2012
DOI: 10.1007/s10462-012-9364-9
|View full text |Cite
|
Sign up to set email alerts
|

Shilling attacks against recommender systems: a comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
183
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 256 publications
(197 citation statements)
references
References 62 publications
0
183
0
1
Order By: Relevance
“…The user profile refers to a collection of user ratings to all items [6]. In order to behave like normal users, the attackers use attack models to create attack profiles based on their knowledge about the recommender systems, such as rating database and item popularity [18].…”
Section: Attack Modelsmentioning
confidence: 99%
See 4 more Smart Citations
“…The user profile refers to a collection of user ratings to all items [6]. In order to behave like normal users, the attackers use attack models to create attack profiles based on their knowledge about the recommender systems, such as rating database and item popularity [18].…”
Section: Attack Modelsmentioning
confidence: 99%
“…Existing shilling attack detection methods mostly derived features from rating values in the user profiles [6]. As attackers gain limited knowledge about the systems, their ratings given to items are different from those of normal users [6].…”
Section: Features Derived From Rating Patternsmentioning
confidence: 99%
See 3 more Smart Citations