Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on th...
Abstract—“Shilling ” attacks or “profile injection ” attacks have always major challenges in collabo...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attac...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
Recommender systems have emerged in the past several years as an effective way to help people cope w...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Collaborative filtering (CF) technique is capable of generating personalized recommendations. Howeve...
Faced with the evolving attacks in collaborative recommender systems, the conventional shilling dete...
Shilling attackers apply biased rating profiles to recommender systems for manipulating online produ...
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce reco...
Collaborative Filtering (CF) is a popular recommendation system that makes recommendations based on ...
Abstract—“Shilling ” attacks or “profile injection ” attacks have always major challenges in collabo...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attac...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
Recommender systems have emerged in the past several years as an effective way to help people cope w...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Collaborative filtering (CF) technique is capable of generating personalized recommendations. Howeve...
Faced with the evolving attacks in collaborative recommender systems, the conventional shilling dete...
Shilling attackers apply biased rating profiles to recommender systems for manipulating online produ...
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce reco...
Collaborative Filtering (CF) is a popular recommendation system that makes recommendations based on ...
Abstract—“Shilling ” attacks or “profile injection ” attacks have always major challenges in collabo...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...