Unsupervised retrieval of attack profiles in collaborative recommender systems

70Citations
Citations of this article
67Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trust, reputation and recommendation are key components of successful e-commerce systems. However, e-commerce systems are also vulnerable in this respect because there are opportunities for sellers to gain advantage through manipulation of reputation and recommendation. One such vulnerability is the use of fraudulent user profiles to boost (or damage) the ratings of items in an online recommender system. In this paper we cast this problem as a problem of detecting anomalous structure in network analysis and propose a novel mechanism for detecting this anomalous structure. We present an evaluation that shows that this approach is effective at uncovering the types of recommender systems attack described in the literature. © 2008 ACM.

Author supplied keywords

Cite

CITATION STYLE

APA

Bryan, K., O’Mahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In RecSys’08: Proceedings of the 2008 ACM Conference on Recommender Systems (pp. 155–162). Association for Computing Machinery (ACM). https://doi.org/10.1145/1454008.1454034

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free