Shilling attacks against recommender systems: a comprehensive survey
暂无分享,去创建一个
Huseyin Polat | Cihan Kaleli | Alper Bilge | Ihsan Gunes | H. Polat | C. Kaleli | Alper Bilge | Ihsan Gunes | Cihan Kaleli
[1] Neil J. Hurley,et al. Collaborative recommendation: A robustness analysis , 2004, TOIT.
[2] Robin Burke,et al. Effectiveness of crawling attacks against web-based recommender systems , 2007, AAAI 2007.
[3] Paul Resnick,et al. The information cost of manipulation-resistance in recommender systems , 2008, RecSys '08.
[4] Fuguo Zhang,et al. Analysis of Bandwagon and Average Hybrid Attack Model against Trust-based Recommender Systems , 2011, 2011 Fifth International Conference on Management of e-Commerce and e-Government.
[5] Neil J. Hurley,et al. Robust Collaborative Recommendation , 2011, Recommender Systems Handbook.
[6] Paul Resnick,et al. The influence limiter: provably manipulation-resistant recommender systems , 2007, RecSys '07.
[7] Lior Rokach,et al. Recommender Systems Handbook , 2010 .
[8] Fuguo Zhang,et al. A Survey of Shilling Attacks in Collaborative Filtering Recommender Systems , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[9] Padraig Cunningham,et al. Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.
[10] Bamshad Mobasher,et al. Profile Injection Attack Detection for Securing Collaborative Recommender Systems 1 , 2006 .
[11] Zheng Chen,et al. Finding group shilling in recommendation system , 2005, WWW '05.
[12] Thomas Hofmann,et al. A Survey of Attack-Resistant Collaborative Filtering Algorithms , 2008, IEEE Data Eng. Bull..
[13] Jonathan L. Herlocker,et al. Evaluating collaborative filtering recommender systems , 2004, TOIS.
[14] Jie Cao,et al. Semi-SAD: applying semi-supervised learning to shilling attack detection , 2011, RecSys '11.
[15] Bamshad Mobasher,et al. Impact of Relevance Measures on the Robustness and Accuracy of Collaborative Filtering , 2007, EC-Web.
[16] Qingyun Long,et al. Robust evaluation of binary collaborative recommendation under profile injection attack , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[17] R. Burke,et al. Limited Knowledge Shilling Attacks in Collaborative Filtering Systems , 2005 .
[18] Robin Burke,et al. Collaborative Recommendation Vulnerability To Focused Bias Injection Attacks , 2005 .
[19] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[20] Fuguo Zhang. Reverse Bandwagon Profile Inject Attack against Recommender Systems , 2009, 2009 Second International Symposium on Computational Intelligence and Design.
[21] Bamshad Mobasher,et al. Crawling Attacks Against Web-based Recommender Systems , 2007, DMIN.
[22] Neil J. Hurley,et al. Recommender Systems: Attack Types and Strategies , 2005, AAAI.
[23] Zunping Cheng,et al. Effective diverse and obfuscated attacks on model-based recommender systems , 2009, RecSys '09.
[24] Qiang Zhang,et al. A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.
[25] Bhaskar Mehta. Unsupervised Shilling Detection for Collaborative Filtering , 2007, AAAI.
[26] Shoshana Loeb,et al. Information filtering , 1992, CACM.
[27] R. Burke,et al. A Clustering Approach to Unsupervised Attack Detection in Collaborative Recommender Systems , 2022 .
[28] Neil J. Hurley,et al. Utility-based neighbourhood formation for efficient and robust collaborative filtering , 2004, EC '04.
[29] Ambuj Mahanti,et al. Strategies for Effective Shilling Attacks against Recommender Systems , 2009, PinKDD.
[30] Zhigang Luo,et al. Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).
[31] Bamshad Mobasher,et al. Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.
[32] Bamshad Mobasher,et al. Detecting Profile Injection Attacks in Collaborative Filtering: A Classification-Based Approach , 2006, WEBKDD.
[33] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[34] Robin Burke,et al. Identifying Attack Models for Secure Recommendation , 2004 .
[35] Shyhtsun Felix Wu,et al. Social Manipulation of Online Recommender Systems , 2010, SocInfo.
[36] Zunping Cheng,et al. Robustness Analysis of Model-Based Collaborative Filtering Systems , 2009, AICS.
[37] Thomas Hofmann,et al. Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.
[38] Zunping Cheng,et al. Analysis of robustness in trust-based recommender systems , 2010, RIAO.
[39] R. Burke,et al. Detection of Obfuscated Attacks in Collaborative Recommender Systems 1 , 2006 .
[40] Fuguo Zhang. Analysis of Segment Shilling Attack Against Trust Based Recommender Systems , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[41] Neil J. Hurley,et al. Towards Robust Collaborative Filtering , 2002, AICS.
[42] Bamshad Mobasher,et al. Detecting Profile Injection Attacks in Collaborative Recommender Systems , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).
[43] Fuguo Zhang. Average Shilling Attack against Trust-Based Recommender Systems , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.
[44] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[45] Thomas Hofmann,et al. Robust collaborative filtering , 2007, RecSys '07.
[46] Paolo Avesani,et al. Trust-aware recommender systems , 2007, RecSys '07.
[47] Paul Resnick,et al. Manipulation-resistant recommender systems through influence limits , 2008, SECO.
[48] Eric Horvitz,et al. Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach , 2000, UAI.
[49] John Riedl,et al. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems , 2006, ETRICS.
[50] Neil J. Hurley,et al. Promoting Recommendations: An Attack on Collaborative Filtering , 2002, DEXA.
[51] Bamshad Mobasher,et al. Evaluating the Impact of Attacks in Collaborative Tagging Environments , 2009, 2009 International Conference on Computational Science and Engineering.
[52] GeunSik Jo,et al. Distributed Collaborative Filtering for Robust Recommendations Against Shilling Attacks , 2007, Canadian Conference on AI.
[53] Michael J. Pazzani,et al. Collaborative Filtering with the Simple Bayesian Classifier , 2000, PRICAI.
[54] Michael J. Pazzani,et al. Improvement of Collaborative Filtering with the Simple Bayesian Classifier 1 , 2002 .
[55] Bhaskar Mehta,et al. Attack resistant collaborative filtering , 2008, SIGIR '08.
[56] Bhaskar Mehta,et al. Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.
[57] Robin Burke,et al. Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .
[58] Ambuj Mahanti,et al. Improving Prediction Accuracy in Trust-Aware Recommender Systems , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[59] Zunping Cheng,et al. Robust Collaborative Recommendation by Least Trimmed Squares Matrix Factorization , 2010, 2010 22nd IEEE International Conference on Tools with Artificial Intelligence.
[60] Douglas B. Terry,et al. Using collaborative filtering to weave an information tapestry , 1992, CACM.
[61] Fillia Makedon,et al. Attack detection in time series for recommender systems , 2006, KDD '06.
[62] Neil J. Hurley,et al. Collaborative Filtering - Safe and Sound? , 2003, ISMIS.
[63] Benjamin Van Roy,et al. Manipulation Robustness of Collaborative Filtering Systems , 2009, ArXiv.
[64] Yan Tang,et al. An effective recommender attack detection method based on time SFM factors , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[65] Ambuj Mahanti,et al. Filler Item Strategies for Shilling Attacks against Recommender Systems , 2009 .
[66] Fillia Makedon,et al. Analysis of a low-dimensional linear model under recommendation attacks , 2006, SIGIR.
[67] Baoxu Liu,et al. Attack Detection by Rough Set Theory in Recommendation System , 2010, 2010 IEEE International Conference on Granular Computing.
[68] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[69] Benjamin Van Roy,et al. Manipulation-resistant collaborative filtering systems , 2009, RecSys '09.
[70] Zhang Fu-guo,et al. Analysis of Trust-Based E-Commerce Recommender Systems Under Recommendation Attacks , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[71] Bamshad Mobasher,et al. Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation , 2005, WEBKDD.
[72] Robin Burke,et al. Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.
[73] Wenliang Du,et al. Privacy-Preserving Collaborative Filtering , 2005, Int. J. Electron. Commer..
[74] 张富国. Preventing Recommendation Attack in Trust-Based Recommender Systems , 2011 .
[75] Bamshad Mobasher,et al. Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.
[76] Robin Burke,et al. The Impact of Attack Profile Classification on the Robustness of Collaborative Recommendation , 2006 .
[77] Barry Smyth,et al. Is trust robust?: an analysis of trust-based recommendation , 2006, IUI '06.
[78] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[79] Neil J. Hurley,et al. Efficient and Secure Collaborative Filtering through Intelligent Neighbour Selection , 2004, ECAI.
[80] David Heckerman,et al. Empirical Analysis of Predictive Algorithms for Collaborative Filtering , 1998, UAI.
[81] Nathan Oostendorp. The Copied Item Injection Attack , 2009 .
[82] John Riedl,et al. Privacy , Shilling , and The Value of Information in Recommender Systems , 2005 .
[83] Benjamin Van Roy,et al. Manipulation Robustness of Collaborative Filtering , 2010, Manag. Sci..
[84] Barry Smyth,et al. Collaborative web search: a robustness analysis , 2007, Artificial Intelligence Review.
[85] Zunping Cheng,et al. Trading Robustness for Privacy in Decentralized Recommender Systems , 2009, IAAI.
[86] Bamshad Mobasher,et al. A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms , 2008, IEEE Data Eng. Bull..
[87] Fuguo Zhang. Analysis of Love-Hate Shilling Attack Against E-commerce Recommender System , 2010, 2010 International Conference of Information Science and Management Engineering.
[88] Neil J. Hurley,et al. Attacking Recommender Systems: A Cost-Benefit Analysis , 2007, IEEE Intelligent Systems.
[89] Bamshad Mobasher,et al. Robustness of collaborative recommendation based on association rule mining , 2007, RecSys '07.
[90] Neil J. Hurley,et al. An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.
[91] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[92] Neil J. Hurley,et al. Detecting noise in recommender system databases , 2006, IUI '06.
[93] Bamshad Mobasher,et al. Segment-based injection attacks against collaborative filtering recommender systems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[94] Bamshad Mobasher,et al. Attacks and Remedies in Collaborative Recommendation , 2007, IEEE Intelligent Systems.