Research Article
Detecting Shilling Attacks with Automatic Features from Multiple Views
Table 1
The common attack models.
| Attack model | | | | Items | Rating | Items | Rating | Rating |
| Random attack | Not used | | Randomly chosen | System mean | | Average attack | Not used | | Randomly chosen | Item mean | | AoP attack | Not used | | Top x% of most popular items | Item mean | | User random shifting | Not used | | Randomly chosen | System mean+random | | User average shifting | Not used | | Randomly chosen | Item mean+random | | Target random shifting | Not used | | Randomly chosen | System mean | | Target average shifting | Not used | | Randomly chosen | Item mean | | Power item attack | Power item | Item mean | | | | Power user attack | Copy of the power user’s items and ratings | | | |
|
|