Shilling attack detection in recommender systems via selecting patterns analysis

35Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.

Cite

CITATION STYLE

APA

Li, W., Gao, M., Li, H., Zeng, J., Xiong, Q., & Hirokawa, S. (2016). Shilling attack detection in recommender systems via selecting patterns analysis. In IEICE Transactions on Information and Systems (Vol. E99D, pp. 2600–2611). Maruzen Co., Ltd. https://doi.org/10.1587/transinf.2015EDP7500

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free