Statistical attack detection
暂无分享,去创建一个
[1] Neil J. Hurley,et al. An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.
[2] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[3] John F. Canny,et al. Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.
[4] Bamshad Mobasher,et al. Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.
[5] Padraig Cunningham,et al. Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.
[6] R. Burke,et al. Detection of Obfuscated Attacks in Collaborative Recommender Systems 1 , 2006 .
[7] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[8] Neil J. Hurley,et al. Promoting Recommendations: An Attack on Collaborative Filtering , 2002, DEXA.
[9] Bhaskar Mehta,et al. Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.
[10] Paul Resnick,et al. The influence limiter: provably manipulation-resistant recommender systems , 2007, RecSys '07.
[11] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[12] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[13] Bamshad Mobasher,et al. Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.
[14] Thomas Hofmann,et al. Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.
[15] George Karypis,et al. Multilevel k-way Partitioning Scheme for Irregular Graphs , 1998, J. Parallel Distributed Comput..
[16] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[17] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .