Semi-SAD: Applying semi-supervised learning to shilling attack detection
2011 (English)In: RecSys - Proc. ACM Conf. Recomm. Syst., 2011, 289-292 p.Conference paper (Refereed)
Collaborative filtering (CF) based recommender systems are vulnerable to shilling attacks. In some leading e-commerce sites, there exists a large number of unlabeled users, and it is expensive to obtain their identities. Existing research efforts on shilling attack detection fail to exploit these unlabeled users. In this article, Semi-SAD, a new semi-supervised learning based shilling attack detection algorithm is proposed. Semi-SAD is trained with the labeled and unlabeled user profiles using the combination of naïve Bayes classifier and EM-λ, augmented Expectation Maximization (EM). Experiments on MovieLens datasets show that our proposed Semi-SAD is efficient and effective.
Place, publisher, year, edition, pages
2011. 289-292 p.
, RecSys'11 - Proceedings of the 5th ACM Conference on Recommender Systems
em, naïve bayes, semi-supervised learning, shilling attack detection, Attack detection, Bayes Classifier, Collaborative filtering, Data sets, E-commerce sites, Expectation Maximization, Research efforts, User profile, Recommender systems, Supervised learning
IdentifiersURN: urn:nbn:se:kth:diva-150656DOI: 10.1145/2043932.2043985ScopusID: 2-s2.0-82555183087ISBN: 9781450306836OAI: oai:DiVA.org:kth-150656DiVA: diva2:746286
5th ACM Conference on Recommender Systems, RecSys 2011, 23-27 October 2011, Chicago, IL. USA
QC 201409122014-09-122014-09-082014-09-12Bibliographically approved