Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing ...
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce reco...
Collaborative filtering (CF) technique is capable of generating personalized recommendations. Howeve...
Shilling attackers apply biased rating profiles to recommender systems for manipulating online produ...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized re...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
Collaborative filtering has been widely used in recommendation systems to recommend items that users...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Collaborative filtering recommenders are highly vulner-able to malicious attacks designed to affect ...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
With the rapid development of e-business, personalized recommendation has become core competence for...
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce reco...
Collaborative filtering (CF) technique is capable of generating personalized recommendations. Howeve...
Shilling attackers apply biased rating profiles to recommender systems for manipulating online produ...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as ...
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized re...
The stability and reliability of filtration and recommender systems are crucial for continuous opera...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
Collaborative filtering has been widely used in recommendation systems to recommend items that users...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Collaborative filtering recommenders are highly vulner-able to malicious attacks designed to affect ...
The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in ...
With the rapid development of e-business, personalized recommendation has become core competence for...
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce reco...
Collaborative filtering (CF) technique is capable of generating personalized recommendations. Howeve...
Shilling attackers apply biased rating profiles to recommender systems for manipulating online produ...