4.6 Article

An unsupervised detection method for shilling attacks based on deep learning and community detection

期刊

SOFT COMPUTING
卷 25, 期 1, 页码 477-494

出版社

SPRINGER
DOI: 10.1007/s00500-020-05162-6

关键词

Shilling attack; Unsupervised detection; Deep learning; Community detection

资金

  1. National Natural Science Foundation of China [61772452, 61379116]
  2. Scientific and Technology Innovation Program of Higher Education Institutions in Shanxi, China [2019L0847]
  3. Youth Project of Humanities and Social Sciences Financed by Ministry of Education, China [20YJC630034]
  4. Natural Science Foundation of Hebei Province, China [F2015203046]

向作者/读者索取更多资源

This study proposes an unsupervised method based on deep learning and community detection for shilling attack detection. Experimental results show that the proposed method outperforms some baseline detectors in detecting simulated attacks and actual attacks.
In the detection methods for shilling attacks, the supervised methods require labeled samples to train the classifiers. Due to lack of the labeled sample profiles in real scenarios, the applicability of supervised detection method is restricted. For unsupervised methods, the prior knowledge is often required to guarantee the detection accuracy. To break the traditional limitations, we present an unsupervised method to detect various shilling profiles from reconstructed user-user graph based on deep learning and community detection. Firstly, we construct the user-user graph, whose edge weight is calculated by the similarity of user's behaviors. Secondly, the stacked denoising autoencoders are used to extract the robust graph features at different scales with different corruption rates. Based on the features at different scales, we generate multiple clustering results and reconstruct the user-user graph by evidence accumulation method. Thirdly, the community detection is carried out by using the persistence optimization algorithm. Extensive experiments on two datasets illustrate that our proposed method has better performance than some baseline detectors for detecting the simulated attacks and actual attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据