[1]Zhang Jing, He Famei, Qiu Yun. Inspection method of the attack on personalized recommendation system description file[J]. Journal of University of Electronic Science and Technology,2011, 40(2):250254. (in Chinese)
[2]Vapnik V N.Statistical learning theory[M].New York:Wiley,1998.
[3]Vapnik V N .The mature of statistical learning theory[M].Germany:Springer,2000.
[4]Williams C A,Mobasher B,Burke R D.Defending recommender systems:Detection of profile injection attacks[J].Service Oriented Computing and Applications,2007,1(3):157170.
[5]Li Cong, Luo Zhigang, Shi Jinlong. An unsupervised algorithm for detecting shilling attacks on recommender systems[J].Acta Automatica Sinica,2011,37(2):160167.(in Chinese)
[6]Breiman L, Friedman J H, OlshenR A, et al. Classification and regression trees[M]. California:Wadsworth International Group,1984.
[7]Veropoulos K,Campbell C,Cristianini N.Controlling the sensitivity of support vector machines[C]∥Proc of the International Joint Conference on AI(IJCAI’1999), 1999:5560.
[8]Burges C. A tutorial on support vector machines from pattern recognition[J].Data Mining and Knowledge Discovery,1998, 13(2):121167.
[9]Paola C, Elena C, Giorgio V. Support vector machines for candidate modules classification [J].Neurocomputing,2005,68(4):281288.
[10]Japkowicz N.Conceptlearning in the presence of betweenclass and withinclass imbalances[C]∥Proc of CSCSI’01, 2001:6777.
[11]Platt J C. Probabilistic output for support vector machine and comparisons to regularized likelihood methods[M]. Boston:MIT Press,1999.
[12]http://www.grouplens.org/node/73.
[13]Burke R,Mobasher B,Williams C. Classification features for attack detection in collaborative recommender systems[C]∥Proc of ICKDDM’06,2006:156167.
附中文参考文献:
[1]张靖,何发镁,邱云. 个性化推荐系统描述文件攻击检测方法[J]. 电子科技大学学报,2011, 40(2):250254.
[5]李聪,骆志刚,石金龙.一种探测推荐系统托攻击的无监督方法[J].自动化学报, 2011, 37(2):160167. |