Shilling Attack Detection in Recommender Systems

[1]  Junjie Wu,et al.  HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation , 2012, KDD.

[2]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[3]  Jong-Seok Lee,et al.  Shilling Attack Detection - A New Approach for a Trustworthy Recommender System , 2012, INFORMS J. Comput..

[4]  George Karypis,et al.  Evaluation of Item-Based Top-N Recommendation Algorithms , 2001, CIKM '01.

[5]  Fuguo Zhang,et al.  Analysis of Bandwagon and Average Hybrid Attack Model against Trust-based Recommender Systems , 2011, 2011 Fifth International Conference on Management of e-Commerce and e-Government.

[6]  Prashant Singh Rana,et al.  Ensemble approach to detect profile injection attack in recommender system , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  Neil J. Hurley,et al.  Collaborative recommendation: A robustness analysis , 2004, TOIT.

[8]  Bamshad Mobasher,et al.  Segment-based injection attacks against collaborative filtering recommender systems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[9]  John Riedl,et al.  An Algorithmic Framework for Performing Collaborative Filtering , 1999, SIGIR Forum.

[10]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[11]  John Riedl,et al.  Collaborative Filtering Recommender Systems , 2011, Found. Trends Hum. Comput. Interact..

[12]  Linda Yang,et al.  A Robust Collaborative Filtering Approach Based on User Relationships for Recommendation Systems , 2014 .

[13]  Barry Smyth,et al.  Trust in recommender systems , 2005, IUI.

[14]  T. Zuva,et al.  A Survey of Recommender Systems Techniques, Challenges and Evaluation Metrics , 2012 .

[15]  Fuzhi Zhang,et al.  Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network , 2015, IET Inf. Secur..

[16]  Fuguo Zhang Average Shilling Attack against Trust-Based Recommender Systems , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.

[17]  Bamshad Mobasher,et al.  Profile Injection Attack Detection for Securing Collaborative Recommender Systems 1 , 2006 .

[18]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[19]  Fuzhi Zhang,et al.  A Meta-learning-based Approach for Detecting Profile Injection Attacks in Collaborative Recommender Systems , 2012, J. Comput..

[20]  Francesco Ricci,et al.  Travel Recommender Systems , 2002 .

[21]  Neil J. Hurley,et al.  Recommender Systems: Attack Types and Strategies , 2005, AAAI.

[22]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[23]  Bamshad Mobasher,et al.  Attacks and Remedies in Collaborative Recommendation , 2007, IEEE Intelligent Systems.

[24]  Paolo Avesani,et al.  Trust-aware recommender systems , 2007, RecSys '07.

[25]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[26]  Raksha Chauhan,et al.  An Accuracy Improvement of Detection of Profile-Injection Attacks in Recommender Systems using Outlier Analysis , 2015 .

[27]  Gillian Dobbie,et al.  Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis , 2015, PloS one.

[28]  Bamshad Mobasher,et al.  Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.