Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorYılmazel, Burcu Yurekli
dc.contributor.authorKaleli, Cihan
dc.date.accessioned2019-10-21T20:10:54Z
dc.date.available2019-10-21T20:10:54Z
dc.date.issued2016
dc.identifier.issn0957-4174
dc.identifier.issn1873-6793
dc.identifier.urihttps://dx.doi.org/10.1016/j.eswa.2015.09.012
dc.identifier.urihttps://hdl.handle.net/11421/19953
dc.descriptionWOS: 000365051500020en_US
dc.description.abstractDue to different shopping routines of people, rating preferences of many customers might be partitioned between two parties. Since two different e-companies might sell products from the same range to the identical set of customers, the type of data partition is called arbitrarily. In the case of arbitrarily distributed data, it is a challenge to produce accurate recommendations for those customers, because their ratings are split. Therefore, researchers propose methods for enabling data holders' collaboration. In this scenario, privacy becomes a deterrent barrier for collaboration, accordingly, the introduced solutions include private protocols for protecting parties' confidentiality. Although, private protocols encourage data owners to collaborate, they introduce a new drawback for partnership. Since, whole data is distributed and parties do not have full control of data, any malicious user, who knows that two parties collaborate, can easily insert shilling profiles to system by partitioning them between data holders. Parties can have trouble to find such profile injection attacks by employing existing detection methods because of they are arbitrarily distributed. Since profile injection attacks can easily performed on arbitrarily distributed data-based recommender systems, quality, and reliability of such systems decreases, and it causes angry customers. Therefore, in this paper, we try to describe aforementioned problems with arbitrarily distributed data-based recommender systems. As a first step, we analyze robustness of proposed arbitrarily distributed data-based recommendation methods against six well-known shilling attack types. Secondly, we explain why existing detection methods cannot detect malicious user profiles in distributed data. We perform experiments on a well-known movie data set, and according to our results, arbitrarily distributed data-based recommendation methods are vulnerable to shilling attacksen_US
dc.description.sponsorshipAnadolu University [1403F069]en_US
dc.description.sponsorshipThis work is supported by Anadolu University under grant 1403F069.en_US
dc.language.isoengen_US
dc.publisherPergamon-Elsevier Science LTDen_US
dc.relation.isversionof10.1016/j.eswa.2015.09.012en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectRobustnessen_US
dc.subjectDetectionen_US
dc.subjectShillingen_US
dc.subjectDistributed Dataen_US
dc.subjectArbitrarilyen_US
dc.subjectPrivacyen_US
dc.subjectCollaborative Filteringen_US
dc.titleRobustness analysis of arbitrarily distributed data-based recommendation methodsen_US
dc.typearticleen_US
dc.relation.journalExpert Systems With Applicationsen_US
dc.contributor.departmentAnadolu Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.identifier.volume44en_US
dc.identifier.startpage217en_US
dc.identifier.endpage229en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.contributor.institutionauthorKaleli, Cihan


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster