2012 HySADASemiSupervisedHybridShill
- (Wu et al., 2012) ⇒ Zhiang Wu, Junjie Wu, Jie Cao, and Dacheng Tao. (2012). “HySAD: A Semi-supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation.” In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2012). ISBN:978-1-4503-1462-6 doi:10.1145/2339530.2339684
Subject Headings:
Notes
Cited By
- http://scholar.google.com/scholar?q=%222012%22+HySAD%3A+A+Semi-supervised+Hybrid+Shilling+Attack+Detector+for+Trustworthy+Product+Recommendation
- http://dl.acm.org/citation.cfm?id=2339530.2339684&preflayout=flat#citedby
Quotes
Author Keywords
- Data mining; hybrid shilling attack; naive bayes; recommendation systems; semi-supervised learning; statistical
Abstract
Shilling attackers apply biased rating profiles to recommender systems for manipulating online product recommendations. Although many studies have been devoted to shilling attack detection, few of them can handle the hybrid shilling attacks that usually happen in practice, and the studies for real-life applications are rarely seen. Moreover, little attention has yet been paid to modeling both labeled and unlabeled user profiles, although there are often a few labeled but numerous unlabeled users available in practice. This paper presents a Hybrid Shilling Attack Detector, or HySAD for short, to tackle these problems. In particular, HySAD introduces MC-Relief to select effective detection metrics, and Semi-supervised Naive Bayes (SNB_lambda) to precisely separate Random-Filler model attackers and Average-Filler model attackers from normal users. Thorough experiments on MovieLens and Netflix datasets demonstrate the effectiveness of HySAD in detecting hybrid shilling attacks, and its robustness for various obfuscated strategies. A real-life case study on product reviews of Amazon.cn is also provided, which further demonstrates that HySAD can effectively improve the accuracy of a collaborative-filtering based recommender system, and provide interesting opportunities for in-depth analysis of attacker behaviors. These, in turn, justify the value of HySAD for real-world applications.
References
;
Author | volume | Date Value | title | type | journal | titleUrl | doi | note | year | |
---|---|---|---|---|---|---|---|---|---|---|
2012 HySADASemiSupervisedHybridShill | Junjie Wu Dacheng Tao Zhiang Wu Jie Cao | HySAD: A Semi-supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation | 10.1145/2339530.2339684 | 2012 |