메뉴 건너뛰기




Volumn 24, Issue 1, 2012, Pages 117-131

Shilling attack detection - A new approach for a trustworthy recommender system

Author keywords

Clustering; Multidimensional scaling; Recommender systems; Shilling attacks

Indexed keywords

ANALYSIS OF VARIOUS; ATTACK DETECTION; CLUSTERING; EMPIRICAL EVIDENCE; EXPERIMENTAL STUDIES; MULTI-DIMENSIONAL SCALING; POTENTIAL CUSTOMERS; SHILLING ATTACKS; SMALL DATA;

EID: 84862019479     PISSN: 10919856     EISSN: 15265528     Source Type: Journal    
DOI: 10.1287/ijoc.1100.0440     Document Type: Article
Times cited : (86)

References (28)
  • 2
    • 0002276495 scopus 로고
    • Effects of group pressure upon the modification and distortion of judgments
    • H. Guetzkow, ed, Carnegie Press, Pittsburgh
    • Asch, S. E. 1951. Effects of group pressure upon the modification and distortion of judgments. H. Guetzkow, ed. Groups, Leadership, and Men: Research in Human Relations. Carnegie Press, Pittsburgh, 177-190.
    • (1951) Groups, Leadership, and Men: Research in Human Relations , pp. 177-190
    • Asch, S.E.1
  • 3
    • 16344369007 scopus 로고    scopus 로고
    • Clustering of gene expression data using a local shape-based similarity measure
    • DOI 10.1093/bioinformatics/bti095
    • Balasubramaniyan, R., E. Hullermeier, N. Weskamp, J. Kamper. 2005. Clustering of gene expression data using a local shapebased similarity measure. Bioinformatics 21 (7) 1069-1077. (Pubitemid 40467930)
    • (2005) Bioinformatics , vol.21 , Issue.7 , pp. 1069-1077
    • Balasubramaniyan, R.1    Hullermeier, E.2    Weskamp, N.3    Kamper, J.4
  • 5
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • USENIX Association, Berkeley, CA
    • Brutlag, J. D. 2000. Aberrant behavior detection in time series for network monitoring. Proc. 14th USENIX Conf. System Admin., USENIX Association, Berkeley, CA, 139-146.
    • (2000) Proc. 14th USENIX Conf. System Admin. , pp. 139-146
    • Brutlag, J.D.1
  • 9
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
    • ACM, New York, 150-157
    • Dellarocas, C. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. Proc. 2nd ACM Conf. Electronic Commerce, ACM, New York, 150-157.
    • (2000) Proc. 2nd ACM Conf. Electronic Commerce
    • Dellarocas, C.1
  • 13
    • 0001509519 scopus 로고    scopus 로고
    • Probabilistic latent semantic analysis
    • K. B. Laskey H. Prade, eds, Morgan Kaufmann, San Francisco
    • Hofmann, T. 1999. Probabilistic latent semantic analysis. K. B. Laskey, H. Prade, eds. Proc. 15th Conf. Uncertainty Artificial Intelligence, Morgan Kaufmann, San Francisco, 289-296.
    • (1999) Proc. 15th Conf. Uncertainty Artificial Intelligence , pp. 289-296
    • Hofmann, T.1
  • 14
    • 38549175723 scopus 로고    scopus 로고
    • Analyzing consumer-product graphs: Empirical findings and applications in recommender systems
    • DOI 10.1287/mnsc.1060.0619
    • Huang, Z., D. D. Zeng, H. Chen. 2007. Analyzing consumerproduct graphs: Empirical findings and applications in recommender systems. Management Sci. 53 (7) 1146-1164. (Pubitemid 351159617)
    • (2007) Management Science , vol.53 , Issue.7 , pp. 1146-1164
    • Huang, Z.1    Zeng, D.D.2    Chen, H.3
  • 16
    • 33845271242 scopus 로고    scopus 로고
    • Finding the most unusual time series subsequence: Algorithms and applications
    • Keogh, E., J. Lin, S.-H. Lee, H. V. Herle. 2006. Finding the most unusual time series subsequence: Algorithms and applications. Knowledge Inform. Systems 11 (1) 1-27.
    • (2006) Knowledge Inform. Systems , vol.11 , Issue.1 , pp. 1-27
    • Keogh, E.1    Lin, J.2    Lee, S.-H.3    Herle, H.V.4
  • 17
    • 0041654220 scopus 로고
    • Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis
    • Kruskal, J. B. 1964. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika 29 (1) 1-27.
    • (1964) Psychometrika , vol.29 , Issue.1 , pp. 1-27
    • Kruskal, J.B.1
  • 18
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • DOI 10.1145/1090191.1080118
    • Lakhina, A., M. Crovella, C. Diot. 2005. Mining anomalies using traffic feature distributions. 2005 Conf. Appl., Technologies, Architectures, Protocols Comput. Comm., ACM, New York, 217-228. (Pubitemid 46323506)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 19
    • 19944368437 scopus 로고    scopus 로고
    • Shilling recommender systems for fun and profit
    • ACM, New York
    • Lam, S., J. Riedl. 2004. Shilling recommender systems for fun and profit. 13th Internat. WWW Conf., ACM, New York 309-402.
    • (2004) 13th Internat. WWW Conf. , pp. 309-402
    • Lam, S.1    Riedl, J.2
  • 21
    • 23144465959 scopus 로고    scopus 로고
    • Semantically enhanced collaborative filtering on the Web
    • B. Berendt, A. Hotho, D. Mladenic, M. van Someren, M. Spiliopoulou, G. Stumme, eds, Lecture Notes in Computer Science, Springer, Berlin
    • Mobasher, B., X. Jin, Y. Zhou. 2003. Semantically enhanced collaborative filtering on the Web. B. Berendt, A. Hotho, D. Mladenic, M. van Someren, M. Spiliopoulou, G. Stumme, eds. 1st Eur. Web Mining Forum. Lecture Notes in Computer Science, Vol. 3209. Springer, Berlin, 57-76.
    • (2003) 1st Eur. Web Mining Forum , vol.3209 , pp. 57-76
    • Mobasher, B.1    Jin, X.2    Zhou, Y.3
  • 22
    • 35348969366 scopus 로고    scopus 로고
    • Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
    • Mobasher, B., R. Burke, R. Bhaumik, C. Williams. 2007. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Tech. 7 (4) 1-40.
    • (2007) ACM Trans. Internet Tech , vol.7 , Issue.4 , pp. 1-40
    • Mobasher, B.1    Burke, R.2    Bhaumik, R.3    Williams, C.4
  • 25
    • 35648963540 scopus 로고    scopus 로고
    • Defending recommender systems: Detection of profile injection attacks
    • DOI 10.1007/s11761-007-0013-0, The best Papers from the Joint EEE/CEC Conference
    • Williams, C., B. Mobasher, R. Burke. 2007. Defending recommender systems: Detection of profile injection attacks. Service Oriented Comput. Appl. 1 (3) 157-170. (Pubitemid 350032257)
    • (2007) Service Oriented Computing and Applications , vol.1 , Issue.3 , pp. 157-170
    • Williams, C.A.1    Mobasher, B.2    Burke, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.