Getting to know you: learning new user preferences in recommender systems
Proceedings of the 7th international conference on Intelligent user interfaces
Combinatorial Information Market Design
Information Systems Frontiers
Promoting Recommendations: An Attack on Collaborative Filtering
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
Improved recommendation systems
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Preventing shilling attacks in online recommender systems
Proceedings of the 7th annual ACM international workshop on Web information and data management
Detecting noise in recommender system databases
Proceedings of the 11th international conference on Intelligent user interfaces
Prediction, Learning, and Games
Prediction, Learning, and Games
Lies and propaganda: detecting spam users in collaborative filtering
Proceedings of the 12th international conference on Intelligent user interfaces
Eliciting Informative Feedback: The Peer-Prediction Method
Management Science
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
ACM Transactions on Internet Technology (TOIT)
Algorithms and incentives for robust ranking
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Trust no one: evaluating trust-based filtering for recommenders
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Competitive collaborative learning
COLT'05 Proceedings of the 18th annual conference on Learning Theory
Computational challenges in e-commerce
Communications of the ACM - Rural engineering development
The information cost of manipulation-resistance in recommender systems
Proceedings of the 2008 ACM conference on Recommender systems
Manipulation-resistant recommender systems through influence limits
ACM SIGecom Exchanges
Sybilproof transitive trust protocols
Proceedings of the 10th ACM conference on Electronic commerce
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Proceedings of the third ACM conference on Recommender systems
Manipulation-resistant collaborative filtering systems
Proceedings of the third ACM conference on Recommender systems
Rating aggregation in collaborative filtering systems
Proceedings of the third ACM conference on Recommender systems
Incentivizing connectivity in structured Peer-to-Peer systems
Web Intelligence and Agent Systems
SpotRank: a robust voting system for social news websites
Proceedings of the 4th workshop on Information credibility
Evaluating the dynamic properties of recommendation algorithms
Proceedings of the fourth ACM conference on Recommender systems
Spatio-temporal proximity and social distance: a confirmation framework for social reporting
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Social manipulation of online recommender systems
SocInfo'10 Proceedings of the Second international conference on Social informatics
Temporal defenses for robust recommendations
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Information market based recommender systems fusion
Proceedings of the 2nd International Workshop on Information Heterogeneity and Fusion in Recommender Systems
Robustness of recommender systems
Proceedings of the fifth ACM conference on Recommender systems
The "top N" news recommender: count distortion and manipulation resistance
Proceedings of the fifth ACM conference on Recommender systems
Collaborative Filtering Recommender Systems
Foundations and Trends in Human-Computer Interaction
Recommender systems: from algorithms to user experience
User Modeling and User-Adapted Interaction
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Macau: a basis for evaluating reputation systems
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Hi-index | 0.00 |
An attacker can draw attention to items that don't deserve that attention by manipulating recommender systems. We describe an influence-limiting algorithm that can turn existing recommender systems into manipulation-resistant systems. Honest reporting is the optimal strategy for raters who wish to maximize their influence. If an attacker can create only a bounded number of shills, the attacker can mislead only a small amount. However, the system eventually makes full use of information from honest, informative raters. We describe both the influence limits and the information loss incurred due to those limits in terms of information-theoretic concepts of loss functions and entropies.