2012
DOI: 10.1007/s11280-012-0164-6
|View full text |Cite
|
Sign up to set email alerts
|

Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(47 citation statements)
references
References 19 publications
0
47
0
Order By: Relevance
“…There are existing works try to bridge collaborative filtering and SSL [8,49,50]. For example, Semi-SAD [8] tried to combine the idea of collaborative filtering and SSL for shilling attack detection tasks. The semi-supervised co-training (CSEL) framework [50] first proposes two context-aware factorization models by leveraging âĂIJmore generalâĂİ sources such as age and gender of a user, or the genres.…”
Section: Chain Graph Modelsmentioning
confidence: 99%
“…There are existing works try to bridge collaborative filtering and SSL [8,49,50]. For example, Semi-SAD [8] tried to combine the idea of collaborative filtering and SSL for shilling attack detection tasks. The semi-supervised co-training (CSEL) framework [50] first proposes two context-aware factorization models by leveraging âĂIJmore generalâĂİ sources such as age and gender of a user, or the genres.…”
Section: Chain Graph Modelsmentioning
confidence: 99%
“…Bilge et al (2014b) use the idea of bisecting k-means clustering as a shilling attack detection method. Some researchers apply semi-supervised learning approaches in attack detection (Wu et al, 2011;Cao et al, 2013). Another group of research focus on analyzing the robustness of various CF algorithms with respect to shilling attacks, and proposing robust algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Shilling attack detection and robust attack-resistant CF have attracted significant attention in recent years. For detection, supervised learning-based detection systems using several user features [9][10][11], unsupervised detection based on clustering algorithms [12,13], and semi-supervised detection using both labeled and unlabeled data [14,15] are available. For robust attack-resistant CF, trust-aware CF based on constructing a user trust model [16,17] and item anomaly detection-based robust CF [18] are available.…”
Section: Introductionmentioning
confidence: 99%