메뉴 건너뛰기




Volumn 28, Issue 4, 2013, Pages 616-624

Securing recommender systems against shilling attacks using social-based clustering

Author keywords

clustering; collaborative filtering; recommender system; shilling attack; social trust

Indexed keywords

CLUSTERING; NEW SOURCES; SHILLING ATTACK; SOCIAL TRUST; SOCIAL-BASED; USER COMMUNITIES;

EID: 84880051599     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-013-1362-0     Document Type: Article
Times cited : (21)

References (23)
  • 9
    • 68249135535 scopus 로고    scopus 로고
    • Improving accuracy of recommender system by item clustering
    • 10.1093/ietisy/e90-d.9.1363
    • Truong K Q, Ishikawa F, Honiden S. Improving accuracy of recommender system by item clustering. Transactions on Information and Systems, 2007, E90-D(9): 1363-1373.
    • (2007) Transactions on Information and Systems , vol.D90 , Issue.9 , pp. 1363-1373
    • Truong, K.Q.1    Ishikawa, F.2    Honiden, S.3
  • 13
    • 33749544444 scopus 로고    scopus 로고
    • Effective attack models for shilling item-based collaborative filtering systems
    • Aug.
    • Mobasher B, Burke R, Bhaumik R, Williams C. Effective attack models for shilling item-based collaborative filtering systems. In Proc. WebKDD Workshop, Aug. 2005.
    • (2005) Proc. WebKDD Workshop
    • Mobasher, B.1    Burke, R.2    Bhaumik, R.3    Williams, C.4
  • 14
    • 35348969366 scopus 로고    scopus 로고
    • Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
    • Oct. Article No.23
    • Mobasher B, Burke R, Bhaumik R, Williams C. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol., Oct. 2007, 7(4): Article No.23.
    • (2007) ACM Trans. Internet Technol. , vol.7 , Issue.4
    • Mobasher, B.1    Burke, R.2    Bhaumik, R.3    Williams, C.4
  • 15
    • 72249112162 scopus 로고    scopus 로고
    • Effective diverse and obfuscated attacks on model-based recommender systems
    • Oct.
    • Cheng Z P, Hurley N. Effective diverse and obfuscated attacks on model-based recommender systems. In Proc. The 3rd ACM Conf. Recommender Systems, Oct. 2009, pp.141-148.
    • (2009) Proc. The 3rd ACM Conf. Recommender Systems , pp. 141-148
    • Cheng, Z.P.1    Hurley, N.2
  • 17
    • 29844431903 scopus 로고    scopus 로고
    • Analyzing correlation between trust and user similarity in online communities
    • May
    • Ziegler C, Lausen G. Analyzing correlation between trust and user similarity in online communities. In Proc. The 2nd Int. Conf. Trust Management, May 2004, pp.251-265.
    • (2004) Proc. The 2nd Int. Conf. Trust Management , pp. 251-265
    • Ziegler, C.1    Lausen, G.2
  • 23
    • 84952503562 scopus 로고
    • Thirteen ways to look at the correlation coefficient
    • 10.2307/2685263
    • Rodgers J, Nicewander A. Thirteen ways to look at the correlation coefficient. The American Statistician, 1988, 42: 59-66.
    • (1988) The American Statistician , vol.42 , pp. 59-66
    • Rodgers, J.1    Nicewander, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.