Social media recommender systems: review and open research issues

A Anandhan, L Shuib, MA Ismail, G Mujtaba - IEEE Access, 2018 - ieeexplore.ieee.org
In recent years, different types of review systems have been developed with the
recommender system (RS). RSs are developed based on user textual reviews, ratings, and …

Sampling and noise filtering methods for recommender systems: A literature review

K Jain, R Jindal - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
In the era of online business, many e-commerce sites have evolved which recommend items
according to one's needs and interests. Plenty of data is available to be processed to make …

A fast algorithm for finding most influential people based on the linear threshold model

K Rahimkhani, A Aleahmad, M Rahgozar… - Expert Systems with …, 2015 - Elsevier
Finding the most influential people is an NP-hard problem that has attracted many
researchers in the field of social networks. The problem is also known as influence …

Re-scale AdaBoost for attack detection in collaborative filtering recommender systems

Z Yang, L Xu, Z Cai, Z Xu - Knowledge-Based Systems, 2016 - Elsevier
Collaborative filtering recommender systems (CFRSs) are the key components of successful
E-commerce systems. However, CFRSs are highly vulnerable to “shilling” attacks or “profile …

Single-user injection for invisible shilling attack against recommender systems

C Huang, H Li - Proceedings of the 32nd ACM International …, 2023 - dl.acm.org
Recommendation systems (RS) are crucial for alleviating the information overload problem.
Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to …

Estimating user behavior toward detecting anomalous ratings in rating systems

Z Yang, Z Cai, X Guan - Knowledge-Based Systems, 2016 - Elsevier
Online rating system plays a crucial role in collaborative filtering recommender systems
(CFRSs). However, CFRSs are highly vulnerable to “shilling” attacks in reality. How to …

A community-based approach to identify the most influential nodes in social networks

M Hosseini-Pozveh, K Zamanifar… - Journal of …, 2017 - journals.sagepub.com
One of the important issues concerning the spreading process in social networks is the
influence maximization. This is the problem of identifying the set of the most influential nodes …

Shilling attack detection in binary data: a classification approach

Z Batmaz, B Yilmazel, C Kaleli - Journal of Ambient Intelligence and …, 2020 - Springer
Reliability of a recommender system is extremely substantial for the continuity of the system.
Malicious users may harm the reliability of predictions by injecting fake profiles called …

Spotting anomalous ratings for rating systems by analyzing target users and items

Z Yang, Z Cai, Y Yang - Neurocomputing, 2017 - Elsevier
Online rating systems play an important role in recommender systems. Collaborative filtering
recommender systems are highly vulnerable to “shilling” attacks in reality. Although attack …

An unsupervised method for detecting shilling attacks in recommender systems by mining item relationship and identifying target items

H Cai, F Zhang - The Computer Journal, 2019 - academic.oup.com
Collaborative filtering (CF) recommender systems have been shown to be vulnerable to
shilling attacks. How to quickly and effectively detect shilling attacks is a key challenge for …