Noisy but non-malicious user detection in social recommender systems

Social recommender systems largely rely on user-contributed data to infer users’ preference. While this feature has enabled many interesting applications in social networking services, it also introduces unreliability to recommenders as users are allowed to insert data freely. Although detecting malicious attacks from social spammers has been studied for years, little work was done for detecting Noisy but Non-Malicious Users (NNMUs), which refers to those genuine users who may provide some untruthful data due to their imperfect behaviors. Unlike colluded malicious attacks that can be detected by finding similarly-behaved user profiles, NNMUs are more difficult to identify since their profiles are neither similar nor correlated from one another. In this article, we study how to detect NNMUs in social recommender systems. Based on the assumption that the ratings provided by a same user on closely correlated items should have similar scores, we propose an effective method for NNMU detection by capturing and accumulating user’s “self-contradictions”, i.e., the cases that a user provides very different rating scores on closely correlated items. We show that self-contradiction capturing can be formulated as a constrained quadratic optimization problem w.r.t. a set of slack variables, which can be further used to quantify the underlying noise in each test user profile. We adopt three real-world data sets to empirically test the proposed method. The experimental results show that our method (i) is effective in real-world NNMU detection scenarios, (ii) can significantly outperform other noisy-user detection methods, and (iii) can improve recommendation performance for other users after removing detected NNMUs from the recommender system.

[1]  Bhaskar Mehta,et al.  Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.

[2]  I. Berlin I like it. , 1921 .

[3]  Bin Li,et al.  Cross-Domain Collaborative Filtering: A Brief Survey , 2011, 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence.

[4]  Bamshad Mobasher,et al.  Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.

[5]  Neil J. Hurley,et al.  Detecting noise in recommender system databases , 2006, IUI '06.

[6]  Bing Liu,et al.  Review spam detection , 2007, WWW '07.

[7]  Zunping Cheng,et al.  Statistical attack detection , 2009, RecSys '09.

[8]  Thomas Hofmann,et al.  Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.

[9]  Athman Bouguettaya,et al.  Rater Credibility Assessment in Web Services Interactions , 2009, World Wide Web.

[10]  John Riedl,et al.  GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.

[11]  Xiaoyong Du,et al.  Finding superior skyline points for multidimensional recommendation applications , 2011, World Wide Web.

[12]  Garcia-MolinaHector,et al.  Combating spam in tagging systems , 2008 .

[13]  Bhaskar Mehta Unsupervised Shilling Detection for Collaborative Filtering , 2007, AAAI.

[14]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[15]  Virgílio A. F. Almeida,et al.  Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.

[16]  Peter G. Doyle,et al.  Random Walks and Electric Networks: REFERENCES , 1987 .

[17]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[18]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[19]  Gerard Salton,et al.  Research and Development in Information Retrieval , 1982, Lecture Notes in Computer Science.

[20]  Neil J. Hurley,et al.  Collaborative recommendation: A robustness analysis , 2004, TOIT.

[21]  Georgia Koutrika,et al.  Combating spam in tagging systems , 2007, AIRWeb '07.

[22]  Neil J. Hurley Robustness of recommender systems , 2011, RecSys '11.

[23]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[24]  Nuria Oliver,et al.  I Like It... I Like It Not: Evaluating User Ratings Noise in Recommender Systems , 2009, UMAP.

[25]  Ee-Peng Lim,et al.  Detecting product review spammers using rating behaviors , 2010, CIKM.

[26]  Neil J. Hurley,et al.  Recommender Systems: Attack Types and Strategies , 2005, AAAI.

[27]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[28]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[29]  Kevin Borders,et al.  Social networks and context-aware spam , 2008, CSCW.

[30]  Xiaojin Zhu,et al.  --1 CONTENTS , 2006 .

[31]  David Carmel,et al.  Social recommender systems , 2011, Recommender Systems Handbook.

[32]  Qiang Yang,et al.  Can Movies and Books Collaborate? Cross-Domain Collaborative Filtering for Sparsity Reduction , 2009, IJCAI.