Skip to main content
Erschienen in: Artificial Intelligence Review 1/2020

19.09.2018

Shilling attacks against collaborative recommender systems: a review

verfasst von: Mingdan Si, Qingshan Li

Erschienen in: Artificial Intelligence Review | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Collaborative filtering recommender systems (CFRSs) have already been proved effective to cope with the information overload problem since they merged in the past two decades. However, CFRSs are highly vulnerable to shilling or profile injection attacks since their openness. Ratings injected by malicious users seriously affect the authenticity of the recommendations as well as users’ trustiness in the recommendation systems. In the past two decades, various studies have been conducted to scrutinize different profile injection attack strategies, shilling attack detection schemes, robust recommendation algorithms, and to evaluate them with respect to accuracy and robustness. Due to their popularity and importance, we survey about shilling attacks in CFRSs. We first briefly discuss the related survey papers about shilling attacks and analyze their deficiencies to illustrate the necessity of this paper. Next we give an overall picture about various shilling attack types and their deployment modes. Then we explain profile injection attack strategies, shilling attack detection schemes and robust recommendation algorithms proposed so far in detail. Moreover, we briefly explain evaluation metrics of the proposed schemes. Last, we discuss some research directions to improve shilling attack detection rates robustness of collaborative recommendation, and conclude this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abbas A, Bilal K, Zhang L, Khan SU (2015) A cloud based health insurance plan recommendation system: a user centered approach. Futur Gener Comput Syst 43:99–109CrossRef Abbas A, Bilal K, Zhang L, Khan SU (2015) A cloud based health insurance plan recommendation system: a user centered approach. Futur Gener Comput Syst 43:99–109CrossRef
Zurück zum Zitat Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749CrossRef Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749CrossRef
Zurück zum Zitat Agarwal V, Bharadwaj KK (2013) A collaborative filtering framework for friends recommendation in social networks based on interaction intensity and adaptive user similarity. Soc Netw Anal Min 3(3):359–379CrossRef Agarwal V, Bharadwaj KK (2013) A collaborative filtering framework for friends recommendation in social networks based on interaction intensity and adaptive user similarity. Soc Netw Anal Min 3(3):359–379CrossRef
Zurück zum Zitat Barragáns-Martínez AB, Costa-Montenegro E, Burguillo JC, Rey-López M, Mikic-Fonte FA, Peleteiro A (2010) A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition. Inf Sci 180(22):4290–4311CrossRef Barragáns-Martínez AB, Costa-Montenegro E, Burguillo JC, Rey-López M, Mikic-Fonte FA, Peleteiro A (2010) A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition. Inf Sci 180(22):4290–4311CrossRef
Zurück zum Zitat Bhaumik R, Williams CA, Mobasher B, Burke RD (2006) Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization, Boston, MA Bhaumik R, Williams CA, Mobasher B, Burke RD (2006) Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization, Boston, MA
Zurück zum Zitat Bhaumik R, Burke RD, Mobasher B (2007a) Effectiveness of crawling attacks against web-based recommender systems. In: AAAI workshop on intelligent techniques for web personalization, Vancouver, BC, Canada, pp 17–26 Bhaumik R, Burke RD, Mobasher B (2007a) Effectiveness of crawling attacks against web-based recommender systems. In: AAAI workshop on intelligent techniques for web personalization, Vancouver, BC, Canada, pp 17–26
Zurück zum Zitat Bhaumik R, Burke RD, Mobasher B (2007b) Crawling attacks against web-based recommender systems. In: International conference on data mining, Las Vegas, Nevada, USA, pp 183–189 Bhaumik R, Burke RD, Mobasher B (2007b) Crawling attacks against web-based recommender systems. In: International conference on data mining, Las Vegas, Nevada, USA, pp 183–189
Zurück zum Zitat Bhaumik R, Mobasher B, Burke R (2011) A clustering approach to unsupervised attack detection in collaborative recommender systems. In: 7th IEEE international conference on data mining, Las Vegas, NV, USA, pp 181–187 Bhaumik R, Mobasher B, Burke R (2011) A clustering approach to unsupervised attack detection in collaborative recommender systems. In: 7th IEEE international conference on data mining, Las Vegas, NV, USA, pp 181–187
Zurück zum Zitat Bilge A, Polat H (2012) A improved privacy-preserving DWT-based collaborative filtering scheme. Expert Syst Appl 39(3):3841–3854CrossRef Bilge A, Polat H (2012) A improved privacy-preserving DWT-based collaborative filtering scheme. Expert Syst Appl 39(3):3841–3854CrossRef
Zurück zum Zitat Bilge A, Polat H (2013) A comparison of clustering-based privacy-preserving collaborative filtering schemes. Appl Soft Comput 13(5):2478–2489CrossRef Bilge A, Polat H (2013) A comparison of clustering-based privacy-preserving collaborative filtering schemes. Appl Soft Comput 13(5):2478–2489CrossRef
Zurück zum Zitat Bilge A, Gunes I, Polat H (2014a) Robustness analysis of privacy-preserving model-based recommendation schemes. Expert Syst Appl 41(8):3671–3681CrossRef Bilge A, Gunes I, Polat H (2014a) Robustness analysis of privacy-preserving model-based recommendation schemes. Expert Syst Appl 41(8):3671–3681CrossRef
Zurück zum Zitat Bilge A, Ozdemir Z, Polat H (2014b) A novel shilling attack detection method. Procedia Comput Sci 31:165–174CrossRef Bilge A, Ozdemir Z, Polat H (2014b) A novel shilling attack detection method. Procedia Comput Sci 31:165–174CrossRef
Zurück zum Zitat Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl Based Syst 46:109–132CrossRef Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl Based Syst 46:109–132CrossRef
Zurück zum Zitat Borràs J, Moreno A, Valls A (2014) Intelligent tourism recommender systems: a survey. Expert Syst Appl 41(16):7370–7389CrossRef Borràs J, Moreno A, Valls A (2014) Intelligent tourism recommender systems: a survey. Expert Syst Appl 41(16):7370–7389CrossRef
Zurück zum Zitat Bryan K, O’Mahony MP, Cunningham P (2008) Unsupervised retrieval of attack profiles in collaborative recommender systems. In: ACM conference on recommender systems, Lausanne, Switzerland, pp 155–162 Bryan K, O’Mahony MP, Cunningham P (2008) Unsupervised retrieval of attack profiles in collaborative recommender systems. In: ACM conference on recommender systems, Lausanne, Switzerland, pp 155–162
Zurück zum Zitat Burke RD, Mobasher B, Bhaumik R, Williams CA (2005a) Segment-based injection attacks against collaborative filtering recommender systems. In: IEEE international conference on data mining, Houston, TX, USA, pp 577–580 Burke RD, Mobasher B, Bhaumik R, Williams CA (2005a) Segment-based injection attacks against collaborative filtering recommender systems. In: IEEE international conference on data mining, Houston, TX, USA, pp 577–580
Zurück zum Zitat Burke RD, Mobasher B, Bhaumik R, Williams CA (2005b) Collaborative recommendation vulnerability to focused bias injection attacks. In: International conference on data mining: workshop on privacy and security aspects of data mining (ICDM), Houston, TX, USA, pp 35–43 Burke RD, Mobasher B, Bhaumik R, Williams CA (2005b) Collaborative recommendation vulnerability to focused bias injection attacks. In: International conference on data mining: workshop on privacy and security aspects of data mining (ICDM), Houston, TX, USA, pp 35–43
Zurück zum Zitat Burke RD, Mobasher B, Zabicki R, Bhaumik R (2005c) Identifying attack models for secure recommendation. In: Proceedings of the WebKDD: workshop on the next generation of recommender systems research, San Diego, CA, USA, pp 19–25 Burke RD, Mobasher B, Zabicki R, Bhaumik R (2005c) Identifying attack models for secure recommendation. In: Proceedings of the WebKDD: workshop on the next generation of recommender systems research, San Diego, CA, USA, pp 19–25
Zurück zum Zitat Burke RD, Mobasher B, Bhaumik R (2005d) Limited knowledge shilling attacks in collaborative filtering systems. In: International joint conference on artificial intelligence (IJCAI 2005): workshop on intelligent techniques for web personalization (ITWP 2005), pp 17–24 Burke RD, Mobasher B, Bhaumik R (2005d) Limited knowledge shilling attacks in collaborative filtering systems. In: International joint conference on artificial intelligence (IJCAI 2005): workshop on intelligent techniques for web personalization (ITWP 2005), pp 17–24
Zurück zum Zitat Burke RD, Mobasher B, Williams CA, Bhaumik R (2006a) Classification features for attack detection in collaborative recommender systems. In: 12th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 542–547 Burke RD, Mobasher B, Williams CA, Bhaumik R (2006a) Classification features for attack detection in collaborative recommender systems. In: 12th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 542–547
Zurück zum Zitat Burke RD, Mobasher B, Williams CA, Bhaumik R (2006b) Detecting profile injection attacks in collaborative recommender systems. In: 8th IEEE conference on e-commerce technology, San Francisco, CA, USA, pp 23–30 Burke RD, Mobasher B, Williams CA, Bhaumik R (2006b) Detecting profile injection attacks in collaborative recommender systems. In: 8th IEEE conference on e-commerce technology, San Francisco, CA, USA, pp 23–30
Zurück zum Zitat Burke R, O’Mahony MP, Hurley NJ (2015) Robust collaborative recommendation. In: Recommender systems handbook. Springer, Boston, pp 961–995CrossRef Burke R, O’Mahony MP, Hurley NJ (2015) Robust collaborative recommendation. In: Recommender systems handbook. Springer, Boston, pp 961–995CrossRef
Zurück zum Zitat Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748CrossRef Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748CrossRef
Zurück zum Zitat Casino F, Patsakis C, Puig D, Solanas A (2013) On privacy preserving collaborative filtering: current trends, open problems, and new issues. In: 2013 IEEE 10th international conference on e-business engineering (ICEBE). IEEE, pp 244–249 Casino F, Patsakis C, Puig D, Solanas A (2013) On privacy preserving collaborative filtering: current trends, open problems, and new issues. In: 2013 IEEE 10th international conference on e-business engineering (ICEBE). IEEE, pp 244–249
Zurück zum Zitat Casino F, Domingo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011CrossRef Casino F, Domingo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011CrossRef
Zurück zum Zitat Cechinel C, Sicilia MÁ, SáNchez-Alonso S, GarcíA-Barriocanal E (2013) Evaluating collaborative filtering recommendations inside large learning object repositories. Inf Process Manag 49(1):34–50CrossRef Cechinel C, Sicilia MÁ, SáNchez-Alonso S, GarcíA-Barriocanal E (2013) Evaluating collaborative filtering recommendations inside large learning object repositories. Inf Process Manag 49(1):34–50CrossRef
Zurück zum Zitat Chakraborty P, Karforma S (2013) Detection of profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969CrossRef Chakraborty P, Karforma S (2013) Detection of profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969CrossRef
Zurück zum Zitat Chen W, Niu Z, Zhao X, Li Y (2014) A hybrid recommendation algorithm adapted in e-learning environments. World Wide Web 17(2):271–284CrossRef Chen W, Niu Z, Zhao X, Li Y (2014) A hybrid recommendation algorithm adapted in e-learning environments. World Wide Web 17(2):271–284CrossRef
Zurück zum Zitat Cheng Z, Hurley NJ (2009a) Robustness analysis of model-based collaborative filtering systems. Lect Notes Comput Sci 6206:3–15CrossRef Cheng Z, Hurley NJ (2009a) Robustness analysis of model-based collaborative filtering systems. Lect Notes Comput Sci 6206:3–15CrossRef
Zurück zum Zitat Cheng Z, Hurley NJ (2009b) Effective diverse and obfuscated attacks on model-based recommender systems. In: 3rd ACM international conference on recommender systems, New York, NY, USA, pp 141–148 Cheng Z, Hurley NJ (2009b) Effective diverse and obfuscated attacks on model-based recommender systems. In: 3rd ACM international conference on recommender systems, New York, NY, USA, pp 141–148
Zurück zum Zitat Cheng Z, Hurley NJ (2009c) Trading robustness for privacy in decentralized recommender systems. In: 31st conference on innovative applications of artificial intelligence, Pasadena, CA, USA, pp 79–84 Cheng Z, Hurley NJ (2009c) Trading robustness for privacy in decentralized recommender systems. In: 31st conference on innovative applications of artificial intelligence, Pasadena, CA, USA, pp 79–84
Zurück zum Zitat Cheng Z, Hurley NJ (2010) Robust collaborative recommendation by least trimmed squares matrix factorization. In: 22nd IEEE international conference on tools with artificial intelligence, Arras, France, pp 105–112 Cheng Z, Hurley NJ (2010) Robust collaborative recommendation by least trimmed squares matrix factorization. In: 22nd IEEE international conference on tools with artificial intelligence, Arras, France, pp 105–112
Zurück zum Zitat Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: 7th Annual ACM international workshop on web information and data management, Bremen, Germany, pp 67–74 Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: 7th Annual ACM international workshop on web information and data management, Bremen, Germany, pp 67–74
Zurück zum Zitat Cho YH, Kim JK (2004) Application of Web usage mining and product taxonomy to collaborative recommendations in e-commerce. Expert Syst Appl 26(2):233–246CrossRef Cho YH, Kim JK (2004) Application of Web usage mining and product taxonomy to collaborative recommendations in e-commerce. Expert Syst Appl 26(2):233–246CrossRef
Zurück zum Zitat Chung CY, Hsu PY, Huang SH (2013) βP: a novel approach to filter out malicious rating profiles from recommender systems. Decis Support Syst 55(1):314–325CrossRef Chung CY, Hsu PY, Huang SH (2013) βP: a novel approach to filter out malicious rating profiles from recommender systems. Decis Support Syst 55(1):314–325CrossRef
Zurück zum Zitat Cobos C, Rodriguez O, Rivera J, Betancourt J, Mendoza M, LeóN E, Herrera-Viedma E (2013) A hybrid system of pedagogical pattern recommendations based on singular value decomposition and variable data attributes. Inf Process Manag 49(3):607–625CrossRef Cobos C, Rodriguez O, Rivera J, Betancourt J, Mendoza M, LeóN E, Herrera-Viedma E (2013) A hybrid system of pedagogical pattern recommendations based on singular value decomposition and variable data attributes. Inf Process Manag 49(3):607–625CrossRef
Zurück zum Zitat Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM conference on electronic commerce, Minneapolis, MN, USA, pp 150–157 Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM conference on electronic commerce, Minneapolis, MN, USA, pp 150–157
Zurück zum Zitat Elbadrawy A, Karypis G (2016) Domain-aware grade prediction and top-n course recommendation. In: 10th ACM conference on recommender systems, pp 183–190 Elbadrawy A, Karypis G (2016) Domain-aware grade prediction and top-n course recommendation. In: 10th ACM conference on recommender systems, pp 183–190
Zurück zum Zitat Gao M, Liu K, Wu Z (2010) Personalisation in web computing and informatics: theories, techniques, applications, and future research. Inf Syst Front 12(5):607–629CrossRef Gao M, Liu K, Wu Z (2010) Personalisation in web computing and informatics: theories, techniques, applications, and future research. Inf Syst Front 12(5):607–629CrossRef
Zurück zum Zitat Gao M, Ling B, Yuan Q, Xiong Q, Yang L (2014a) A robust collaborative filtering approach based on user relationships for recommendation systems. Math Probl Eng 2014:1–8 Gao M, Ling B, Yuan Q, Xiong Q, Yang L (2014a) A robust collaborative filtering approach based on user relationships for recommendation systems. Math Probl Eng 2014:1–8
Zurück zum Zitat Gao M, Yuan Q, Ling B, Xiong Q (2014b) Detection of abnormal item based on time intervals for recommender systems. Sci World J 2014:845–897 Gao M, Yuan Q, Ling B, Xiong Q (2014b) Detection of abnormal item based on time intervals for recommender systems. Sci World J 2014:845–897
Zurück zum Zitat Gavalas D, Konstantopoulos C, Mastakas K, Pantziou G (2014) Mobile recommender systems in tourism. J Netw Comput Appl 39:319–333CrossRef Gavalas D, Konstantopoulos C, Mastakas K, Pantziou G (2014) Mobile recommender systems in tourism. J Netw Comput Appl 39:319–333CrossRef
Zurück zum Zitat Goldberg D, Nichols D, Oki BM (1992) Using collaborative filtering to weave an information tapestry. Commun ACM 35(12):61–70CrossRef Goldberg D, Nichols D, Oki BM (1992) Using collaborative filtering to weave an information tapestry. Commun ACM 35(12):61–70CrossRef
Zurück zum Zitat Good N, Schafer JB, Konstan JA, Borchers A, Sarwar B, Herlocker J, Riedl J (1999) Combining collaborative filtering with personal agents for better recommendations. In: AAAI/IAAI, pp 439–446 Good N, Schafer JB, Konstan JA, Borchers A, Sarwar B, Herlocker J, Riedl J (1999) Combining collaborative filtering with personal agents for better recommendations. In: AAAI/IAAI, pp 439–446
Zurück zum Zitat Goyal A, Lakshmanan LV (2012) Recmax: exploiting recommender systems for fun and profit. In: 18th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1294–1302 Goyal A, Lakshmanan LV (2012) Recmax: exploiting recommender systems for fun and profit. In: 18th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1294–1302
Zurück zum Zitat Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: 13th International conference on World Wide Web, pp 403–412 Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: 13th International conference on World Wide Web, pp 403–412
Zurück zum Zitat Gunes I, Polat H (2015) Hierarchical clustering-based shilling attack detection in private environments. In: 3rd International symposium on digital forensics and security, pp 1–7 Gunes I, Polat H (2015) Hierarchical clustering-based shilling attack detection in private environments. In: 3rd International symposium on digital forensics and security, pp 1–7
Zurück zum Zitat Gunes I, Polat H (2016) Detecting shilling attacks in private environments. Inf Retr J 19(6):547–572CrossRef Gunes I, Polat H (2016) Detecting shilling attacks in private environments. Inf Retr J 19(6):547–572CrossRef
Zurück zum Zitat Gunes I, Bilge A, Kaleli C, Polat H (2013a) Shilling attacks against privacy-preserving collaborative filtering. J Adv Manag Sci 1(1):54–60CrossRef Gunes I, Bilge A, Kaleli C, Polat H (2013a) Shilling attacks against privacy-preserving collaborative filtering. J Adv Manag Sci 1(1):54–60CrossRef
Zurück zum Zitat Gunes I, Bilge A, Polat H (2013b) Shilling attacks against memory-based privacy-preserving recommendation algorithms. KSII Trans Internet Inf Syst (TIIS) 7(5):1272–1290CrossRef Gunes I, Bilge A, Polat H (2013b) Shilling attacks against memory-based privacy-preserving recommendation algorithms. KSII Trans Internet Inf Syst (TIIS) 7(5):1272–1290CrossRef
Zurück zum Zitat Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42:767–799CrossRef Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42:767–799CrossRef
Zurück zum Zitat Guo G, Zhang J, Thalmann D (2014) Merging trust in collaborative filtering to alleviate data sparsity and cold start. Knowl Based Syst 57:57–68CrossRef Guo G, Zhang J, Thalmann D (2014) Merging trust in collaborative filtering to alleviate data sparsity and cold start. Knowl Based Syst 57:57–68CrossRef
Zurück zum Zitat Guo G, Zhang J, Yorke-Smith N (2015a) Leveraging multiviews of trust and similarity to enhance clustering-based recommender systems. Knowl Based Syst 74:14–27CrossRef Guo G, Zhang J, Yorke-Smith N (2015a) Leveraging multiviews of trust and similarity to enhance clustering-based recommender systems. Knowl Based Syst 74:14–27CrossRef
Zurück zum Zitat Guo G, Zhang J, Yorke-Smith N (2015b) TrustSVD: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: 29th AAAI conference on artificial intelligence, pp 123–129 Guo G, Zhang J, Yorke-Smith N (2015b) TrustSVD: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: 29th AAAI conference on artificial intelligence, pp 123–129
Zurück zum Zitat He F, Wang X, Liu B (2010) Attack detection by rough set theory in recommendation system. In: IEEE international conference on granular computing, pp 692–695 He F, Wang X, Liu B (2010) Attack detection by rough set theory in recommendation system. In: IEEE international conference on granular computing, pp 692–695
Zurück zum Zitat Herlocker JL, Konstan JA, Borchers A, Riedl J (1999) An algorithmic framework for performing collaborative filtering. In 22nd Annual international ACM SIGIR conference on research and development in information retrieval, pp 230–237 Herlocker JL, Konstan JA, Borchers A, Riedl J (1999) An algorithmic framework for performing collaborative filtering. In 22nd Annual international ACM SIGIR conference on research and development in information retrieval, pp 230–237
Zurück zum Zitat Hurley NJ, O’Mahony MP, Silvestre GCM (2007) Attacking recommender systems: a cost-benefit analysis. IEEE Intell Syst 22(3):64–68CrossRef Hurley NJ, O’Mahony MP, Silvestre GCM (2007) Attacking recommender systems: a cost-benefit analysis. IEEE Intell Syst 22(3):64–68CrossRef
Zurück zum Zitat Hurley NJ, Cheng Z, Zhang M (2009) Statistical attack detection. In: 3rd ACM international conference on recommender systems, New York, NY, USA, pp 149–156 Hurley NJ, Cheng Z, Zhang M (2009) Statistical attack detection. In: 3rd ACM international conference on recommender systems, New York, NY, USA, pp 149–156
Zurück zum Zitat Jeckmans AJ, Beye M, Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. In: Social media retrieval, pp 263–281 Jeckmans AJ, Beye M, Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. In: Social media retrieval, pp 263–281
Zurück zum Zitat Ji AT, Yeon C, Kim HN, Jo GS (2007) Distributed collaborative filtering for robust recommendations against shilling attacks. Lect Notes Comput Sci 4509:14–25MathSciNetCrossRef Ji AT, Yeon C, Kim HN, Jo GS (2007) Distributed collaborative filtering for robust recommendations against shilling attacks. Lect Notes Comput Sci 4509:14–25MathSciNetCrossRef
Zurück zum Zitat Jia CX, Liu RR (2015) Improve the algorithmic performance of collaborative filtering by using the interevent time distribution of human behaviors. Phys A Stat Mech Appl 436:236–245CrossRef Jia CX, Liu RR (2015) Improve the algorithmic performance of collaborative filtering by using the interevent time distribution of human behaviors. Phys A Stat Mech Appl 436:236–245CrossRef
Zurück zum Zitat Jia D, Zhang F (2014) A robust collaborative recommendation algorithm incorporating trustworthy neighborhood model. J Comput 9(10):2329CrossRef Jia D, Zhang F (2014) A robust collaborative recommendation algorithm incorporating trustworthy neighborhood model. J Comput 9(10):2329CrossRef
Zurück zum Zitat Jia D, Zhang F, Liu S (2013) A robust collaborative filtering recommendation algorithm based on multidimensional trust model. JSW 8(1):11–18CrossRef Jia D, Zhang F, Liu S (2013) A robust collaborative filtering recommendation algorithm based on multidimensional trust model. JSW 8(1):11–18CrossRef
Zurück zum Zitat Kong X, Zhang J, Yu PS (2013) Inferring anchor links across multiple heterogeneous social networks. In: 22nd ACM international conference on information and knowledge management, pp 179–188 Kong X, Zhang J, Yu PS (2013) Inferring anchor links across multiple heterogeneous social networks. In: 22nd ACM international conference on information and knowledge management, pp 179–188
Zurück zum Zitat Koren Y (2008) Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp 426–434 Koren Y (2008) Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp 426–434
Zurück zum Zitat Koren Y (2010) Collaborative filtering with temporal dynamics. Commun ACM 53(4):89–97CrossRef Koren Y (2010) Collaborative filtering with temporal dynamics. Commun ACM 53(4):89–97CrossRef
Zurück zum Zitat Kriegel HP, Zimek A (2008) Angle-based outlier detection in high-dimensional data. In: 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp 444–452 Kriegel HP, Zimek A (2008) Angle-based outlier detection in high-dimensional data. In: 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp 444–452
Zurück zum Zitat Kschischang FR, Frey BJ, Loeliger HA (2001) Factor graphs and the sum-product algorithm. IEEE Trans Inf Theory 47(2):498–519MathSciNetMATHCrossRef Kschischang FR, Frey BJ, Loeliger HA (2001) Factor graphs and the sum-product algorithm. IEEE Trans Inf Theory 47(2):498–519MathSciNetMATHCrossRef
Zurück zum Zitat Lacoste-Julien S, Palla K, Davies A, Kasneci G, Graepel T, Ghahramani Z (2013) Sigma: simple greedy matching for aligning large knowledge bases. In: 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 572–580 Lacoste-Julien S, Palla K, Davies A, Kasneci G, Graepel T, Ghahramani Z (2013) Sigma: simple greedy matching for aligning large knowledge bases. In: 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 572–580
Zurück zum Zitat Lam SK, Riedl JT (2004) Shilling recommender systems for fun and profit. In: 13th International conference on World Wide Web, New York, NY, USA, pp 393–402 Lam SK, Riedl JT (2004) Shilling recommender systems for fun and profit. In: 13th International conference on World Wide Web, New York, NY, USA, pp 393–402
Zurück zum Zitat Lam SK, Riedl JT (2005) Privacy, shilling, and the value of information in recommender systems. In: Proceedings of user modeling workshop on privacy-enhanced personalization, Edinburgh, UK, pp 85–92 Lam SK, Riedl JT (2005) Privacy, shilling, and the value of information in recommender systems. In: Proceedings of user modeling workshop on privacy-enhanced personalization, Edinburgh, UK, pp 85–92
Zurück zum Zitat Lam SK, Frankowski D, Riedl JT (2006) Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. Lect Notes Comput Sci 3995:14–29CrossRef Lam SK, Frankowski D, Riedl JT (2006) Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. Lect Notes Comput Sci 3995:14–29CrossRef
Zurück zum Zitat Lee WP, Ma CY (2016) Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks. Knowl Based Syst 106:125–134CrossRef Lee WP, Ma CY (2016) Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks. Knowl Based Syst 106:125–134CrossRef
Zurück zum Zitat Lee JS, Zhu D (2012) Shilling attack detection: a new approach for a trustworthy recommender system. INFORMS J Comput 24(1):117–131MATHCrossRef Lee JS, Zhu D (2012) Shilling attack detection: a new approach for a trustworthy recommender system. INFORMS J Comput 24(1):117–131MATHCrossRef
Zurück zum Zitat Li C, Luo Z (2011) Detection of shilling attacks in collaborative filtering recommender systems. In: Proceedings of the international conference of soft computing and pattern recognition, Dalian, China, pp 190–193 Li C, Luo Z (2011) Detection of shilling attacks in collaborative filtering recommender systems. In: Proceedings of the international conference of soft computing and pattern recognition, Dalian, China, pp 190–193
Zurück zum Zitat Massa P, Avesani P (2007) Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on recommender systems, pp 17–24 Massa P, Avesani P (2007) Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on recommender systems, pp 17–24
Zurück zum Zitat Mehta B (2007) Unsupervised shilling detection for collaborative filtering. In: 22nd International conference on artificial intelligence, Vancouver, BC, Canada, pp 1402–1407 Mehta B (2007) Unsupervised shilling detection for collaborative filtering. In: 22nd International conference on artificial intelligence, Vancouver, BC, Canada, pp 1402–1407
Zurück zum Zitat Mehta B, Hofmann T (2008) A survey of attack-resistant collaborative filtering algorithms. EEE Data Eng Bull 31(2):14–22 Mehta B, Hofmann T (2008) A survey of attack-resistant collaborative filtering algorithms. EEE Data Eng Bull 31(2):14–22
Zurück zum Zitat Mehta B, Nejdl W (2008) Attack resistant collaborative filtering. In: 31st Annual international ACM SIGIR conference on research and development in information retrieval, Singapore, pp 75–82 Mehta B, Nejdl W (2008) Attack resistant collaborative filtering. In: 31st Annual international ACM SIGIR conference on research and development in information retrieval, Singapore, pp 75–82
Zurück zum Zitat Mehta B, Nejdl W (2009) Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User Adapt Interact 19(1–2):65–97CrossRef Mehta B, Nejdl W (2009) Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User Adapt Interact 19(1–2):65–97CrossRef
Zurück zum Zitat Mehta B, Hofmann T, Nejdl W (2007) Robust collaborative filtering. In: 1st ACM international conference on recommender systems, Minneapolis, MN, USA, pp 49–56 Mehta B, Hofmann T, Nejdl W (2007) Robust collaborative filtering. In: 1st ACM international conference on recommender systems, Minneapolis, MN, USA, pp 49–56
Zurück zum Zitat Mobasher B, Burke RD, Bhaumik R, Williams CA (2005) Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of the 2005 WebKDD workshop, Chicago, IL, USA Mobasher B, Burke RD, Bhaumik R, Williams CA (2005) Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of the 2005 WebKDD workshop, Chicago, IL, USA
Zurück zum Zitat Mobasher B, Burke RD, Sandvig JJ (2006a) Model-based collaborative filtering as a defense against profile injection attacks. In: 21st National conference on artificial intelligence, Boston, MA, USA, pp 1388–1393 Mobasher B, Burke RD, Sandvig JJ (2006a) Model-based collaborative filtering as a defense against profile injection attacks. In: 21st National conference on artificial intelligence, Boston, MA, USA, pp 1388–1393
Zurück zum Zitat Mobasher B, Burke RD, Williams CA, Bhaumik R (2006b) Analysis and detection of segment-focused attacks against collaborative recommendation. Lect Notes Comput Sci 4198:96–118CrossRef Mobasher B, Burke RD, Williams CA, Bhaumik R (2006b) Analysis and detection of segment-focused attacks against collaborative recommendation. Lect Notes Comput Sci 4198:96–118CrossRef
Zurück zum Zitat Mobasher B, Burke RD, Bhaumik R, Sandvig JJ (2007a) Attacks and remedies in collaborative recommendation. IEEE Intell Syst 22(3):56–63CrossRef Mobasher B, Burke RD, Bhaumik R, Sandvig JJ (2007a) Attacks and remedies in collaborative recommendation. IEEE Intell Syst 22(3):56–63CrossRef
Zurück zum Zitat Mobasher B, Burke RD, Bhaumik R, Williams C (2007b) Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol (TOIT) 7(4):23–60CrossRef Mobasher B, Burke RD, Bhaumik R, Williams C (2007b) Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol (TOIT) 7(4):23–60CrossRef
Zurück zum Zitat Montaner M, López B, De La Rosa JL (2003) A taxonomy of recommender agents on the internet. Artif Intell Rev 19(4):285–330CrossRef Montaner M, López B, De La Rosa JL (2003) A taxonomy of recommender agents on the internet. Artif Intell Rev 19(4):285–330CrossRef
Zurück zum Zitat Moradi P, Ahmadian S, Akhlaghian F (2015) An effective trust-based recommendation method using a novel graph clustering algorithm. Phys A Stat Mech Appl 436:462–481CrossRef Moradi P, Ahmadian S, Akhlaghian F (2015) An effective trust-based recommendation method using a novel graph clustering algorithm. Phys A Stat Mech Appl 436:462–481CrossRef
Zurück zum Zitat Nigam K, McCallum AK, Thrun S, Mitchell T (2000) Text classification from labeled and unlabeled documents using EM. Mach Learn 39(2):103–134MATHCrossRef Nigam K, McCallum AK, Thrun S, Mitchell T (2000) Text classification from labeled and unlabeled documents using EM. Mach Learn 39(2):103–134MATHCrossRef
Zurück zum Zitat O’Donovan J, Smyth B (2005) Trust in recommender systems. In: 10th International conference on intelligent user interfaces, pp 167–174 O’Donovan J, Smyth B (2005) Trust in recommender systems. In: 10th International conference on intelligent user interfaces, pp 167–174
Zurück zum Zitat O’Donovan J, Smyth B (2006) Mining trust values from recommendation errors. Int J Artif Intell Tools 15(06):945–962CrossRef O’Donovan J, Smyth B (2006) Mining trust values from recommendation errors. Int J Artif Intell Tools 15(06):945–962CrossRef
Zurück zum Zitat O’Mahony MP (2004) Towards robust and efficient automated collaborative filtering. Ph.D. dissertation, University College Dublin O’Mahony MP (2004) Towards robust and efficient automated collaborative filtering. Ph.D. dissertation, University College Dublin
Zurück zum Zitat O’Mahony MP, Smyth B (2007a) Evaluating the robustness of collaborative web search. In: 18th Irish conference on artificial intelligence and cognitive science, Dublin, Ireland O’Mahony MP, Smyth B (2007a) Evaluating the robustness of collaborative web search. In: 18th Irish conference on artificial intelligence and cognitive science, Dublin, Ireland
Zurück zum Zitat O’Mahony MP, Smyth B (2007b) Collaborative web search: a robustness analysis. Artif Intell Rev 28(1):69–86CrossRef O’Mahony MP, Smyth B (2007b) Collaborative web search: a robustness analysis. Artif Intell Rev 28(1):69–86CrossRef
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2002a) Towards robust collaborative filtering. Lect Notes Comput Sci 2464:87–94MATHCrossRef O’Mahony MP, Hurley NJ, Silvestre GCM (2002a) Towards robust collaborative filtering. Lect Notes Comput Sci 2464:87–94MATHCrossRef
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2002b) Promoting recommendations: an attack on collaborative filtering. In: 13th International conference on database and expert systems applications, Aix-en-Provence, France, pp 494–503 O’Mahony MP, Hurley NJ, Silvestre GCM (2002b) Promoting recommendations: an attack on collaborative filtering. In: 13th International conference on database and expert systems applications, Aix-en-Provence, France, pp 494–503
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2003) Collaborative filtering-safe and sound. Lect Notes Comput Sci 2871:506–510MATHCrossRef O’Mahony MP, Hurley NJ, Silvestre GCM (2003) Collaborative filtering-safe and sound. Lect Notes Comput Sci 2871:506–510MATHCrossRef
Zurück zum Zitat O’Mahony MP, Hurley NJ, Kushmerick N, Silvestre GCM (2004) Collaborative recommendation: a robustness analysis. ACM Trans Internet Technol 4(4):344–377CrossRef O’Mahony MP, Hurley NJ, Kushmerick N, Silvestre GCM (2004) Collaborative recommendation: a robustness analysis. ACM Trans Internet Technol 4(4):344–377CrossRef
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2005) Recommender systems: attack types and strategies. In: 20th National conference on artificial intelligence, Pittsburgh, PA, USA, pp 334–339 O’Mahony MP, Hurley NJ, Silvestre GCM (2005) Recommender systems: attack types and strategies. In: 20th National conference on artificial intelligence, Pittsburgh, PA, USA, pp 334–339
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2006a) Detecting noise in recommender system databases. In: 11th International conference on intelligent user interfaces, Sydney, Australia, pp 109–115 O’Mahony MP, Hurley NJ, Silvestre GCM (2006a) Detecting noise in recommender system databases. In: 11th International conference on intelligent user interfaces, Sydney, Australia, pp 109–115
Zurück zum Zitat O’Mahony MP, Hurley NJ, Silvestre GCM (2006b) Attacking recommender systems: the cost of promotion. In: Proceedings of the workshop on recommender systems, in conjunction with the 17th European conference on artificial intelligence, Riva del Garda, Trentino, Italy, pp 24–28 O’Mahony MP, Hurley NJ, Silvestre GCM (2006b) Attacking recommender systems: the cost of promotion. In: Proceedings of the workshop on recommender systems, in conjunction with the 17th European conference on artificial intelligence, Riva del Garda, Trentino, Italy, pp 24–28
Zurück zum Zitat Ozturk A, Polat H (2015) From existing trends to future trends in privacy-preserving collaborative filtering. Wiley Interdiscipl Rev Data Min Knowl Discov 5(6):276–291CrossRef Ozturk A, Polat H (2015) From existing trends to future trends in privacy-preserving collaborative filtering. Wiley Interdiscipl Rev Data Min Knowl Discov 5(6):276–291CrossRef
Zurück zum Zitat Polat H, Du W (2005) Privacy-preserving collaborative filtering. Int J Electron Commerc 9(4):9–35CrossRef Polat H, Du W (2005) Privacy-preserving collaborative filtering. Int J Electron Commerc 9(4):9–35CrossRef
Zurück zum Zitat Rashid AM, Karypis G, Riedl J (2005) Influence in ratings-based recommender systems: an algorithm-independent approach. In: 2005 SIAM international conference on data mining, pp 556–560 Rashid AM, Karypis G, Riedl J (2005) Influence in ratings-based recommender systems: an algorithm-independent approach. In: 2005 SIAM international conference on data mining, pp 556–560
Zurück zum Zitat Ray S, Mahanti A (2009) Filler item strategies for shilling attacks against recommender systems. In: 42nd Hawaii international conference on system sciences (HICSS 09), pp 1–10 Ray S, Mahanti A (2009) Filler item strategies for shilling attacks against recommender systems. In: 42nd Hawaii international conference on system sciences (HICSS 09), pp 1–10
Zurück zum Zitat Ray S, Mahanti A (2010) Improving prediction accuracy in trust-aware recommender systems. In: 43rd Hawaii international conference on system sciences, Kauai, HI, USA, pp 1–9 Ray S, Mahanti A (2010) Improving prediction accuracy in trust-aware recommender systems. In: 43rd Hawaii international conference on system sciences, Kauai, HI, USA, pp 1–9
Zurück zum Zitat Resnick P, Iacovou N, Suchak M, Bergstrom P, Riedl J (1994) GroupLens: an open architecture for collaborative filtering of netnews. In: ACM conference on computer supported cooperative work, pp 175–186 Resnick P, Iacovou N, Suchak M, Bergstrom P, Riedl J (1994) GroupLens: an open architecture for collaborative filtering of netnews. In: ACM conference on computer supported cooperative work, pp 175–186
Zurück zum Zitat Rivero-Rodriguez A, Konstantinidis ST, Sánchez-Bocanegra CL, Fernández-Luque L (2013) A health information recommender system: enriching YouTube health videos with Medline Plus information by the use of SnomedCT terms. In: 26th International symposium on computer-based medical systems (CBMS), pp 257–261 Rivero-Rodriguez A, Konstantinidis ST, Sánchez-Bocanegra CL, Fernández-Luque L (2013) A health information recommender system: enriching YouTube health videos with Medline Plus information by the use of SnomedCT terms. In: 26th International symposium on computer-based medical systems (CBMS), pp 257–261
Zurück zum Zitat Ronen R, Koenigstein N, Ziklik E, Nice N (2013) Selecting content-based features for collaborative filtering recommenders. In: 7th ACM conference on recommender systems, pp 407–410 Ronen R, Koenigstein N, Ziklik E, Nice N (2013) Selecting content-based features for collaborative filtering recommenders. In: 7th ACM conference on recommender systems, pp 407–410
Zurück zum Zitat Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: 10th International conference on World Wide Web, pp 285–295 Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: 10th International conference on World Wide Web, pp 285–295
Zurück zum Zitat Schafer JB, Konstan JA, Riedl J (2001) E-commerce recommendation applications. In: Applications of data mining to electronic commerce, pp 115–153MATHCrossRef Schafer JB, Konstan JA, Riedl J (2001) E-commerce recommendation applications. In: Applications of data mining to electronic commerce, pp 115–153MATHCrossRef
Zurück zum Zitat Seminario CE (2013) Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In: 7th ACM conference on recommender systems, pp 447–450 Seminario CE (2013) Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In: 7th ACM conference on recommender systems, pp 447–450
Zurück zum Zitat Seminario CE, Wilson DC (2014a) Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: 27th International Florida artificial intelligence research society conference, pp 81–86 Seminario CE, Wilson DC (2014a) Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: 27th International Florida artificial intelligence research society conference, pp 81–86
Zurück zum Zitat Seminario CE, Wilson DC (2014b) Attacking item-based recommender systems with power items. In: 8th ACM conference on recommender systems, pp 57–64 Seminario CE, Wilson DC (2014b) Attacking item-based recommender systems with power items. In: 8th ACM conference on recommender systems, pp 57–64
Zurück zum Zitat Seminario CE, Wilson DC (2016) Nuking item-based collaborative recommenders with power items and multiple targets. In: International Florida artificial intelligence research society conference, pp 560–565 Seminario CE, Wilson DC (2016) Nuking item-based collaborative recommenders with power items and multiple targets. In: International Florida artificial intelligence research society conference, pp 560–565
Zurück zum Zitat Serrano-Guerrero J, Herrera-Viedma E, Olivas JA, Cerezo A, Romero FP (2011) A google wave-based fuzzy recommender system to disseminate information in University Digital Libraries 2.0. Inf Sci 181(9):1503–1516CrossRef Serrano-Guerrero J, Herrera-Viedma E, Olivas JA, Cerezo A, Romero FP (2011) A google wave-based fuzzy recommender system to disseminate information in University Digital Libraries 2.0. Inf Sci 181(9):1503–1516CrossRef
Zurück zum Zitat Shambour Q, Lu J (2015) An effective recommender system by unifying user and item trust information for B2B applications. J Comput Syst Sci 81(7):1110–1126MathSciNetMATHCrossRef Shambour Q, Lu J (2015) An effective recommender system by unifying user and item trust information for B2B applications. J Comput Syst Sci 81(7):1110–1126MathSciNetMATHCrossRef
Zurück zum Zitat Shi C, Liu J, Zhuang F, Philip SY, Wu B (2016) Integrating heterogeneous information via flexible regularization framework for recommendation. Knowl Inf Syst 49(3):835–859CrossRef Shi C, Liu J, Zhuang F, Philip SY, Wu B (2016) Integrating heterogeneous information via flexible regularization framework for recommendation. Knowl Inf Syst 49(3):835–859CrossRef
Zurück zum Zitat Silva T, Ma J, Yang C, Liang H (2015) A profile-boosted research analytics framework to recommend journals for manuscripts. J Assoc Inf Sci Technol 66(1):180–200CrossRef Silva T, Ma J, Yang C, Liang H (2015) A profile-boosted research analytics framework to recommend journals for manuscripts. J Assoc Inf Sci Technol 66(1):180–200CrossRef
Zurück zum Zitat Tang T, Tang Y (2011) An effective recommender attack detection method based on time SFM factors. In: 3rd International conference on communication software and networks, Xi’an, China, pp 78–81 Tang T, Tang Y (2011) An effective recommender attack detection method based on time SFM factors. In: 3rd International conference on communication software and networks, Xi’an, China, pp 78–81
Zurück zum Zitat Tejeda-Lorente Á, Porcel C, Peis E, Sanz R, Herrera-Viedma E (2014) A quality based recommender system to disseminate information in a university digital library. Inf Sci 261:52–69CrossRef Tejeda-Lorente Á, Porcel C, Peis E, Sanz R, Herrera-Viedma E (2014) A quality based recommender system to disseminate information in a university digital library. Inf Sci 261:52–69CrossRef
Zurück zum Zitat Vozalis MG, Margaritis KG (2007) Using SVD and demographic data for the enhancement of generalized collaborative filtering. Inf Sci 177(15):3017–3037CrossRef Vozalis MG, Margaritis KG (2007) Using SVD and demographic data for the enhancement of generalized collaborative filtering. Inf Sci 177(15):3017–3037CrossRef
Zurück zum Zitat Wang J, Zhang Y (2013) Opportunity model for e-commerce recommendation: right product; right time. In: 36th International ACM SIGIR conference on research and development in information retrieval, pp 303–312 Wang J, Zhang Y (2013) Opportunity model for e-commerce recommendation: right product; right time. In: 36th International ACM SIGIR conference on research and development in information retrieval, pp 303–312
Zurück zum Zitat Wang Z, Sun L, Zhu W, Yang S, Li H, Wu D (2013) Joint social and content recommendation for user-generated videos in online social network. IEEE Trans Multimedia 15(3):698–709CrossRef Wang Z, Sun L, Zhu W, Yang S, Li H, Wu D (2013) Joint social and content recommendation for user-generated videos in online social network. IEEE Trans Multimedia 15(3):698–709CrossRef
Zurück zum Zitat Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, CambridgeMATHCrossRef Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, CambridgeMATHCrossRef
Zurück zum Zitat Wei C, Khoury R, Fong S (2013) Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm. Inf Syst Front 15(4):533–551CrossRef Wei C, Khoury R, Fong S (2013) Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm. Inf Syst Front 15(4):533–551CrossRef
Zurück zum Zitat Wiesner M, Pfeifer D (2014) Health recommender systems: concepts, requirements, technical basics and challenges. Int J Environ Res Public Health 11(3):2580–2607CrossRef Wiesner M, Pfeifer D (2014) Health recommender systems: concepts, requirements, technical basics and challenges. Int J Environ Res Public Health 11(3):2580–2607CrossRef
Zurück zum Zitat Williams CA, Mobasher B (2012) Thesis: Profile injection attack detection for securing collaborative recommender systems. Serv Oriented Comput Appl 1(3):157–170CrossRef Williams CA, Mobasher B (2012) Thesis: Profile injection attack detection for securing collaborative recommender systems. Serv Oriented Comput Appl 1(3):157–170CrossRef
Zurück zum Zitat Williams CA, Mobasher B, Burke RD, Bhaumik R, Sandvig JJ (2006) Detection of obfuscated attacks in collaborative recommender systems. In: Proceedings of the workshop on recommender systems, in conjunction with the 17th European conference on artificial intelligence, Riva del Garda, Trentino, Italy, pp 19–23 Williams CA, Mobasher B, Burke RD, Bhaumik R, Sandvig JJ (2006) Detection of obfuscated attacks in collaborative recommender systems. In: Proceedings of the workshop on recommender systems, in conjunction with the 17th European conference on artificial intelligence, Riva del Garda, Trentino, Italy, pp 19–23
Zurück zum Zitat Williams CA, Mobasher B, Burke RD (2007) Defending recommender systems: detection of profile injection attacks. Serv Oriented Comput Appl 1(3):157–170CrossRef Williams CA, Mobasher B, Burke RD (2007) Defending recommender systems: detection of profile injection attacks. Serv Oriented Comput Appl 1(3):157–170CrossRef
Zurück zum Zitat Wilson DC, Seminario CE (2013) When power users attack: assessing impacts in collaborative recommender systems. In: 7th ACM conference on recommender systems, pp 427–430 Wilson DC, Seminario CE (2013) When power users attack: assessing impacts in collaborative recommender systems. In: 7th ACM conference on recommender systems, pp 427–430
Zurück zum Zitat Wu Z, Cao J, Mao B, Wang Y (2011) Semi-SAD: applying semi-supervised learning to shilling attack detection. In: 5th ACM conference on recommender systems, Chicago, IL, USA, pp 289–292 Wu Z, Cao J, Mao B, Wang Y (2011) Semi-SAD: applying semi-supervised learning to shilling attack detection. In: 5th ACM conference on recommender systems, Chicago, IL, USA, pp 289–292
Zurück zum Zitat Wu Z, Wu J, Cao J, Tao D (2012) HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: 18th ACM SIGKDD international conference on knowledge discovery and data mining, pp 985–993 Wu Z, Wu J, Cao J, Tao D (2012) HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: 18th ACM SIGKDD international conference on knowledge discovery and data mining, pp 985–993
Zurück zum Zitat Wu Z, Wang Y, Wang Y, Wu J, Cao J, Zhang L (2015) Spammers detection from product reviews: a hybrid model. In: IEEE international conference on data mining (ICDM 2015), pp 1039–1044 Wu Z, Wang Y, Wang Y, Wu J, Cao J, Zhang L (2015) Spammers detection from product reviews: a hybrid model. In: IEEE international conference on data mining (ICDM 2015), pp 1039–1044
Zurück zum Zitat Xia H, Fang B, Gao M, Ma H, Tang Y, Wen J (2015) A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf Sci 306:150–165CrossRef Xia H, Fang B, Gao M, Ma H, Tang Y, Wen J (2015) A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf Sci 306:150–165CrossRef
Zurück zum Zitat Yang Z, Cai Z, Guan X (2016a) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158CrossRef Yang Z, Cai Z, Guan X (2016a) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158CrossRef
Zurück zum Zitat Yang Z, Xu L, Cai Z, Xu Z (2016b) Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88CrossRef Yang Z, Xu L, Cai Z, Xu Z (2016b) Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88CrossRef
Zurück zum Zitat Yi H, Zhang F (2016) Robust recommendation method based on suspicious users measurement and multidimensional trust. J Intell Inf Syst 46(2):349–367CrossRef Yi H, Zhang F (2016) Robust recommendation method based on suspicious users measurement and multidimensional trust. J Intell Inf Syst 46(2):349–367CrossRef
Zurück zum Zitat Yu H (2014) An algorithm for detecting recommendation attack based on incremental learning. J Inf Comput Sci 11(7):2365–2373CrossRef Yu H (2014) An algorithm for detecting recommendation attack based on incremental learning. J Inf Comput Sci 11(7):2365–2373CrossRef
Zurück zum Zitat Yu H, Gao R, Wang K, Zhang F (2017) A novel robust recommendation method based on kernel matrix factorization. J Intell Fuzzy Syst 32(3):2101–2109MATHCrossRef Yu H, Gao R, Wang K, Zhang F (2017) A novel robust recommendation method based on kernel matrix factorization. J Intell Fuzzy Syst 32(3):2101–2109MATHCrossRef
Zurück zum Zitat Yuan NJ, Zheng Y, Zhang L, Xie X (2013) T-finder: a recommender system for finding passengers and vacant taxis. IEEE Trans Knowl Data Eng 25(10):2390–2403CrossRef Yuan NJ, Zheng Y, Zhang L, Xie X (2013) T-finder: a recommender system for finding passengers and vacant taxis. IEEE Trans Knowl Data Eng 25(10):2390–2403CrossRef
Zurück zum Zitat Zafarani R, Liu H (2009) Connecting corresponding identities across communities. In: International conference on weblogs and social media (ICWSM 2009), vol 9, pp 354–357 Zafarani R, Liu H (2009) Connecting corresponding identities across communities. In: International conference on weblogs and social media (ICWSM 2009), vol 9, pp 354–357
Zurück zum Zitat Zhang FG (2009) A survey of shilling attacks in collaborative filtering recommender systems. In: Proceedings of the international conference on computational intelligence and software engineering, Wuhan, China, pp 1–4 Zhang FG (2009) A survey of shilling attacks in collaborative filtering recommender systems. In: Proceedings of the international conference on computational intelligence and software engineering, Wuhan, China, pp 1–4
Zurück zum Zitat Zhang FG (2011) Analysis of bandwagon and average hybrid attack model against trust-based recommender systems. In: 5th International conference on management of e-commerce and e-government, Hubei, China, pp 269–273 Zhang FG (2011) Analysis of bandwagon and average hybrid attack model against trust-based recommender systems. In: 5th International conference on management of e-commerce and e-government, Hubei, China, pp 269–273
Zurück zum Zitat Zhang F, Sun S (2014) A robust collaborative recommendation algorithm based on least median squares estimator. JCP 9(2):308–314 Zhang F, Sun S (2014) A robust collaborative recommendation algorithm based on least median squares estimator. JCP 9(2):308–314
Zurück zum Zitat Zhang FG, Xu SH (2007) Analysis of trust-based e-commerce recommender systems under recommendation attacks. In: 1st International symposium on data, privacy, and e-commerce, Chengdu, China, pp 385–390 Zhang FG, Xu SH (2007) Analysis of trust-based e-commerce recommender systems under recommendation attacks. In: 1st International symposium on data, privacy, and e-commerce, Chengdu, China, pp 385–390
Zurück zum Zitat Zhang F, Zhou Q (2014) HHT–SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105CrossRef Zhang F, Zhou Q (2014) HHT–SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105CrossRef
Zurück zum Zitat Zhang S, Ouyang Y, Ford J, Makedon F (2006a) Analysis of a low-dimensional linear model under recommendation attacks. In: 29th Annual international ACM SIGIR conference on research and development in information retrieval, Seattle, WA, USA, 2006:517–524 Zhang S, Ouyang Y, Ford J, Makedon F (2006a) Analysis of a low-dimensional linear model under recommendation attacks. In: 29th Annual international ACM SIGIR conference on research and development in information retrieval, Seattle, WA, USA, 2006:517–524
Zurück zum Zitat Zhang S, Chakrabarti A, Ford J, Makedon F (2006b) Attack detection in time series for recommender systems. In: 20th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 809–814 Zhang S, Chakrabarti A, Ford J, Makedon F (2006b) Attack detection in time series for recommender systems. In: 20th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 809–814
Zurück zum Zitat Zhang Y, Tang J, Yang Z, Pei J, Yu PS (2015) COSNET: connecting heterogeneous social networks with local and global consistency. In 21st ACM SIGKDD international conference on knowledge discovery and data mining, pp 1485–1494 Zhang Y, Tang J, Yang Z, Pei J, Yu PS (2015) COSNET: connecting heterogeneous social networks with local and global consistency. In 21st ACM SIGKDD international conference on knowledge discovery and data mining, pp 1485–1494
Zurück zum Zitat Zhang F, Lu Y, Chen J, Liu S, Ling Z (2017) Robust collaborative filtering based on non-negative matrix factorization and R 1-norm. Knowl Based Syst 118:177–190CrossRef Zhang F, Lu Y, Chen J, Liu S, Ling Z (2017) Robust collaborative filtering based on non-negative matrix factorization and R 1-norm. Knowl Based Syst 118:177–190CrossRef
Zurück zum Zitat Zhou W, Koh YS, Wen J, Alam S, Dobbie G (2014) Detection of abnormal profiles on group attacks in recommender systems. In 37th International ACM SIGIR conference on research and development in information retrieval, pp 955–958 Zhou W, Koh YS, Wen J, Alam S, Dobbie G (2014) Detection of abnormal profiles on group attacks in recommender systems. In 37th International ACM SIGIR conference on research and development in information retrieval, pp 955–958
Zurück zum Zitat Zhou W, Wen J, Koh YS, Xiong Q, Gao M, Dobbie G, Alam S (2015) Shilling attacks detection in recommender systems based on target item analysis. PLoS ONE 10(7):e0130968CrossRef Zhou W, Wen J, Koh YS, Xiong Q, Gao M, Dobbie G, Alam S (2015) Shilling attacks detection in recommender systems based on target item analysis. PLoS ONE 10(7):e0130968CrossRef
Zurück zum Zitat Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing 210:197–205CrossRef Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing 210:197–205CrossRef
Zurück zum Zitat Ziegler CN, Golbeck J (2015) Models for trust inference in social networks. In: Propagation phenomena in real world networks, pp 53–89 Ziegler CN, Golbeck J (2015) Models for trust inference in social networks. In: Propagation phenomena in real world networks, pp 53–89
Zurück zum Zitat Zou J, Fekri F (2013) A belief propagation approach for detecting shilling attacks in collaborative filtering. In: 22nd ACM international conference on Conference on information and knowledge management, pp 1837–1840 Zou J, Fekri F (2013) A belief propagation approach for detecting shilling attacks in collaborative filtering. In: 22nd ACM international conference on Conference on information and knowledge management, pp 1837–1840
Metadaten
Titel
Shilling attacks against collaborative recommender systems: a review
verfasst von
Mingdan Si
Qingshan Li
Publikationsdatum
19.09.2018
Verlag
Springer Netherlands
Erschienen in
Artificial Intelligence Review / Ausgabe 1/2020
Print ISSN: 0269-2821
Elektronische ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-018-9655-x

Weitere Artikel der Ausgabe 1/2020

Artificial Intelligence Review 1/2020 Zur Ausgabe

Premium Partner