Skip to main content
Top

2016 | OriginalPaper | Chapter

Robust Social Recommendation Techniques: A Review

Authors : Feng Jiang, Min Gao, Qingyu Xiong, Junhao Wen, Yi Zhang

Published in: Socially Aware Organisations and Technologies. Impact and Challenges

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Social recommendation plays an important role in solving the cold start problem in recommendation systems and improves the accuracy of recommendation, but still faces serious challenges and problems. Ratings or relationships injected by fake users seriously affect the authenticity of the recommendations as well as users’ trustiness on the recommendation systems. Moreover, the simplification of relationship treatment also seriously affects the recommendation accuracy and user satisfaction to the recommendation systems. This paper first analyzes up to date research of social recommendation and the detecting technology of multiple relationships. Furthermore, it proposes a future research framework for robust social recommendations including modeling and feature extraction of multidimensional relationships, social recommendation shilling attack models based on social relationships, the analysis of the relationships in social networks as well as the roles of relationships on recommendation, and robust social recommendation approaches taking multiple relationships into consideration.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li, S.S., Karahanna, E.: Online recommendation systems in a B2C e-commerce context: a review and future directions. J. Assoc. Inf. Syst. 16(2), 72–107 (2015) Li, S.S., Karahanna, E.: Online recommendation systems in a B2C e-commerce context: a review and future directions. J. Assoc. Inf. Syst. 16(2), 72–107 (2015)
2.
go back to reference Tang, J., Hu, X., Liu, H.: Social recommendation: a review. Soc. Netw. Anal. Min. 3(4), 1113–1133 (2013)CrossRef Tang, J., Hu, X., Liu, H.: Social recommendation: a review. Soc. Netw. Anal. Min. 3(4), 1113–1133 (2013)CrossRef
3.
go back to reference Levandoski, J.J., Sarwat, M., Eldawy, A., Mokbel, M.F.: LARS: a location-aware recommender system. In: IEEE, pp. 450–461 (2012) Levandoski, J.J., Sarwat, M., Eldawy, A., Mokbel, M.F.: LARS: a location-aware recommender system. In: IEEE, pp. 450–461 (2012)
4.
5.
go back to reference Gao, H., Tang, J., Liu, H.: Exploring social-historical ties on location-based social network. In: ICWSM (2012) Gao, H., Tang, J., Liu, H.: Exploring social-historical ties on location-based social network. In: ICWSM (2012)
6.
go back to reference Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: Proceedings of IEEE 24th International Conference on Data Engineering, pp. 486–495 (2008) Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: Proceedings of IEEE 24th International Conference on Data Engineering, pp. 486–495 (2008)
7.
go back to reference Zhang, X.L., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28(4), 616–624 (2013)CrossRef Zhang, X.L., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28(4), 616–624 (2013)CrossRef
9.
go back to reference Ester, M.: Recommendation in social networks. In: ACM RecSys, pp. 491–492 (2013) Ester, M.: Recommendation in social networks. In: ACM RecSys, pp. 491–492 (2013)
10.
go back to reference Rokach, L., Shapira, B., Kantor, P.B.: Recommender Systems Handbook. Springer, New York (2011)MATH Rokach, L., Shapira, B., Kantor, P.B.: Recommender Systems Handbook. Springer, New York (2011)MATH
11.
go back to reference Golbeck, J.: Generating Predictive Movie Recommendations from Trust in Social Networks. Springer, Heidelberg (2006)CrossRef Golbeck, J.: Generating Predictive Movie Recommendations from Trust in Social Networks. Springer, Heidelberg (2006)CrossRef
12.
go back to reference Justin, J., Beegom, A.S.: Nearest neighbour based social recommendation using heat diffusion. In: Proceedings of the 6th ACM India Computing Convention, p. 10 (2013) Justin, J., Beegom, A.S.: Nearest neighbour based social recommendation using heat diffusion. In: Proceedings of the 6th ACM India Computing Convention, p. 10 (2013)
13.
go back to reference Chen, Y.C., Lin, Y.S., Shen, Y.C., Lin, S.D.: A modified random walk framework for handling negative ratings and generating explanations. ACM Trans. Intell. Syst. Technol. 4(1), 12 (2013)CrossRef Chen, Y.C., Lin, Y.S., Shen, Y.C., Lin, S.D.: A modified random walk framework for handling negative ratings and generating explanations. ACM Trans. Intell. Syst. Technol. 4(1), 12 (2013)CrossRef
14.
go back to reference Zhao, T., McAuley, J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, pp. 261–270 (2014) Zhao, T., McAuley, J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, pp. 261–270 (2014)
15.
go back to reference Jiang, M., Cui, P., Wang, F., Zhu, W., Yang, S.: Scalable recommendation with social contextual information. IEEE Trans. Knowl. Data Eng. 26(11), 2789–2802 (2014)CrossRef Jiang, M., Cui, P., Wang, F., Zhu, W., Yang, S.: Scalable recommendation with social contextual information. IEEE Trans. Knowl. Data Eng. 26(11), 2789–2802 (2014)CrossRef
16.
go back to reference Zou, B., Li, C., Tan, L., Chen, H., Wang, S.: Social recommendation based on user trust and tensor decomposition. J. Softw. 12(10), 2852–2864 (2014) Zou, B., Li, C., Tan, L., Chen, H., Wang, S.: Social recommendation based on user trust and tensor decomposition. J. Softw. 12(10), 2852–2864 (2014)
17.
go back to reference Tang, J., Gao, H., Liu, H.: mTrust: discerning multi-faceted trust in a connected world. In: Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pp. 93–102 (2012) Tang, J., Gao, H., Liu, H.: mTrust: discerning multi-faceted trust in a connected world. In: Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pp. 93–102 (2012)
18.
go back to reference Yeung, A.C.M., Iwata, T.: Strength of social influence in trust networks in product review sites. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pp. 495–504 (2011) Yeung, A.C.M., Iwata, T.: Strength of social influence in trust networks in product review sites. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pp. 495–504 (2011)
19.
go back to reference Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. 7(4), 23 (2007)CrossRef Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. 7(4), 23 (2007)CrossRef
20.
go back to reference Wu, Z., Zhuang, Y., Wang, Y., Cao, J.: Shilling attack detection based on feature selection for recommendation systems. Acta Electron. Sinica 40(8), 1687–1693 (2012) Wu, Z., Zhuang, Y., Wang, Y., Cao, J.: Shilling attack detection based on feature selection for recommendation systems. Acta Electron. Sinica 40(8), 1687–1693 (2012)
21.
go back to reference Li, C., Luo, Z.: A metadata-enhanced variational bayesian matrix factorization model for robust collaborative recommendation. Acta Autom. Sinica 9, 1067–1076 (2011) Li, C., Luo, Z.: A metadata-enhanced variational bayesian matrix factorization model for robust collaborative recommendation. Acta Autom. Sinica 9, 1067–1076 (2011)
22.
go back to reference Lee, J.S., Zhu, D.: Shilling attack detection-a new approach for a trustworthy recommender system. Informs J. Comput. 24(1), 117–131 (2012)CrossRefMATH Lee, J.S., Zhu, D.: Shilling attack detection-a new approach for a trustworthy recommender system. Informs J. Comput. 24(1), 117–131 (2012)CrossRefMATH
23.
go back to reference Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)CrossRef Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)CrossRef
24.
go back to reference Zhang, F.G.: Preventing recommendation attack in trust-based recommender systems. J. Comput. Sci. Technol. 26(5), 823–828 (2011)CrossRef Zhang, F.G.: Preventing recommendation attack in trust-based recommender systems. J. Comput. Sci. Technol. 26(5), 823–828 (2011)CrossRef
25.
go back to reference Wang, H., Yang, W., Wang, S., Li, S.: A service recommendation method based on trustworthy community. J. Comput. 37(2), 301–311 (2014) Wang, H., Yang, W., Wang, S., Li, S.: A service recommendation method based on trustworthy community. J. Comput. 37(2), 301–311 (2014)
26.
go back to reference Aggarwal, A., Almeida, J., Kumaraguru, P.: Detection of spam tipping behaviour on foursquare. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 641–648 (2013) Aggarwal, A., Almeida, J., Kumaraguru, P.: Detection of spam tipping behaviour on foursquare. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 641–648 (2013)
27.
go back to reference Limsaiprom, P., Tantatsanawong, P.: Social network anomaly and attack patterns analysis. In: Proceedings of the 6th International Conference on Networked Computing, pp. 1–6. IEEE (2010) Limsaiprom, P., Tantatsanawong, P.: Social network anomaly and attack patterns analysis. In: Proceedings of the 6th International Conference on Networked Computing, pp. 1–6. IEEE (2010)
28.
go back to reference Ghosh, S., Viswanath, B., Kooti, F., et al.: Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, pp. 61–70. ACM (2012) Ghosh, S., Viswanath, B., Kooti, F., et al.: Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, pp. 61–70. ACM (2012)
Metadata
Title
Robust Social Recommendation Techniques: A Review
Authors
Feng Jiang
Min Gao
Qingyu Xiong
Junhao Wen
Yi Zhang
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-42102-5_6

Premium Partner