Attack-Resistant Recommender Systems

The input to recommender systems is typically provided through open platforms. Almost anyone can register and submit a review at sites such as Amazon.com and Epinions.com. Like any other data-mining system, the effectiveness of a recommender system depends almost exclusively on the quality of the data available to it. Unfortunately, there are significant motivations for participants to submit incorrect feedback about items for personal gain or for malicious reasons:

[1]  Robin Burke,et al.  Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.

[2]  Bamshad Mobasher,et al.  Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.

[3]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[4]  Nava Tintarev,et al.  Rate it again: increasing recommendation accuracy by user re-rating , 2009, RecSys '09.

[5]  Thomas Hofmann,et al.  Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.

[6]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[7]  Paul Resnick,et al.  The influence limiter: provably manipulation-resistant recommender systems , 2007, RecSys '07.

[8]  Peter J. Rousseeuw,et al.  Robust regression and outlier detection , 1987 .

[9]  Zheng Chen,et al.  Finding group shilling in recommendation system , 2005, WWW '05.

[10]  Neil J. Hurley,et al.  Promoting Recommendations: An Attack on Collaborative Filtering , 2002, DEXA.

[11]  Bhaskar Mehta,et al.  Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.

[12]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[13]  Bamshad Mobasher,et al.  Robustness of collaborative recommendation based on association rule mining , 2007, RecSys '07.

[14]  Neil J. Hurley,et al.  An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.

[15]  Bamshad Mobasher,et al.  Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.

[16]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[17]  Padraig Cunningham,et al.  Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.

[18]  Thomas Hofmann,et al.  A Survey of Attack-Resistant Collaborative Filtering Algorithms , 2008, IEEE Data Eng. Bull..

[19]  John Riedl,et al.  Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach , 2005, SDM.

[20]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[21]  I. Jolliffe Principal Component Analysis , 2002 .

[22]  Bhaskar Mehta,et al.  Attack resistant collaborative filtering , 2008, SIGIR '08.

[23]  Thomas Hofmann,et al.  Robust collaborative filtering , 2007, RecSys '07.

[24]  Fillia Makedon,et al.  Attack detection in time series for recommender systems , 2006, KDD '06.

[25]  Victor Vianu,et al.  Invited articles section foreword , 2010, JACM.

[26]  Benjamin Van Roy,et al.  Manipulation-resistant collaborative filtering systems , 2009, RecSys '09.

[27]  Benjamin Van Roy,et al.  Manipulation Robustness of Collaborative Filtering Systems , 2009, ArXiv.

[28]  Jonathan L. Herlocker,et al.  Evaluating collaborative filtering recommender systems , 2004, TOIS.

[29]  Bamshad Mobasher,et al.  Crawling Attacks Against Web-based Recommender Systems , 2007, DMIN.

[30]  Neil J. Hurley,et al.  Robust Collaborative Recommendation , 2011, Recommender Systems Handbook.

[31]  Paul Resnick,et al.  The information cost of manipulation-resistance in recommender systems , 2008, RecSys '08.

[32]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[33]  Bamshad Mobasher,et al.  A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms , 2008, IEEE Data Eng. Bull..

[34]  Neil J. Hurley,et al.  Recommender Systems: Attack Types and Strategies , 2005, AAAI.

[35]  Huseyin Polat,et al.  Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.

[36]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.