|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
Wentao LI Min GAO Hua LI Jun ZENG Qingyu XIONG Sachio HIROKAWA
Publication
IEICE TRANSACTIONS on Information and Systems
Vol.E99-D
No.10
pp.2600-2611 Publication Date: 2016/10/01 Publicized: 2016/06/27 Online ISSN: 1745-1361
DOI: 10.1587/transinf.2015EDP7500 Type of Manuscript: PAPER Category: Artificial Intelligence, Data Mining Keyword: feature extraction, popularity, selecting patterns, recommender systems, shilling attacks,
Full Text: PDF(1.8MB)>>
Summary:
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.
|
open access publishing via
|
|
|
|
|
|
|
|