Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorGüneş, İhsan
dc.contributor.authorKaleli, Cihan
dc.contributor.authorBilge, Alper
dc.contributor.authorPolat, Hüseyin
dc.date.accessioned2019-10-21T19:44:24Z
dc.date.available2019-10-21T19:44:24Z
dc.date.issued2014
dc.identifier.issn0269-2821
dc.identifier.issn1573-7462
dc.identifier.urihttps://dx.doi.org/10.1007/s10462-012-9364-9
dc.identifier.urihttps://hdl.handle.net/11421/19873
dc.descriptionWOS: 000345089400012en_US
dc.description.abstractOnline vendors employ collaborative filtering algorithms to provide recommendations to their customers so that they can increase their sales and profits. Although recommendation schemes are successful in e-commerce sites, they are vulnerable to shilling or profile injection attacks. On one hand, online shopping sites utilize collaborative filtering schemes to enhance their competitive edge over other companies. On the other hand, malicious users and/or competing vendors might decide to insert fake profiles into the user-item matrices in such a way so that they can affect the predicted ratings on behalf of their advantages. In the past decade, various studies have been conducted to scrutinize different shilling attacks strategies, profile injection attack types, shilling attack detection schemes, robust algorithms proposed to overcome such attacks, and evaluate them with respect to accuracy, cost/benefit, and overall performance. Due to their popularity and importance, we survey about shilling attacks in collaborative filtering algorithms. Giving an overall picture about various shilling attack types by introducing new classification attributes is imperative for further research. Explaining shilling attack detection schemes in detail and robust algorithms proposed so far might open a lead to develop new detection schemes and enhance such robust algorithms further, even propose new ones. Thus, we describe various attack types and introduce new dimensions for attack classification. Detailed description of the proposed detection and robust recommendation algorithms are given. Moreover, we briefly explain evaluation of the proposed schemes. We conclude the paper by discussing various open questions.en_US
dc.description.sponsorshipTUBITAK [111E218]en_US
dc.description.sponsorshipThis work is partially supported by the Grant 111E218 from TUBITAK.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.isversionof10.1007/s10462-012-9364-9en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectShillingen_US
dc.subjectProfile Injectionen_US
dc.subjectPush/Nuke Attacksen_US
dc.subjectCollaborative Filteringen_US
dc.subjectRobustnessen_US
dc.subjectAttack Detectionen_US
dc.titleShilling attacks against recommender systems: a comprehensive surveyen_US
dc.typearticleen_US
dc.relation.journalArtificial Intelligence Reviewen_US
dc.contributor.departmentAnadolu Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.identifier.volume42en_US
dc.identifier.issue4en_US
dc.identifier.startpage767en_US
dc.identifier.endpage799en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US]
dc.contributor.institutionauthorKaleli, Cihan
dc.contributor.institutionauthorBilge, Alper


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster