An algorithmic framework for performing collaborative filtering
Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Item-based collaborative filtering recommendation algorithms
Proceedings of the 10th international conference on World Wide Web
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
Collaborative recommendation: A robustness analysis
ACM Transactions on Internet Technology (TOIT)
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
ACM Transactions on Internet Technology (TOIT)
Hi-index | 0.00 |
Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. Collaborative Filtering (CF), one of the most successful technologies in recommender systems suffers from improper use of personal information and the incredibility of recommendations. To deal with these issues, we have been focusing on the trust relationships between individuals, i.e. web of trust, especially for protecting the recommender system against profile injection attack. Based on trust propagation scheme, we proposed TCFMAarchitecture which is added agent-based scheme obtaining attack resistance property as well as improving the efficiency of distributed computing. In web of trust, users' personal agents find a unique migration path made up of latent neighborhoods and reduce search scope to a reasonable level for mobile agents by using the Advogatoalgorithm. The experimental evaluation on Epinions.comdatasets shows that the proposed method brings significant advantages in terms of dealing with profile injection attack without any loss of prediction quality.