Identifying attack models for securing cluster-based recommendation system

被引:0
|
作者
Ahmad A. [1 ]
Ahmad T. [1 ]
Tripathi I. [1 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
来源
Recent Patents on Engineering | 2020年 / 14卷 / 03期
关键词
Attack models; Collaborative filtering; Game theory; Recommendation system; Security; Shapley value;
D O I
10.2174/1872212114666200403091053
中图分类号
学科分类号
摘要
The immense growth of information has led to the wide usage of recommender systems for retrieving relevant information. One of the widely used methods for recommendation is collaborative filtering. However, such methods suffer from two problems, scalability and sparsity. In the proposed research, the two issues of collaborative filtering are addressed and a cluster-based recommender system is proposed. For the identification of potential clusters from the underlying network, the Shapley value concept is used, which divides users into different clusters. After that, the recommendation algorithm is performed in every respective cluster. The proposed system recommends an item to a specific user based on the ratings of the item’s different attributes. Thus, it reduces the running time of the overall algorithm, since it avoids the overhead of computation involved when the algorithm is executed over the entire dataset. Besides, the security of the recommender system is one of the major concerns nowadays. Attackers can come in the form of ordinary users and introduce bias in the system to force the system function that is advantageous for them. In this paper, we identify different attack models that could hamper the security of the proposed cluster-based recommender system. The efficiency of the proposed research is validated by conducting experiments on student dataset. © 2020 Bentham Science Publishers.
引用
收藏
页码:324 / 338
页数:14
相关论文
共 50 条
  • [31] Building cluster-based regional innovation system in China
    Gong Zhigang
    Yuan Meisheng
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PROCEEDINGS, 2006, : 107 - 115
  • [32] High-Dimensional Inference for Cluster-Based Graphical Models
    Eisenach, Carson
    Bunea, Florentina
    Ning, Yang
    Dinicu, Claudiu
    JOURNAL OF MACHINE LEARNING RESEARCH, 2020, 21
  • [33] PeerCluster: A cluster-based peer-to-peer system
    Huang, Xin-Mao
    Chang, Cheng-Yue
    Chen, Ming-Syan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (10) : 1110 - 1123
  • [34] Queuing network modeling of a cluster-based parallel system
    Javadi, B
    Khorsandi, S
    Akbari, MK
    SEVENTH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND GRID IN ASIA PACIFIC REGION, PROCEEDINGS, 2004, : 304 - 307
  • [35] The Cluster-Based Time-Aware Web System
    Zatwarnicki, Krzysztof
    Zatwarnicka, Anna
    COMPUTER NETWORKS, CN 2014, 2014, 431 : 37 - 46
  • [36] Adaptive Request Distribution in Cluster-Based Web System
    Zatwarnicki, Krzysztof
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT I: 15TH INTERNATIONAL CONFERENCE, KES 2011, 2011, 6881 : 42 - 51
  • [37] A Bidirectional Ring Cluster-based Peer to Peer System
    Liu, Naiwen
    Liu, Fang'ai
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 568 - 571
  • [38] Cluster-Based Boosting
    Miller, L. Dee
    Soh, Leen-Kiat
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (06) : 1491 - 1504
  • [39] Cluster-based selection
    Dunbar, JB
    PERSPECTIVES IN DRUG DISCOVERY AND DESIGN, 1997, 7-8 : 51 - 63
  • [40] Cluster-Based Destination Prediction in Bike Sharing System
    Dai, Pengcheng
    Song, Changxiong
    Lin, Huiping
    Jia, Pei
    Xu, Zhipeng
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 1 - 8