Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/107219
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: An improved collaborative filtering recommendation algorithm against shilling attacks
Author: Wei, R.
Shen, H.
Citation: Proceedings of the 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2016), 2016 / Shen, H., Sang, Y., Tian, H. (ed./s), vol.0, pp.330-335
Publisher: IEEE
Issue Date: 2016
ISBN: 9781509050819
Conference Name: 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2016) (16 Dec 2016 - 18 Dec 2016 : Guangzhou, CHINA)
Editor: Shen, H.
Sang, Y.
Tian, H.
Statement of
Responsibility: 
Ruoxuan Wei and Hong Shen
Abstract: Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce recommender systems. However, the risks of shilling attacks have already aroused increasing concerns of the society. Current solutions mainly focus on attack detection methods and robust CF algorithms that have flaws of unassured prediction accuracy. Furthermore, attack detection methods require a threshold to distinguish normal users from fake users and suffer from the problems of false positive if the threshold is too high and false negative if too low. This paper proposes a soft-decision method, Neighbor Selection with Variable-Length Partitions (VLPNS), to reduce false positive rate through marking suspicious fakers instead of deleting them directly such that misclassified normal users can still contribute to the similarity calculation. The method works as follows: First, it gets user’s suspicion probability by applying SVM. It then generates partitions of variable sizes from which different numbers of neighbors can be selected by using the bisecting c-means clustering algorithm. Finally, it chooses neighbors considering the user’s suspicion degree and similarity with target user at the same time. Theoretical and experimental analysis show that our approach ensures an excellent prediction accuracy against shilling attacks.
Rights: © 2016 IEEE
DOI: 10.1109/PDCAT.2016.077
Appears in Collections:Aurora harvest 3
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.