Intrusion detection in a trust-based recommendation system

ED Kameni, TPVD Weide - International Journal of Trust …, 2017 - inderscienceonline.com
In multi-agent systems, agents cooperate by asking other agent's opinions as part of their
own decision making process. The goal of a recommendation system is to provide advice …

An outlier accuracy improvement in shilling attacks using ksom

AK Verma, VS Dixit - … , Control and Devices: Proceedings of ICICCD 2018, 2020 - Springer
Due to the rapid technological changes, these days collaborative filtering-based
recommender systems are being widely used worldwide. Collaborative filtering approach is …

[PDF][PDF] Maskelenmiş Veriler için Kümeleme-Tabanlı Şilin Atak Tespit Yöntemi

A Bilge, Z Batmaz, H Polat - Fırat Üniversitesi Mühendislik Bilimleri …, 2016 - dergipark.org.tr
İnternet'in yaygınlaşması ile beraber hem ortak filtreleme hem de mahremiyetin korunması
artan ilgi görmektedir. Mahremiyeti koruyarak doğru önerileri hızlı bir şekilde kullanıcıya …

Attack detection in recommender systems using subspace outlier detection algorithm

PS Chakraborty - International Conference on Communication, Devices …, 2019 - Springer
Recommender system plays an important role in today's online business. At the time of
choosing right product or service from Internet, recommender system helps customers by …

[图书][B] Measuring the effectiveness of outlier detection techniques in cluster analysis

G Kgoedi - 2021 - search.proquest.com
Outlier detection, the discovery of objects that deviate from normal behaviour, is crucial in
many application domains. To detect them, a variety of algorithms have been proposed …

[PDF][PDF] Recommender System for mobile subscriber provisioning.

EM Sibanda - 2018 - digiresearch.vut.ac.za
Mobile phone recommendation systems are of great importance for mobile operators to
achieve a profit. In a user-derived market, the number of contract users and contract phones …

Developing techniques for robustness of privacy-preserving distributed collaborative filtering

B Yılmazel - 2016 - search.proquest.com
Success of collaborative filtering systems strongly depend on having adequate data. Due to
customers' shopping habits and increasing number of e-commerce sites, data collected for …

[引用][C] A survey on profile-injection attacks in recommender systems using outlier analysis

JH Dhimmar, R Chauhan - Int. J. Adv. Res. Comput. Sci. Manage. Studies, 2014