Sequential Attack Detection in Recommender Systems
暂无分享,去创建一个
[1] D. Böhning. Multinomial logistic regression algorithm , 1992 .
[2] Zhigang Luo,et al. Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).
[3] Lior Rokach,et al. Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.
[4] Jieping Ye,et al. A Small Sphere and Large Margin Approach for Novelty Detection Using Training Data with Outliers , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Yehuda Koren,et al. Matrix Factorization Techniques for Recommender Systems , 2009, Computer.
[6] Qingshan Li,et al. Shilling attacks against collaborative recommender systems: a review , 2018, Artificial Intelligence Review.
[7] Neil J. Hurley,et al. An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.
[8] Robin Burke,et al. Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .
[9] David C. Wilson,et al. When power users attack: assessing impacts in collaborative recommender systems , 2013, RecSys.
[10] Zunping Cheng,et al. Effective diverse and obfuscated attacks on model-based recommender systems , 2009, RecSys '09.
[11] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[12] Charu C. Aggarwal,et al. Recommender Systems: The Textbook , 2016 .
[13] Geoffrey E. Hinton,et al. The EM algorithm for mixtures of factor analyzers , 1996 .
[14] Tapani Raiko,et al. Tkk Reports in Information and Computer Science Practical Approaches to Principal Component Analysis in the Presence of Missing Values Tkk Reports in Information and Computer Science Practical Approaches to Principal Component Analysis in the Presence of Missing Values , 2022 .
[15] Ismail Uysal,et al. A probabilistic framework to incorporate mixed-data type features: Matrix factorization with multimodal side information , 2019, Neurocomputing.
[16] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[17] Robin Burke,et al. Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.
[18] Sanjeev R. Kulkarni,et al. Detection of shilling attacks in recommender systems via spectral clustering , 2014, 17th International Conference on Information Fusion (FUSION).
[19] Robin Burke,et al. Identifying Attack Models for Secure Recommendation , 2004 .
[20] Alfred O. Hero,et al. Multimodal Event Detection in Twitter Hashtag Networks , 2016, Journal of Signal Processing Systems.
[21] Christopher C. Johnson. Logistic Matrix Factorization for Implicit Feedback Data , 2014 .
[22] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[23] Bhaskar Mehta,et al. Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.
[24] Bamshad Mobasher,et al. Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.
[25] Zhongmin Cai,et al. Estimating user behavior toward detecting anomalous ratings in rating systems , 2016, Knowl. Based Syst..
[26] Xiaodong Wang,et al. Quickest Attack Detection in Multi-Agent Reputation Systems , 2014, IEEE Journal of Selected Topics in Signal Processing.
[27] John Riedl,et al. Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach , 2005, SDM.
[28] M. Baker. Statisticians issue warning over misuse of P values , 2016, Nature.
[29] Bin Fang,et al. A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique , 2015, Inf. Sci..
[30] David A. Clifton,et al. A review of novelty detection , 2014, Signal Process..
[31] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[32] Yuhong Liu,et al. Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.
[33] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[34] Ruslan Salakhutdinov,et al. Probabilistic Matrix Factorization , 2007, NIPS.
[35] David M. Blei,et al. Bayesian Nonparametric Poisson Factorization for Recommendation Systems , 2014, AISTATS.
[36] Zongben Xu,et al. Re-scale AdaBoost for attack detection in collaborative filtering recommender systems , 2015, Knowl. Based Syst..
[37] Ismail Uysal,et al. Quick and accurate attack detection in recommender systems through user attributes , 2019, RecSys.
[38] Hao Chen,et al. Sequential change-point detection based on nearest neighbors , 2016, The Annals of Statistics.
[39] Martha Larson,et al. Collaborative Filtering beyond the User-Item Matrix , 2014, ACM Comput. Surv..
[40] Padraig Cunningham,et al. Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.
[41] Peng Zhang,et al. UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering , 2018, Knowl. Based Syst..
[42] Yan Tang,et al. An effective recommender attack detection method based on time SFM factors , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[43] Michael I. Jordan,et al. Graphical Models, Exponential Families, and Variational Inference , 2008, Found. Trends Mach. Learn..
[44] Sanjeev R. Kulkarni,et al. Graph-based detection of shilling attacks in recommender systems , 2013, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP).
[45] Gunnar Rätsch,et al. Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[46] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[47] Konstantina Christakopoulou,et al. Adversarial attacks on an oblivious recommender , 2019, RecSys.
[48] Mohammad Emtiyaz Khan,et al. Variational bounds for mixed-data factor analysis , 2010, NIPS.
[49] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.