Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Generating A New Shilling Attack for Recommendation Systems

    Pradeep Kumar Singh1, Pijush Kanti Dutta Pramanik1, Madhumita Sardar1, Anand Nayyar2,3,*, Mehedi Masud4, Prasenjit Choudhury1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2827-2846, 2022, DOI:10.32604/cmc.2022.020437

    Abstract A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing. To keep the recommendation systems reliable, authentic, and superior, the security of these systems is very crucial. Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks, in this paper, we prove that they fail to detect a new or unknown attack. We develop a new attack model, named Obscure attack, with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended. The Obscure attack is able to… More >

  • Open Access

    ARTICLE

    DPIF: A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks

    Mohan Li1, Yanbin Sun1, *, Shen Su1, Zhihong Tian1, Yuhang Wang1, *, Xianzhi Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 331-344, 2019, DOI:10.32604/cmc.2019.05379

    Abstract Maliciously manufactured user profiles are often generated in batch for shilling attacks. These profiles may bring in a lot of quality problems but not worthy to be repaired. Since repairing data always be expensive, we need to scrutinize the data and pick out the data that really deserves to be repaired. In this paper, we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks. A two-steps framework named DPIF is proposed for the distinguishment. Based on the framework, the metrics of homology and suspicious degree are proposed. The homology can… More >

Displaying 1-10 on page 1 of 2. Per Page