4.6 Article

Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

βP: A novel approach to filter out malicious rating profiles from recommender systems

Chen-Yao Chung et al.

DECISION SUPPORT SYSTEMS (2013)

Article Computer Science, Information Systems

Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

Jie Cao et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2013)

Article Computer Science, Artificial Intelligence

Social knowledge-based recommender system. Application to the movies domain

Walter Carrer-Neto et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

An efficient intrusion detection system based on support vector machines and gradually feature removal method

Yinhui Li et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

A recommender system based on tag and time information for social tagging systems

Nan Zheng et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Computer Science, Artificial Intelligence

A novel intrusion detection system based on hierarchical clustering and support vector machines

Shi-Jinn Horng et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

Tag-Aware Recommender Systems: A State-of-the-Art Survey

Zi-Ke Zhang et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2011)

Article Multidisciplinary Sciences

Emergence of Scale-Free Leadership Structure in Social Recommender Systems

Tao Zhou et al.

PLOS ONE (2011)

Article Computer Science, Artificial Intelligence

COG: local decomposition for rare class analysis

Junjie Wu et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2010)

Article Computer Science, Artificial Intelligence

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Gang Wang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Article Computer Science, Cybernetics

Unsupervised strategies for shilling detection and robust collaborative filtering

Bhaskar Mehta et al.

USER MODELING AND USER-ADAPTED INTERACTION (2009)

Article Computer Science, Artificial Intelligence

Top 10 algorithms in data mining

Xindong Wu et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2008)

Article Computer Science, Interdisciplinary Applications

Defending recommender systems: detection of profile injection attacks

Chad A. Williams et al.

SERVICE ORIENTED COMPUTING AND APPLICATIONS (2007)

Article Computer Science, Information Systems

Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness

Bamshad Mobasher et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2007)

Review Computer Science, Artificial Intelligence

Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions

G Adomavicius et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2005)