TY - JOUR
T1 - Shilling attack detection in recommender systems via selecting patterns analysis
AU - Li, Wentao
AU - Gao, Min
AU - Li, Hua
AU - Zeng, Jun
AU - Xiong, Qingyu
AU - Hirokawa, Sachio
N1 - Funding Information:
the National Natural Science Foundation of China under the Grant No. 61502062, the China Postdoctoral Science Foundations under the Grant Nos. 2012M521680 and 2014M560704, and the Fundamental Research Fund for the Central Universities under the Grant No. 106112014CD-JZR095502.
Publisher Copyright:
© 2016 The Institute of Electronics, Information and Communication Engineers.
PY - 2016/10
Y1 - 2016/10
N2 - Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.
AB - Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.
UR - http://www.scopus.com/inward/record.url?scp=84989872797&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84989872797&partnerID=8YFLogxK
U2 - 10.1587/transinf.2015EDP7500
DO - 10.1587/transinf.2015EDP7500
M3 - Article
AN - SCOPUS:84989872797
SN - 0916-8532
VL - E99D
SP - 2600
EP - 2611
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 10
ER -