Shilling attack detection in recommender systems via selecting patterns analysis
- Publisher:
- IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
- Publication Type:
- Journal Article
- Citation:
- IEICE Transactions on Information and Systems, 2016, E99D, (10), pp. 2600-2611
- Issue Date:
- 2016
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
E99.D_2015EDP7500.pdf | Published version | 1.82 MB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.
Please use this identifier to cite or link to this item: