βP: A novel approach to filter out malicious rating profiles from recommender systems

被引:62
作者
Chung, Chen-Yao [1 ]
Hsu, Ping-Yu [1 ]
Huang, Shih-Hsiang [1 ]
机构
[1] Natl Cent Univ, Dept Business Adm, Jhongli, Taoyuan County, Taiwan
关键词
Shilling attacks detection; Collaborative filtering; Recommender systems; ONLINE REVIEWS; TRUST; STRATEGIES; ALGORITHM;
D O I
10.1016/j.dss.2013.01.020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recommender systems are widely deployed to provide user purchasing suggestion on eCommerce websites. The technology that has been adopted by most recommender systems is collaborative filtering. However, with the open nature of collaborative filtering recommender systems, they suffer significant vulnerabilities from being attacked by malicious raters, who inject profiles consisting of biased ratings. In recent years, several attack detection algorithms have been proposed to handle the issue. Unfortunately, their applications are restricted by various constraints. PCA-based methods while having good performance on paper, still suffer from missing values that plague most user-item matrixes. Classification-based methods require balanced numbers of attacks and normal profiles to train the classifiers. The detector based on SPC (Statistical Process Control) assumes that the rating probability distribution for each item is known in advance. In this research, Beta-Protection ( beta P) is proposed to alleviate the problem without the abovementioned constraints. beta P grounds its theoretical foundation on Beta distribution for easy computation and has stable performance when experimenting with data derived from the public websites of MovieLens. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:314 / 325
页数:12
相关论文
共 44 条
[1]   Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions [J].
Adomavicius, G ;
Tuzhilin, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (06) :734-749
[2]  
[Anonymous], 2001, INT C WORLD WIDE WEB
[3]  
[Anonymous], 2006, Introduction to Data Mining
[4]   Strategies for learning in class imbalance problems [J].
Barandela, R ;
Sánchez, JS ;
García, V ;
Rangel, E .
PATTERN RECOGNITION, 2003, 36 (03) :849-851
[5]  
Bhaumik R., 2006, ITWP 06 P 4 WORKSH I
[6]  
Burke B., 2006, KDD 06 P 12 ACM SIGK
[7]  
Burke R., 2006, CEC EEE 06 P 8 IEEE
[8]   The effect of word of mouth on sales: Online book reviews [J].
Chevalier, Judith A. ;
Mayzlin, Dina .
JOURNAL OF MARKETING RESEARCH, 2006, 43 (03) :345-354
[9]  
Chirita P.A., 2005, WIDM 05 P 7 ANN ACM
[10]   Item-based top-N recommendation algorithms [J].
Deshpande, M ;
Karypis, G .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2004, 22 (01) :143-177