Using collaborative filtering to weave an information tapestry
Communications of the ACM - Special issue on information filtering
GroupLens: an open architecture for collaborative filtering of netnews
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Social information filtering: algorithms for automating “word of mouth”
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An algorithmic framework for performing collaborative filtering
Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Combining collaborative filtering with personal agents for better recommendations
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Item-based collaborative filtering recommendation algorithms
Proceedings of the 10th international conference on World Wide Web
E-Commerce Recommendation Applications
Data Mining and Knowledge Discovery
Eigentaste: A Constant Time Collaborative Filtering Algorithm
Information Retrieval
Is seeing believing?: how recommender system interfaces affect users' opinions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Promoting Recommendations: An Attack on Collaborative Filtering
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Toward a personal recommender system
Toward a personal recommender system
Collaborative recommendation: A robustness analysis
ACM Transactions on Internet Technology (TOIT)
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Empirical analysis of predictive algorithms for collaborative filtering
UAI'98 Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence
Proceedings of the 10th international conference on Intelligent user interfaces
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Finding group shilling in recommendation system
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Improved recommendation systems
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Collaborate with strangers to find own preferences
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Preventing shilling attacks in online recommender systems
Proceedings of the 7th annual ACM international workshop on Web information and data management
Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Is trust robust?: an analysis of trust-based recommendation
Proceedings of the 11th international conference on Intelligent user interfaces
Detecting noise in recommender system databases
Proceedings of the 11th international conference on Intelligent user interfaces
Scouts, promoters, and connectors: the roles of ratings in nearest neighbor collaborative filtering
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Improving collaborative filtering with trust-based metrics
Proceedings of the 2006 ACM symposium on Applied computing
Analysis of a low-dimensional linear model under recommendation attacks
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Classification features for attack detection in collaborative recommender systems
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Attack detection in time series for recommender systems
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Lies and propaganda: detecting spam users in collaborative filtering
Proceedings of the 12th international conference on Intelligent user interfaces
Securing decentralized reputation management using TrustGuard
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Web Intelligence and Agent Systems
Scouts, promoters, and connectors: The roles of ratings in nearest-neighbor collaborative filtering
ACM Transactions on the Web (TWEB)
Attacks and Remedies in Collaborative Recommendation
IEEE Intelligent Systems
Attacking Recommender Systems: A Cost-Benefit Analysis
IEEE Intelligent Systems
Introduction to intelligent techniques for Web personalization
ACM Transactions on Internet Technology (TOIT)
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
ACM Transactions on Internet Technology (TOIT)
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
The influence limiter: provably manipulation-resistant recommender systems
Proceedings of the 2007 ACM conference on Recommender systems
Robust collaborative filtering
Proceedings of the 2007 ACM conference on Recommender systems
Robustness of collaborative recommendation based on association rule mining
Proceedings of the 2007 ACM conference on Recommender systems
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Examining the motivations of defection in large-scale open systems
Proceedings of the 2008 ACM symposium on Applied computing
Using data mining and recommender systems to scale up the requirements process
Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems
Attack resistant collaborative filtering
Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval
The information cost of manipulation-resistance in recommender systems
Proceedings of the 2008 ACM conference on Recommender systems
Unsupervised retrieval of attack profiles in collaborative recommender systems
Proceedings of the 2008 ACM conference on Recommender systems
Crafting the initial user experience to achieve community goals
Proceedings of the 2008 ACM conference on Recommender systems
PITTCULT: trust-based cultural event recommender
Proceedings of the 2008 ACM conference on Recommender systems
Collaborative web search: a robustness analysis
Artificial Intelligence Review
Manipulation-resistant recommender systems through influence limits
ACM SIGecom Exchanges
Unsupervised strategies for shilling detection and robust collaborative filtering
User Modeling and User-Adapted Interaction
Rater Credibility Assessment in Web Services Interactions
World Wide Web
Strategies for Effective Shilling Attacks against Recommender Systems
Privacy, Security, and Trust in KDD
Model-based collaborative filtering as a defense against profile injection attacks
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
RATEWeb: Reputation Assessment for Trust Establishment among Web services
The VLDB Journal — The International Journal on Very Large Data Bases
Recommender systems: attack types and strategies
AAAI'05 Proceedings of the 20th national conference on Artificial intelligence - Volume 1
Unsupervised shilling detection for collaborative filtering
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Effective diverse and obfuscated attacks on model-based recommender systems
Proceedings of the third ACM conference on Recommender systems
Proceedings of the third ACM conference on Recommender systems
Manipulation-resistant collaborative filtering systems
Proceedings of the third ACM conference on Recommender systems
An incentive-based architecture for social recommendations
Proceedings of the third ACM conference on Recommender systems
On the limitations of browsing top-N recommender systems
Proceedings of the third ACM conference on Recommender systems
ServiceTrust: Supporting Reputation-Oriented Service Selection
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
A collusion-resistant automation scheme for social moderation systems
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A survey of collaborative filtering techniques
Advances in Artificial Intelligence
Coping with noisy search experiences
Knowledge-Based Systems
Data mining for web personalization
The adaptive web
Collaborative filtering recommender systems
The adaptive web
SpotRank: a robust voting system for social news websites
Proceedings of the 4th workshop on Information credibility
A P2P trust model based on multi-dimensional trust evaluation
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
Impact of relevance measures on the robustness and accuracy of collaborative filtering
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
A new reputation mechanism against dishonest recommendations in P2P systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Detecting profile injection attacks in collaborative filtering: a classification-based approach
WebKDD'06 Proceedings of the 8th Knowledge discovery on the web international conference on Advances in web mining and web usage analysis
ICRep: an incentive compatible reputation mechanism for P2P systems
WISA'07 Proceedings of the 8th international conference on Information security applications
Social networks and interest similarity: the case of CiteULike
Proceedings of the 21st ACM conference on Hypertext and hypermedia
How to measure the information similarity in unilateral relations: the case study of Delicious
Proceedings of the International Workshop on Modeling Social Media
On the stability of recommendation algorithms
Proceedings of the fourth ACM conference on Recommender systems
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Reliable medical recommendation systems with patient privacy
Proceedings of the 1st ACM International Health Informatics Symposium
Categorizing user interests in recommender systems
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II
Achieving optimal privacy in trust-aware social recommender systems
SocInfo'10 Proceedings of the Second international conference on Social informatics
Social manipulation of online recommender systems
SocInfo'10 Proceedings of the Second international conference on Social informatics
Analysis of robustness in trust-based recommender systems
RIAO '10 Adaptivity, Personalization and Fusion of Heterogeneous Information
Improving recommendations using WatchingNetworks in a social tagging system
Proceedings of the 2011 iConference
Temporal defenses for robust recommendations
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
A Case Study of Collaboration and Reputation in Social Web Search
ACM Transactions on Intelligent Systems and Technology (TIST)
Secure personalized recommendation system for mobile user
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Robustness of recommender systems
Proceedings of the fifth ACM conference on Recommender systems
Content-driven detection of campaigns in social media
Proceedings of the 20th ACM international conference on Information and knowledge management
Vulnerabilities and countermeasures in context-aware social rating services
ACM Transactions on Internet Technology (TOIT)
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Quality and Leniency in Online Collaborative Rating Systems
ACM Transactions on the Web (TWEB)
Trust model based on similarity measure of vectors in p2p networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
A comparison of on-line computer science citation databases
ECDL'05 Proceedings of the 9th European conference on Research and Advanced Technology for Digital Libraries
Intelligent techniques for web personalization
ITWP'03 Proceedings of the 2003 international conference on Intelligent Techniques for Web Personalization
Analysis and detection of segment-focused attacks against collaborative recommendation
WebKDD'05 Proceedings of the 7th international conference on Knowledge Discovery on the Web: advances in Web Mining and Web Usage Analysis
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Collaborative Filtering Recommender Systems
Foundations and Trends in Human-Computer Interaction
Recommender systems: from algorithms to user experience
User Modeling and User-Adapted Interaction
Journal of Theoretical and Applied Electronic Commerce Research
Preventing recommendation attack in trust-based recommender systems
Journal of Computer Science and Technology - Special issue on Community Analysis and Information Recommendation
HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
The effect of suspicious profiles on people recommenders
UMAP'12 Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization
Stability of Recommendation Algorithms
ACM Transactions on Information Systems (TOIS)
LFTM, linguistic fuzzy trust mechanism for distributed networks
Concurrency and Computation: Practice & Experience
WSANRep, WSAN Reputation-Based Selection in Open Environments
Wireless Personal Communications: An International Journal
Clustering users to explain recommender systems' performance fluctuation
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on agent communication, trust in multiagent systems, intelligent tutoring and coaching systems
Knowledge-Based Systems
βP: A novel approach to filter out malicious rating profiles from recommender systems
Decision Support Systems
Multi-source deep learning for information trustworthiness estimation
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Defending imitating attacks in web credibility evaluation systems
Proceedings of the 22nd international conference on World Wide Web companion
When power users attack: assessing impacts in collaborative recommender systems
Proceedings of the 7th ACM conference on Recommender systems
A belief propagation approach for detecting shilling attacks in collaborative filtering
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Reliable medical recommendation systems with patient privacy
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
Accuracy and robustness impacts of power user attacks on collaborative recommender systems
Proceedings of the 7th ACM conference on Recommender systems
Privacy-preserving matrix factorization
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Campaign extraction from social media
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Recommending additional study materials: binary ratings vis-à-vis five-star ratings
BCS-HCI '13 Proceedings of the 27th International BCS Human Computer Interaction Conference
Defending recommender systems by influence analysis
Information Retrieval
Hi-index | 0.00 |
Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have become particularly common is in e-commerce, where recommendation of items can often help a customer find what she is interested in and, therefore can help drive sales. Unscrupulous producers in the never-ending quest for market penetration may find it profitable to shill recommender systems by lying to the systems in order to have their products recommended more often than those of their competitors. This paper explores four open questions that may affect the effectiveness of such shilling attacks: which recommender algorithm is being used, whether the application is producing recommendations or predictions, how detectable the attacks are by the operator of the system, and what the properties are of the items being attacked. The questions are explored experimentally on a large data set of movie ratings. Taken together, the results of the paper suggest that new ways must be used to evaluate and detect shilling attacks on recommender systems.