A Comparative Study on Shilling Detection Methods for Trustworthy Recommendations

被引:10
|
作者
Wang, Youquan [1 ,2 ]
Qian, Liqiang [3 ]
Li, Fanzhang [3 ]
Zhang, Lu [2 ]
机构
[1] Nanjing Univ Sci & Technol, Coll Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Sch Informat Engn, Nanjing 210003, Jiangsu, Peoples R China
[3] Soochow Univ, Coll Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
中国国家自然科学基金;
关键词
Recommender system; shilling attack detection; supervised classification; unsupervised clustering; statistical analysis methods;
D O I
10.1007/s11518-018-5374-8
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far, and they exhibit complementary advantage and disadvantage towards various types of attackers. In this paper, we provide a thorough experimental comparison of several well-known detectors, including supervised C4.5 and NB, unsupervised PCA and MDS, semi-supervised HySAD methods, as well as statistical analysis methods. MovieLens 100K is the most widely-used dataset in the realm of shilling attack detection, and thus it is selected as the benchmark dataset. Meanwhile, seven types of shilling attacks generated by average-filling and random-filling model are compared in our experiments. As a result of our analysis, we show clearly causes and essential characteristics insider attackers that might determine the success or failure of different kinds of detectors.
引用
收藏
页码:458 / 478
页数:21
相关论文
共 50 条
  • [1] A Comparative Study on Shilling Detection Methods for Trustworthy Recommendations
    Youquan Wang
    Liqiang Qian
    Fanzhang Li
    Lu Zhang
    Journal of Systems Science and Systems Engineering, 2018, 27 : 458 - 478
  • [2] Shilling Attack Detection-A New Approach for a Trustworthy Recommender System
    Lee, Jong-Seok
    Zhu, Dan
    INFORMS JOURNAL ON COMPUTING, 2012, 24 (01) : 117 - 131
  • [3] Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender System
    Zayed, Reda A.
    Ibrahim, Lamiaa Fattouh
    Hefny, Hesham A.
    Salman, Hesham A.
    AlMohimeed, Abdulaziz
    IEEE ACCESS, 2023, 11 : 79358 - 79369
  • [4] A Comparative Study of Shilling Attack Detectors for Recommender Systems
    Wang, Youquan
    Zhang, Lu
    Tao, Haicheng
    Wu, Zhiang
    Cao, Jie
    2015 12TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2015,
  • [5] Comparative Study of Filtering Methods for Scientific Research Article Recommendations
    El Alaoui, Driss
    Riffi, Jamal
    Sabri, Abdelouahed
    Aghoutane, Badraddine
    Yahyaouy, Ali
    Tairi, Hamid
    BIG DATA AND COGNITIVE COMPUTING, 2024, 8 (12)
  • [6] A comparative study of different corner detection methods
    Liu, JunJie
    Jakas, Anthony
    Al-Obaidi, Ala
    Liu, Yonghuai
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN ROBOTICS AND AUTOMATION, 2009, : 509 - +
  • [7] A Comparative Study of Various Edge Detection Methods
    Yousaf, Rehan Mehmood
    Habib, Hafiz Adnan
    Dawood, Hussain
    Shafiq, Sidra
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 96 - 99
  • [8] Comparative study of singing voice detection methods
    You, Shingchern D.
    Wu, Yi-Chung
    Peng, Shih-Hsien
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 15509 - 15524
  • [9] Comparative study of singing voice detection methods
    Shingchern D. You
    Yi-Chung Wu
    Shih-Hsien Peng
    Multimedia Tools and Applications, 2016, 75 : 15509 - 15524
  • [10] A comparative study of methods for adapter dimer detection
    Graf, Eva
    Pike, Whitney
    EUROPEAN JOURNAL OF HUMAN GENETICS, 2024, 32 : 1152 - 1153