[1] |
Mu R H,Zeng X Q.Collaborative filtering recommendation algorithm based on knowledge graph[J].Mathematical Problems in Engineering,2018(4):1-11.
|
[2] |
Ren Y,Li G,Zhang J,et al.The efficient imputation method for neighborhood-based collaborative filtering[C]∥Proc of the 21st ACM International Conference on Information and Knowledge Management,2012:684-693.
|
[3] |
Ren Y,Li G,Zhou W.Learning rating patterns for top-N recommendations[C]∥Proc of 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining,2012:472-479.
|
[4] |
Yang Z H, Cai Z M. Detecting abnormal profiles in collaborative filtering recommender systems[J].Journal of Intelligent Information Systems,2017,48:499-518.
|
[5] |
Gunes I,Kaleli C,Bilge A,et al.Shilling attacks against re- commender systems:A comprehensive survey[J].Artificial Intelligence Review,2014,42(4):767-799.
|
[6] |
Gao M, Yuan Q, Ling B,et al.Detection of abnormal item based on time intervals for recommender systems[J].The Scientific World Journal,2014,2014:845-897.
|
[7] |
Lee J S,Zhu D.Shilling attack detection—A new approach for a trustworthy recommender system[J].INFORMS Journal on Computing,2012,24(1):117-131.
|
[8] |
Rashid A M,Karypis G,Riedl J.Influence in ratings-based recommender systems:An algorithm-independent approach [C]∥Proc of the 2005 SIAM International Conference on Data Mining,2005:556-560.
|
[9] |
Chirita P A,Nejdl W,Zamfir C.Preventing shilling attacks in online recommender systems[C]∥Proc of the 7th Annual ACM International Workshop on Web Information and Data Management,2005:67-74.
|
[10] |
Burke R,Mobasher B,Williams C,et al.Classification features for attack detection in collaborative recommender systems[C]∥Proc of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2006:542-547.
|
[11] |
Burke R, Mobasher B, Williams C, et al.Detecting profile injection attacks in collaborative recommender systems[C]∥Proc of the 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing,E-Commerce,and E-Services,2006:23.
|
[12] |
Bryan K,O’Mahony M,Cunningham P.Unsupervised retrieval of attack profiles in collaborative recommender systems [C]∥Proc of the 2008 ACM Conference on Recommender Systems,2008:155-162.
|
[13] |
Li Wen-tao,Gao Min,Li Hua,et al.An shilling attack detection algorithm based on popularity degree features[J].Acta Automatica Sinica,2015,41(9):1563-1576.(in Chinese)
|
[14] |
Mehta B. Unsupervised shilling detection for collaborative filtering[C]∥Proc of the 22nd AAAI Conference on Artificial Intelligence,2007:1402-1407.
|
[15] |
Mehta B,Nejdl W.Unsupervised strategies for shilling detection and robust collaborative filtering[J].User Modeling and User-Adapted Interaction,2009,19(1):65-97.
|
[16] |
Li Cong,Luo Zhi-gang. Detecting shilling attacks in recommender systems based on non-random-missing mechanism[J].Acta Automatica Sinica,2013,39(10):1681-1690.(in Chinese)
|
[17] |
Cao J,Wu Z,Mao B,et al.Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system[J].World Wide Web,2013,16(5):729-748.
|
[18] |
Wu Z, Cao J, Mao B, et al.Semi-SAD:Applying semi- supervised learning to shilling attack detection [C]∥Proc of the 5th ACM Conference on Recommender Systems,2011:289-292.
|
[19] |
MoviesLens dataset[EB/OL].[2020-06-15].http://www.cs.umn.edu/Research/GroupLens/index.html.
|
[20] |
Yang Z H,Xu L,Cai Z M,et al.Re-scale AdaBoost for attack detection in collaborative filtering recommender systems[J].Knowledge-Based Systems,2016,100:74-88.
|
[21] |
Li Hong-bo,Peng San-cheng,Bai Jin-bo,et al.The analysis of a class of decision tree ID3 algorithms[J].Software Guide,2016,15(2):30-32.(in Chinese)
|
[22] |
Wei Xing-jun, Gu Qing-hua.Semi-supervised detection of shilling attack for recommender system based on character- istic index[J].Application Research of Computers,2018,35(7):2185-2188.(in Chinese)
|
|
附中文参考文献:
|
[13] |
李文涛,高旻,李华,等.一种基于流行度分类特征的托攻击检测算法[J].自动化学报,2015,41(9):1563-1576.
|
[16] |
李聪,骆志刚.基于数据非随机缺失机制的推荐系统托攻击探测[J].自动化学报,2013,39(10):1681-1690.
|
[21] |
李泓波,彭三城,白劲波,等.一类决策树ID3改进算法探究[J].软件导刊,2016,15(2):30-32.
|
[22] |
卫星君,顾清华.基于特征指标推荐系统托攻击半监督检测[J].计算机应用研究,2018,35(7):2185-2188.
|