Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 490261, 9 pages
http://dx.doi.org/10.1155/2015/490261
Research Article

Abnormal Profiles Detection Based on Time Series and Target Item Analysis for Recommender Systems

1College of Computer Science, Chongqing University, Chongqing 400030, China
2School of Software Engineering, Chongqing University, Chongqing 400030, China
3Chongqing Health and Family Planning Commission, Chongqing 400000, China

Received 12 December 2014; Accepted 18 May 2015

Academic Editor: Aime’ Lay-Ekuakille

Copyright © 2015 Wei Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. K. Lam and J. Riedl, “Shilling recommender systems for fun and profit,” in Proceedings of the 13th International World Wide Web Conference Proceedings (WWW '04), pp. 393–402, May 2004. View at Scopus
  2. J. L. Herlocker, J. A. Konstan, L. G. Terveen, and J. T. Riedl, “Evaluating collaborative filtering recommender systems,” ACM Transactions on Information Systems (TOIS), vol. 22, no. 1, pp. 5–53, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Sarwar, G. Karypis, J. Konstan, and J. Reidl, “Item-based collaborative filtering recommendation algorithms,” in Proceedings of the 10th International Conference on World Wide Web, pp. 285–295, May 2001. View at Publisher · View at Google Scholar
  4. P.-A. Chirita, W. Nejdl, and C. Zamfir, “Preventing shilling attacks in online recommender systems,” in Proceedings of the 7th ACM International Workshop on Web Information and Data Management (WIDM '05), pp. 67–74, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Zhou, Y. S. Koh, J. Wen, S. Alam, and G. Dobbie, “Attack detection in recommender systems based on target item analysis,” in Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval (SIGIR ’14), pp. 955–958, Gold Coast, Australia, July 2014.
  6. M. P. O’Mahony, N. J. Hurley, and G. C. M. Silvestre, “Detecting noise in recommender system databases,” in Proceedings of the 11th International Conference on Intelligent User Interfaces (IUI '06), pp. 109–115, February 2005. View at Publisher · View at Google Scholar · View at Scopus
  7. M. P. O'Mahony, N. Hurley, and G. C. M. Silvestre, “Promoting recommendations: an attack on collaborative filtering,” in Proceedings of the 13th International Conference on Database and Expert Systems Applications (DEXA '02), pp. 494–503, 2002.
  8. M. Grčar, B. Fortuna, D. Mladenič, and M. Grobelnik, “kNN versus SVM in the collaborative filtering framework,” in Data Science and Classification, Studies in Classification, Data Analysis, and Knowledge Organization, pp. 251–260, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  9. X. Su and T. M. Khoshgoftaar, “A survey of collaborative filtering techniques,” Advances in Artificial Intelligence, vol. 2009, Article ID 421425, 19 pages, 2009. View at Publisher · View at Google Scholar
  10. L. Fu, D. H.-L. Goh, S. S.-B. Foo, and J.-C. Na, “Collaborative querying through a hybrid query clustering approach,” in Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, vol. 2911 of Lecture Notes in Computer Science, pp. 111–122, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  11. C.-H. Lee, Y.-H. Kim, and P.-K. Rhee, “Web personalization expert with combining collaborative filtering and association rule mining technique,” Expert Systems with Applications, vol. 21, no. 3, pp. 131–137, 2001. View at Publisher · View at Google Scholar · View at Scopus
  12. N. Hurley, Z. Cheng, and M. Zhang, “Statistical attack detection,” in Proceedings of the 3rd ACM Conference on Recommender Systems (RecSys '09), pp. 149–156, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon, “Attack detection in time series for recommender systems,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06), pp. 809–814, August 2006. View at Scopus
  14. W. Zhou, J. Wen, Y. S. Koh, S. Alam, and G. Dobbie, “Attack detection in recommender systems based on target item analysis,” in Proceedings of the International Joint Conference on Neural Networks (IJCNN '14), pp. 332–339, Beijing, China, July 2014. View at Publisher · View at Google Scholar
  15. Z. Wu, J. Wu, J. Cao, and D. Tao, “HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation,” in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '12), pp. 985–993, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, “GroupLens: an open architecture for collaborative filtering of netnews,” in Proceedings of the ACM Conference on Computer Supported Cooperative Work, pp. 175–186, October 1994. View at Publisher · View at Google Scholar
  17. N. J. Hurley, M. P. O'Mahony, and G. C. M. Silvestre, “Attacking recommender systems: a cost-benefit analysis,” IEEE Intelligent Systems, vol. 22, no. 3, pp. 64–68, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Zhang, Y. Ouyang, J. Ford, and F. Makedon, “Analysis of a low-dimensional linear model under recommendation attacks,” in Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 517–524, August 2006. View at Scopus