Sequential attack detection in recommender systems

M Aktukmak, Y Yilmaz, I Uysal - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Sample-by-sample outlier detection methods are vulnerable … and study the effects of the
attack profile injection. To form a … recommender systems: Detection of profile injection attacks,” …

Shilling attacks against collaborative recommender systems: a review

M Si, Q Li - Artificial Intelligence Review, 2020 - Springer
… Then we explain profile injection attack strategies, shilling attack detection schemes and
robust recommendation algorithms proposed so far in detail. Moreover, we briefly explain …

Unsupervised contaminated user profile identification against shilling attack in recommender system

F Zhang, PPK Chan, ZM He, DS Yeung - Intelligent Data Analysis - content.iospress.com
attack, 28 also known as profile injection attack, is one of well-known attacks to recommender
system… parameters and resistance to outliers. The smaller cluster is identified as the 227 …

Attack detection in recommender systems using subspace outlier detection algorithm

PS Chakraborty - International Conference on Communication, Devices …, 2019 - Springer
use outlier detection algorithm to detect such types of attacks. Due to high dimensionality of
the data that recommender systemsoutlier analysis in detecting profile-injection attacks in E-…

Unsupervised and supervised methods for the detection of hurriedly created profiles in recommender systems

C Panagiotakis, H Papadakis… - International Journal of …, 2020 - Springer
… the profile injection attacks. Finally, SVM is exploited to detect profile injection attacks based
… in studying the Hurry attack, where the malicious users (outliers) create profiles without any …

Identifying Abnormal Behavior of Users in Recommender Systems

H Tafakori, S Karbasi, M Yaghoubi - International Journal of Web …, 2019 - ijwr.usc.ac.ir
attacks as shilling attacks or fake profile injection. In these … are used to detect shilling attacks
in recommender systems. … among effective users, rather than outlier users. It is reasonable …

Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, QVH Nguyen, TT Nguyen… - arXiv preprint arXiv …, 2024 - arxiv.org
… Further, we review 40+ countermeasures to detect and/or prevent poisoning attacks, … domain
of recommender systems, while separating attacks on recommender systems from related …

Rating behavior evaluation and abnormality forensics analysis for injection attack detection

Z Yang, Q Sun, Z Liu, J Yan, Y Zhang - … of Intelligent Information Systems, 2022 - Springer
… We propose a new detection approach to defend different profile injectionDetecting
profile injection attacks and suspicious ratings for online recommender systems have naturally …

Detecting shilling attacks in recommender systems based on analysis of user rating behavior

H Cai, F Zhang - Knowledge-Based Systems, 2019 - Elsevier
… of fake profiles into a CF recommender system in an attempt to increase … attacks or profile
injection attacks [3], [4]. Depending on the … Finally, the outlier detection method is used to detect

Revisiting injective attacks on recommender systems

H Li, S Di, L Chen - … Neural Information Processing Systems, 2022 - proceedings.neurips.cc
Detection of profile injection attacks in social recommender systems using outlier analysis.
In 2017 IEEE International Conference on Big Data (Big Data), pages 2714–2719. IEEE, 2017…