The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in the recommender system, is considered. The purpose of such attacks is to include in the recommended list of items the goods specified by the attacking user. The recommendations obtained as a result of the attack will not correspond to customers' real preferences, which can lead to distrust of the recommender system and a drop in sales. The existing methods for detecting shilling attacks use explicit feedback from the user and are focused primarily on building patterns that describe the key characteristics of the attack. However, such patterns only partially take into account the dynamics of user interests. A method for detecting shilling atta...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such a...
The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such a...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attac...
Recommender systems have emerged in the past several years as an effective way to help people cope w...
With the rapid development of e-business, personalized recommendation has become core competence for...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized re...
Collaborative filtering has been widely used in recommendation systems to recommend items that users...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such a...
The problem of shilling attacks detecting in e-commerce systems is considered. The purpose of such a...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attac...
Recommender systems have emerged in the past several years as an effective way to help people cope w...
With the rapid development of e-business, personalized recommendation has become core competence for...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized re...
Collaborative filtering has been widely used in recommendation systems to recommend items that users...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems play an essential role in our digital society as they suggest products to purcha...