A novel shilling attack detection model for collaborative filtering recommender systems

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:yuanli1988
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  With the rapid development of e-commerce,the security issues of recommender systems have been widely investigated.Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to reduce the frequency of undesired recommendation items.As one of the most important attack methods in recommender systems,the shilling attack has been paid considerable attention,especially to its model and the way to detect it.Among them,the loose version of Group Shilling Attack Generation Algorithm(GSAGenl)has outstanding performance.It can be immune to some PCC(Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation.In order to overcome the vulnerabilities caused by GSAGenl,a gravitation-based detection model(GBDM)is presented,integrated with a sophisticated gravitational detector and a decider.And meanwhile two new basic attributes and a particle filter algorithm are proposed for tracking prediction.And then,whether an attack occurs can be determined according to the law of universal gravitation in decision-making.The detection performances of GBDM,HHT-SVM,UnRAP,AP-UnRAP and Semi-SAD are compared and evaluated,when they are simultaneously suffering attacks from GSAGenl.And simulation results show the effectiveness and availability of GBDM.
其他文献
  基于位置的数据服务在为用户提供生活便利的同时,不可信第三方无边界地采集个人位置、轨迹模式等信息,进行位置行为关联等分析行为存在着巨大的隐私泄露风险。针对位置数据
  Although the medical monitoring system has massive users,each of them only possesses one piece of data logging that participates in statistical computing.If
  We present an automatic algorithm for subtractive manufacturing of free form 3D objects using high-speed CNC machining.
会议
  目前,僵尸网络检测方法大多依靠对僵尸网络通信活动或通信内容的分析,前者对数据流的特征 进行统计分析,不涉及数据流中的内容,在检测加密类型方面具有较强优势,但准确性较低;
  Variety of security issues exist while all-optical networks provide high-speed transmission,therefore effective means and strategies are needed to repair fa
  As the foundation component of cloud computing platform,the virtual machine(VM)is confronted with numerous security threats.However,existing solutions tend
  高效的计算机可视化系统能够模拟人类的视觉感知系统,在可视化结果中凸显数据蕴含的重要信息和模式,从而帮助人们快速完成数据的认知过程。目前我们已经有了很多优秀的可视
会议
  高维数据可视化与可视分析旨在探索未知数据,发现潜在模式,在数据驱动的科学发现和应用领域探索中发挥着越来越重要的作用。但高维数据可视化面临着高维和未知复杂结构等挑
会议
  The inner product encry ption scheme can achieve fine-grained access control on ciphertext.For the problem that the existing inner product encry ption schem
  Python is widely used in web crawler,machine learning,data analysis and so on.However,there is no guarantee that Python scripts are trusted in their whole l