參考文獻 |
Bibliography
[1] A. Bilge, Z. Ozdemir, and H. Polat, “A novel shilling attack detection method”, Procedia Computer Science, Vol 31, 2014, pp.165-174.
[2] Amazon Files Suit against Individuals Offering Fake Product Reviews on Fiverr.com, Retrieved from https://techcrunch.com/2015/10/16/amazon-files-suit-against-individuals- offering-fake-product-reviews-on-fiverr-com/, 2015.
[3] A. Jøsang and R. Ismail, “The beta reputation system”, In Proceedings of the 15th Bled Conference on Electronic Commerce Conference, Bled, Slovenia, 2002.
[4] A. Whitrby, A. Jøsang and J. Indulska,“Filtering out unfair ratings in Bayesian reputation
system”, In Proceedings of the Third International Joint Conference on Autonomous Agents
and Multi Agent Systems, 2004.
[5] B. Mehta, T. Hofmann and P. Fankhauser, “Lies and propaganda: Detecting spam users in collaborative filtering”, In Proceedings of the 12th International Conference on Intelligent User Interfaces, Honolulu Hi USA, 2007.
[6] B. Mehta, “Unsupervised shilling detection for collaborative filtering”, In Proceedings of the 22nd National Conference on Artificial Intelligence, British Columbia Canada, 2007.
[7] B. Mehta and W. Nejdl, “Unsupervised strategies for shilling detection and robust collaborative filtering”, User Modeling and User-Adapted Interaction, Vol 19, 2009, pp.65- 97.
[8] B. Mobasher, “Secure personalization: Building trustworthy recommender system”, In 10th DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries, Corfu Greece, 2007.
[9] B. Mobasher, R. Burke, R. Bhaumik and C. Williams, “Towards trustworthy recommender systems: an analysis of attack models and algorithm robustness”, ACM Transactions on Internet Technology, Vol 7(4), 2007, pp.23-38.
[10] B. Mobasher, R. Burke, R. Bhaumik and J.J. Sandvig, “Attacks and remedies in collaborative recommendation”, IEEE Intelligent System, Vol 22(3), 2007, pp.56-63.
40
[11] B. Sun, X. Luo, M. Akiyama, T. Watanabe, and T. Mori, “PADetective: A systematic approach to automate detection of promotional attackers in mobile app store”, Journal of Information Processing, Vol. 26, 2018, pp.212-223.
[12] C.A. Williams, B. Mobasher, and R. Burke, “Defending recommender systems detection of profile injection attacks”, Service Oriented Computing and Applications, Vol 1, 2007, pp.157- 170.
[13] C.C. Aggarwal, Recommender systems – The textbook, Springer, 2016
[14] C. Li and Z. Luo, “A hybrid item-based recommendation algorithm against segment attack in collaborative filtering systems”, In 2011 International Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, China. 2011.
[15] C. Williams, B. Mobasher, R. Burke, J. Sandvig and R. Bhaumik, “Detection of obfuscated attacks in collaborative recommender systems”, In ECAI′06 Proceedings of the 17th European Conference on Artificial Intelligence, Riva del Garda Italy, 2006.
[16] C.Y. Chung, P.Y. Hsu and S.H. Huang, “βP: A novel approach to filter out malicious rating profiles from recommender systems”, Decision Support Systems, Vol 55, 2013, pp.314-325.
[17] Data Science Movies Recommendation System, Retrieved from
https://www.datasciencecentral.com/profiles/blogs/data-science-movies-recommendation- system, 2020.
[18] D. Ramalingam and V. Chinnaiah, “Fake profile detection techniques in large-scale online social networks: A comprehensive review”, Computers and Electrical Engineering, Vol 65, 2017, pp.165-177.
[19] E. Lim, V.-A. Nguyen, N. Jindal, B. Liu and H. Lauw, “Detecting product review spammers using rating behaviors”, In Proceedings of the 19th ACM International Conference on Information and Knowledge Management CIKM ’10, Toronto Canada, 2010.
nd
[20] F.Ricci, L.Rokach and B.Shapira, Recommender systems Handbook 2
, Springer, 2015
[21] F. Zhang, Z. Ling and S. Wang, “Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours”, IET Information Security, Vol 13(3), 2019, pp.174-187.
41
[22] GroupLens Lab, MovieLens Dataset, https://grouplens.org/datasets/movielens/ accessed 15 January 2019.
[23] H. Yu and F. Zhang, “Collaborative filtering recommender system in adversarial environment”, In Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian China, 2012.
[24] I. Gunes, C. Kaleli, A. Bilge and H. Polat, “Shilling attacks against recommender systems: A comprehensive survey”, Artificial Intelligence Review, Vol 42, 2012, pp.767-799.
[25] It’s about ethics in user reviews – how to get a positive Steam critique of your game for $5, Retrieved from http://www.pcgamesn.com/its-about-ethics-in-user-reviews-how-to-get-a- positive-steam-critique-for-$5, 2016.
[26] J. Zou, and F. Fekri, “A belief propagation approach of detecting smiling attacks in collaborative filtering”, In CIKM’13 Proceedings of the 22nd ACM international conference on information & knowledge management, 2013.
[27] Long tail, WiKi, Retrieved from https://en.wikipedia.org/wiki/Long_tail, 2020.
[28] Long tail, Wired,Retrieved from https://www.wired.com/2004/10/tail/, 2004.
[29] L. Yang, W. Huang and X. Niu, “Defending shilling attacks in recommender systems using soft co-clustering”, IEF Information Security, Vol 11(6), 2017, pp.319-325.
[30] M. Gao, B. Ling, Q. Yuan, Q. Xiong, and L. Yang, “A robust collaborative filtering approach based on user relationships for recommendation systems”, Mathematical Problems in Engineering, Vol 1, 2014, pp.1-8.
[31] M.J. Pazzani, “A framework for collaborative, content-based and demographic filtering”, Artificial Intelligence Review, Vol 13(5-6), 1999, pp.393-408.
[32] M.P. O’Mahony, N.J. Hurley and G.C.M. Silvestre, “Collaborative filtering - safe and sound?”, Foundations of Intelligent Systems, Vol 2871, 2003, pp.506-510.
[33] N. Hurley, Z. Cheng and M. Zhang, “Statistical attack detection”, In Proceedings of the Third ACM Conference on Recommender Systems, ACM Press, 2009.
[34] P. Johnson and M. Beverlin, Beta Distribution, 2013.
42
[35] P. Resnick and H. Varian, “Recommender systems”, Communications of the ACM, Vol 40(3), 1997.
[36] R. Balani, “Role of e-commerce in changing business environment”, International Journal of Advanced Research in Commerce, Management & Social Science, Vol 02(3), 2019, pp.109- 112.
[37] R. Burke, “Hybrid Recommender systems: survey and experiments”, User Modeling and User-Adapted Interaction, Vol 12(4), 2002.
[38] R. Bhaumik, C. Williams, B. Mobasher and R. Burke, “Securing collaborative filtering against malicious attacks through anomaly detection”, In Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization, Boston, MA, 2006.
[39] R. Burke, B. Mobasher, C. Williams and R, Bhaumik, “Classification features for attack detection in collaborative recommender systems”, KDD ′06 Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2006.
[40] R. K. Dewang and A. K. Singh, “State-of-art approaches for review spammer detection: A survey”, Journal of Intelligent Information Systems, Vol 50(2), 2018, pp.231-264.
[41] S. Lam and J. Riedl, “Shilling recommender systems for fun and profit”, Proc. Int. Conf. World Wide Web WWW’04, 2004, pp.393–402.
[42] W. Zhou, J. Wen, Y.S. Koh, S. Alam, and G. Dobbie, “Attack detection in recommender systems based on target item analysis”, 2014 International Joint Conference on Neural Networks (IJCNN), 2014, pp.332-339.
[43] X. Luo, Y. Xia and O. Zhu, “Incremental collaborative filtering recommender based on regularized matrix factorization”, Knowledge-Based Systems, Vol 27, 2012, pp.271-280.
[44] X. Su and T.M. Khoshgoftaar, “A survey of collaborative filtering techniques”, Advances in Artificial Intelligence, Vol 2009, 2009, 19 pages. |