JS Lee, D Zhu - INFORMS Journal on Computing, 2012 - pubsonline.informs.org
Recommender systems rely on the opinions of many users to predict the preferences of potential customers. These systems have been broadly used to make quality …
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection …
G Cao, H Zhang, J Zheng, L Kuang… - International Journal of …, 2019 - World Scientific
Recommender system is widely used in various fields for dealing with information overload effectively, and collaborative filtering plays a vital role in the system. However, recommender …
In recent decades, the advent of digital information services by YouTube, Amazon, Netflix, and many other web services of this kind have made recommendation systems more and …
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have …
Recommender systems are emerging techniques guiding individuals with provided referrals by considering their past rating behaviors. By collecting multi‐criteria preferences …
A Bilge, Z Ozdemir, H Polat - Procedia Computer Science, 2014 - Elsevier
Recommender systems provide an impressive way to overcome information overload problem. However, they are vulnerable to profile injection or shilling attacks. Malicious users …
Y Wang, L Qian, F Li, L Zhang - Journal of Systems Science and Systems …, 2018 - Springer
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection …
W Bhebe, OP Kogeda - … on Emerging Trends in Networks and …, 2015 - ieeexplore.ieee.org
Collaborative Recommender Systems suggest items to a user based on other users past behaviour (items they once bought, viewed or selected and/or ratings they gave to those …