Exploiting trust and suspicion for real-time attack recognition in recommender applications

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As is widely practiced in real world societies, fraud and deception are also ubiquitous in the virtual world. Tracking and detecting such malicious activities in the cyber space is much more challenging due to veiled identities and imperfect knowledge of the environment. Recommender systems are one of the most attractive applications widely used for helping users find their interests from a wide range of interesting choices that makes them highly vulnerable to malicious attacks. In this paper we propose a three dimensional trust based filtering model that detects noise and attacks on recommender systems through calculating three major factors: Importance, Frequency, and Quality. The results obtained from our experiments show that the proposed approach is capable of correctly detecting noise and attack and is hence able to decrease the absolute error of the predicted item rating value. © 2007 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Bagheri, E., & Ghorbani, A. A. (2007). Exploiting trust and suspicion for real-time attack recognition in recommender applications. In IFIP International Federation for Information Processing (Vol. 238, pp. 239–254). https://doi.org/10.1007/978-0-387-73655-6_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free