Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, N Quoc Viet Hung, TT Nguyen… - ACM Computing …, 2024 - dl.acm.org
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …

Robust recommender system: a survey and future directions

K Zhang, Q Cao, F Sun, Y Wu, S Tao, H Shen… - arxiv preprint arxiv …, 2023 - arxiv.org
With the rapid growth of information, recommender systems have become integral for
providing personalized suggestions and overcoming information overload. However, their …

Understanding shilling attacks and their detection traits: A comprehensive survey

AP Sundar, F Li, X Zou, T Gao, ED Russomanno - IEEE Access, 2020 - ieeexplore.ieee.org
The internet is the home for huge volumes of useful data that is constantly being created
making it difficult for users to find information relevant to them. Recommendation System is a …

Collaborative filtering recommendation based on trust and emotion

L Guo, J Liang, Y Zhu, Y Luo, L Sun… - Journal of Intelligent …, 2019 - Springer
With the development of personalized recommendations, information overload has been
alleviated. However, the sparsity of the user-item rating matrix and the weak transitivity of …

Detecting shilling attacks in social recommender systems based on time series analysis and trust features

Y Xu, F Zhang - Knowledge-Based Systems, 2019 - Elsevier
In social recommender systems or trust-based recommender systems, malicious users can
bias the recommendations by injecting a large number of fake profiles and by building …

Experimental and theoretical study for the popular shilling attacks detection methods in collaborative recommender system

RA Zayed, LF Ibrahim, HA Hefny, HA Salman… - IEEE …, 2023 - ieeexplore.ieee.org
The stability and reliability of filtration and recommender systems are crucial for continuous
operation. The presence of fake profiles, known as “shilling attacks,” can undermine the …

BS-SC: An unsupervised approach for detecting shilling profiles in collaborative recommender systems

H Cai, F Zhang - IEEE Transactions on Knowledge and Data …, 2019 - ieeexplore.ieee.org
Collaborative recommender systems are vulnerable to shilling attacks. To address this
issue, many methods including supervised and unsupervised have been proposed …

An unsupervised method for detecting shilling attacks in recommender systems by mining item relationship and identifying target items

H Cai, F Zhang - The Computer Journal, 2019 - academic.oup.com
Collaborative filtering (CF) recommender systems have been shown to be vulnerable to
shilling attacks. How to quickly and effectively detect shilling attacks is a key challenge for …

Multiview ensemble method for detecting shilling attacks in collaborative recommender systems

Y Hao, P Zhang, F Zhang - Security and Communication …, 2018 - Wiley Online Library
Faced with the evolving attacks in collaborative recommender systems, the conventional
shilling detection methods rely mainly on one kind of user‐generated information (ie, single …

Probabilistic inference and trustworthiness evaluation of associative links toward malicious attack detection for online recommendations

Z Yang, Q Sun, Y Zhang - IEEE Transactions on Dependable …, 2020 - ieeexplore.ieee.org
The increasing use of recommender systems as personalization recommendation services
such as Amazon, TripAdvisor, and Yelp, has stressed the demand for secure and usable …