outperforms state-of-the-art methods.
引用
收藏
页码:459 / 469
页数:11
相关论文
共 20 条
[1]  
Burke R, 2005, 5 IEEE INT C DAT MIN
[2]  
Burke R. D., 2006, P 12 ACM SIGKDD INT, V542, P542, DOI DOI 10.1145/1150402.1150465
[3]   Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system [J].
Cao, Jie ;
Wu, Zhiang ;
Mao, Bo ;
Zhang, Yanchun .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (5-6) :729-748
[4]  
Chirita P., 2005, P 7 ANN ACM INT WORK, DOI 10.1145/1097047.1097061
[5]  
Jiang M, 2016, IEEE INTELL SYST, V31, P31, DOI 10.1109/MIS.2016.5
[6]   MATRIX FACTORIZATION TECHNIQUES FOR RECOMMENDER SYSTEMS [J].
Koren, Yehuda ;
Bell, Robert ;
Volinsky, Chris .
COMPUTER, 2009, 42 (08) :30-37
[7]  
Lam S. K., 2004, Proceedings of the 13th international conference on World Wide Web, P393, DOI [DOI 10.1145/988672.988726, 10.1145/988672.988726]
[8]  
Levy O, 2014, ADV NEUR IN, V27
[9]   Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis [J].
Li, Wentao ;
Gao, Min ;
Li, Hua ;
Zeng, Jun ;
Xiong, Qingyu ;
Hirokawa, Sachio .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (10) :2600-2611
[10]  
Li Xiao Li, 2009, P 2009 SIAM INT C DA