Proceedings of the 2007 ACM Conference on Recommender Systems 2007
DOI: 10.1145/1297231.1297240
|View full text |Cite
|
Sign up to set email alerts
|

Robust collaborative filtering

Abstract: The widespread deployment of recommender systems has lead to user feedback of varying quality. While some users faithfully express their true opinion, many provide noisy ratings which can be detrimental to the quality of the generated recommendations. The presence of noise can violate modeling assumptions and may thus lead to instabilities in estimation and prediction. Even worse, malicious users can deliberately insert attack profiles in an attempt to bias the recommender system to their benefit.Robust statis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
61
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(63 citation statements)
references
References 22 publications
0
61
0
1
Order By: Relevance
“…Lops makes the criticism that collaborative filtering systems are black boxes that cannot explain why an item is recommended except that other users liked it [262]. Manipulation is also a problem: since collaborative filtering is based on user opinions, blackguards might try to manipulate ratings to promote their products so they are recommended more often [333][334][335].…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…Lops makes the criticism that collaborative filtering systems are black boxes that cannot explain why an item is recommended except that other users liked it [262]. Manipulation is also a problem: since collaborative filtering is based on user opinions, blackguards might try to manipulate ratings to promote their products so they are recommended more often [333][334][335].…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…In order to improve the attack-resistant ability of collaborative recommender systems, researchers have proposed many shilling attack detection algorithms [4][5][6] and robust recommendation algorithms [7][8][9][10]. Mehta et al proposed shilling attack detection algorithm using principal component analysis (PCA) of the users' profiles [4].…”
Section: Introductionmentioning
confidence: 99%
“…Mehta et al proposed a robust recommendation algorithm (RMF) based on M-estimators [7]. The reference [8] proposed a least trimmed squares estimator based matrix factorization (LTSMF) algorithm, which shows better robustness compared with RMF.…”
Section: Introductionmentioning
confidence: 99%
“…CF technology has turned out not to be well protected against malicious users who try to harm the system or to make a profit by gamming corresponding recommender systems. For example, a malicious user who copies the entire profiles of target users can mislead recommender systems into thinking the malicious user is a perfect cohort and then recommending his/her products to target users [9][10][11]. A group of ad-hoc users are also able to reinforce their own ratings and shift the recommendation predictions in the direction(s) that they desire so [12].…”
Section: Introductionmentioning
confidence: 99%