2015
DOI: 10.1016/j.ins.2015.02.019
|View full text |Cite
|
Sign up to set email alerts
|

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(30 citation statements)
references
References 51 publications
0
30
0
Order By: Relevance
“…The weight is 1,2 w α of this rule 0,108. for these rules. Iterative method implementation for a rule 10,11 , r β with the first priority allowed to increase the value 10,11 w ∆ to 0,385. The number of users -potential attackers at the same time decreased by more than 5 times.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The weight is 1,2 w α of this rule 0,108. for these rules. Iterative method implementation for a rule 10,11 , r β with the first priority allowed to increase the value 10,11 w ∆ to 0,385. The number of users -potential attackers at the same time decreased by more than 5 times.…”
Section: Resultsmentioning
confidence: 99%
“…However, they do not distinguish between attackers and users with periodically changing interests, who occasionally purchase goods and services in e-commerce systems. In order to take into account the changing interests of users, a subset of the initial ratings is allocated for a given time interval [10].…”
Section: Introductionmentioning
confidence: 99%
“…There are also some scholars assigning users (products) to different clusters dynamically by evolutionary combined clustering approach, and make further recommendations [16]. Additionally, there are some other novel recommendation approaches [17,18,19,20,21,22].…”
Section: Related Workmentioning
confidence: 99%
“…For detection, supervised learning-based detection systems using several user features [9][10][11], unsupervised detection based on clustering algorithms [12,13], and semi-supervised detection using both labeled and unlabeled data [14,15] are available. For robust attack-resistant CF, trust-aware CF based on constructing a user trust model [16,17] and item anomaly detection-based robust CF [18] are available. However, recent research on the shilling attacks in service recommender systems is inadequate.…”
Section: Introductionmentioning
confidence: 99%