Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Zhang, Feia; b | Chan, Patrick P.K.c; * | He, Zhi-Mind | Yeung, Daniel S.e
Affiliations: [a] College of Computer and Information Engineering, Henan Normal University, Xinxiang, Henan, China | [b] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province | [c] Shien-Ming Wu School of Intelligent Engineering, South China University of Technology, Guangzhou, Guangdong, China | [d] School of Electronic and Information Engineering, Foshan University, Foshan, Guangdong, China | [e] Independent Researcher, Hong Kong, China
Correspondence: [*] Corresponding author: Patrick P.K. Chan, Shien-Ming Wu School of Intelligent Engineering, South China University of Technology, Guangzhou, Guangdong, China. E-mail: patrickchan@scut.edu.cn.
Abstract: A recommender system is susceptible to manipulation through the injection of carefully crafted profiles. Some recent profile identification methods only perform well in specific attack scenarios. A general attack detection method is usually complicated or requires label samples. Such methods are prone to overtraining easily, and the process of annotation incurs high expenses. This study proposes an unsupervised divide-and-conquer method aiming to identify attack profiles, utilizing a specifically designed model for each kind of shilling attack. Initially, our method categorizes the profile set into two attack types, namely Standard and Obfuscated Behavior Attacks. Subsequently, profiles are separated into clusters within the extracted feature space based on the identified attack type. The selection of attack profiles is then determined through target item analysis within the suspected cluster. Notably, our method offers the advantage of requiring no prior knowledge or annotation. Furthermore, the precision is heightened as the identification method is designed to a specific attack type, employing a less complicated model. The outstanding performance of our model, validated through experimental results on MovieLens-100K and Netflix under various attack settings, demonstrates superior accuracy and reduced running time compared to current detection methods in identifying Standard and Obfuscated Behavior Attacks.
Keywords: PCA, item popularity, shilling attack detection, divide-and-conquer method
DOI: 10.3233/IDA-230575
Journal: Intelligent Data Analysis, vol. 28, no. 6, pp. 1411-1426, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl