Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems
暂无分享,去创建一个
[1] Christos Faloutsos,et al. Robust multivariate autoregression for anomaly detection in dynamic product ratings , 2014, WWW.
[2] Bamshad Mobasher,et al. Detecting Profile Injection Attacks in Collaborative Filtering: A Classification-Based Approach , 2006, WEBKDD.
[3] Baoxu Liu,et al. Attack Detection by Rough Set Theory in Recommendation System , 2010, 2010 IEEE International Conference on Granular Computing.
[4] Xiangliang Zhang,et al. Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering , 2013, Journal of Computer Science and Technology.
[5] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[6] Lu Yu,et al. TIIREC: A tensor approach for tag-driven item recommendation with sparse user generated content , 2017, Inf. Sci..
[7] Bhaskar Mehta. Unsupervised Shilling Detection for Collaborative Filtering , 2007, AAAI.
[8] R. Gray,et al. Language-tree divergence times support the Anatolian theory of Indo-European origin , 2003, Nature.
[9] Fuzhi Zhang,et al. HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems , 2014, Knowl. Based Syst..
[10] Zhigang Luo,et al. Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).
[11] Gillian Dobbie,et al. Detection of abnormal profiles on group attacks in recommender systems , 2014, SIGIR.
[12] Bamshad Mobasher,et al. Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.
[13] Jun Zhu,et al. Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction , 2012, 2014 IEEE International Conference on Data Mining.
[14] Mehdi Shajari,et al. Defending recommender systems by influence analysis , 2013, Information Retrieval.
[15] Carlos E. Seminario,et al. Accuracy and robustness impacts of power user attacks on collaborative recommender systems , 2013, RecSys.
[16] Jong-Seok Lee,et al. Shilling Attack Detection - A New Approach for a Trustworthy Recommender System , 2012, INFORMS J. Comput..
[17] Fillia Makedon,et al. Attack detection in time series for recommender systems , 2006, KDD '06.
[18] Bin Fang,et al. A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique , 2015, Inf. Sci..
[19] Sheng Huang,et al. A Hybrid Decision Approach to Detect Profile Injection Attacks in Collaborative Recommender Systems , 2012, ISMIS.
[20] Bamshad Mobasher,et al. Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation , 2005, WEBKDD.
[21] Gillian Dobbie,et al. Attack detection in recommender systems based on target item analysis , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).
[22] Chengqi Zhang,et al. Noisy but non-malicious user detection in social recommender systems , 2012, World Wide Web.
[23] Huseyin Polat,et al. Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.
[24] Sanjeev R. Kulkarni,et al. Graph-based detection of shilling attacks in recommender systems , 2013, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP).
[25] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[26] Thomas Hofmann,et al. Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.
[27] David C. Wilson,et al. Attacking item-based recommender systems with power items , 2014, RecSys '14.
[28] David C. Wilson,et al. Assessing Impacts of a Power User Attack on a Matrix Factorization Collaborative Recommender System , 2014, FLAIRS.
[29] Huseyin Polat,et al. A Novel Shilling Attack Detection Method , 2014, ITQM.
[30] Sanjeev R. Kulkarni,et al. Detection of shilling attacks in recommender systems via spectral clustering , 2014, 17th International Conference on Information Fusion (FUSION).
[31] Junhao Wen,et al. SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems , 2016, Neurocomputing.
[32] Gillian Dobbie,et al. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis , 2015, PloS one.
[33] Anton van den Hengel,et al. Image-Based Recommendations on Styles and Substitutes , 2015, SIGIR.
[34] Jie Cao,et al. A comparative study of shilling attack detectors for recommender systems , 2015, 2015 12th International Conference on Service Systems and Service Management (ICSSSM).
[35] Christos Faloutsos,et al. Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution , 2014, KDD.
[36] W. Cleveland,et al. Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .
[37] Bo Zhang,et al. Fast Max-Margin Matrix Factorization with Data Augmentation , 2013, ICML.
[38] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[39] Bamshad Mobasher,et al. Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.
[40] Zheng Chen,et al. Finding group shilling in recommendation system , 2005, WWW '05.
[41] Yiqun Liu,et al. Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation , 2015, IJCAI.
[42] Yanchun Zhang,et al. Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system , 2013, World Wide Web.
[43] Jun Zhu,et al. Discriminative infinite latent feature models , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[44] Chong-kwon Kim,et al. PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems , 2014, Inf. Sci..
[45] Rob J Hyndman,et al. A state space framework for automatic forecasting using exponential smoothing methods , 2002 .
[46] Shih-Hsiang Huang,et al. βPβP: A novel approach to filter out malicious rating profiles from recommender systems , 2013, Decis. Support Syst..
[47] Jie Cao,et al. A survey on shilling attack models and detection techniques for recommender systems , 2014 .
[48] Bhaskar Mehta,et al. Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.
[49] Jure Leskovec,et al. Inferring Networks of Substitutable and Complementary Products , 2015, KDD.
[50] Richard S. Zemel,et al. The multiple multiplicative factor model for collaborative filtering , 2004, ICML.
[51] Padraig Cunningham,et al. Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.
[52] Chuang Liu,et al. Multi-linear interactive matrix factorization , 2014, Knowl. Based Syst..
[53] Junjie Wu,et al. HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation , 2012, KDD.
[54] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[55] David C. Wilson,et al. Evil Twins: Modeling Power Users in Attacks on Recommender Systems , 2014, UMAP.
[56] Petar M. Djuric,et al. An MCMC sampling approach to estimation of nonstationary hidden Markov models , 2002, IEEE Trans. Signal Process..
[57] Fuzhi Zhang,et al. A Meta-learning-based Approach for Detecting Profile Injection Attacks in Collaborative Recommender Systems , 2012, J. Comput..
[58] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[59] David C. Wilson,et al. Mitigating Power User Attacks on a User-Based Collaborative Recommender System , 2015, FLAIRS.