Security and Communication Networks / 2019 / Article / Tab 1

Research Article

Detecting Shilling Attacks with Automatic Features from Multiple Views

Table 1

The common attack models.

Attack model
ItemsRatingItemsRatingRating

Random attackNot usedRandomly chosenSystem mean
Average attackNot usedRandomly chosenItem mean
AoP attackNot usedTop x% of most popular itemsItem mean
User random shiftingNot usedRandomly chosenSystem mean+random
User average shiftingNot usedRandomly chosenItem mean+random
Target random shiftingNot usedRandomly chosenSystem mean
Target average shiftingNot usedRandomly chosenItem mean
Power item attackPower itemItem mean
Power user attackCopy of the power user’s items and ratings

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.