4.2 Article

Detecting shilling attacks in private environments

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Robustness analysis of arbitrarily distributed data-based recommendation methods

Burcu Yurekli Yilmazel et al.

EXPERT SYSTEMS WITH APPLICATIONS (2016)

Article Computer Science, Information Systems

Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network

Fuzhi Zhang et al.

IET INFORMATION SECURITY (2015)

Article Computer Science, Hardware & Architecture

A k-anonymous approach to privacy preserving collaborative filtering

Fran Casino et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)

Article Physics, Multidisciplinary

Improve the algorithmic performance of collaborative filtering by using the interevent time distribution of human behaviors

Chun-Xiao Jia et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

Shilling attacks against recommender systems: a comprehensive survey

Ihsan Gunes et al.

ARTIFICIAL INTELLIGENCE REVIEW (2014)

Article Computer Science, Artificial Intelligence

Robust Sybil attack defense with information level in online Recommender Systems

Giseop Noh et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

Robustness analysis of privacy-preserving model-based recommendation schemes

Alper Bilge et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Information Systems

Defending recommender systems by influence analysis

Mohammad Amin Morid et al.

INFORMATION RETRIEVAL (2014)

Article Computer Science, Artificial Intelligence

HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems

Fuzhi Zhang et al.

KNOWLEDGE-BASED SYSTEMS (2014)

Article Computer Science, Information Systems

Shilling Attack Detection Algorithm based on Non-random-missing Mechanism

Man Li

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2014)

Proceedings Paper Computer Science, Interdisciplinary Applications

A novel shilling attack detection method

Alper Bilge et al.

2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014 (2014)

Article Computer Science, Artificial Intelligence

A comparison of clustering-based privacy-preserving collaborative filtering schemes

Alper Bilge et al.

APPLIED SOFT COMPUTING (2013)

Article Computer Science, Artificial Intelligence

βP: A novel approach to filter out malicious rating profiles from recommender systems

Chen-Yao Chung et al.

DECISION SUPPORT SYSTEMS (2013)

Article Computer Science, Artificial Intelligence

A SURVEY OF PRIVACY-PRESERVING COLLABORATIVE FILTERING SCHEMES

Alper Bilge et al.

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2013)

Article Computer Science, Hardware & Architecture

Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering

Xiang-Liang Zhang et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2013)

Article Computer Science, Artificial Intelligence

Recommender systems survey

J. Bobadilla et al.

KNOWLEDGE-BASED SYSTEMS (2013)

Article Computer Science, Information Systems

Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms

Ihsan Gunes et al.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

Jie Cao et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2013)

Proceedings Paper Computer Science, Information Systems

On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems and New Issues

Fran Casino et al.

2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE) (2013)

Article Computer Science, Hardware & Architecture

Preventing Recommendation Attack in Trust-Based Recommender Systems

Fu-Guo Zhang

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2011)

Article Computer Science, Cybernetics

Unsupervised strategies for shilling detection and robust collaborative filtering

Bhaskar Mehta et al.

USER MODELING AND USER-ADAPTED INTERACTION (2009)

Article Computer Science, Interdisciplinary Applications

Defending recommender systems: detection of profile injection attacks

Chad A. Williams et al.

SERVICE ORIENTED COMPUTING AND APPLICATIONS (2007)

Article Computer Science, Information Systems

Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness

Bamshad Mobasher et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2007)