Filler Item Strategies for Shilling Attacks against Recommender Systems
Citations
273 citations
Cites background from "Filler Item Strategies for Shilling..."
...This attack requires high level knowledge; and therefore, it is hard to implement (Burke et al. 2006b; Mehta et al. 2007a,b; Mehta and Nejdl 2008; Mobasher et al. 2007b; Ray and Mahanti 2009b)....
[...]
...Ray and Mahanti (2009a) propose an intelligent strategy for selecting filler items to realize more effective shilling attacks....
[...]
...Random attacks are easy to implement, however, not very much effective (Burke et al. 2005a,b; Burke et al. 2006a; Mobasher et al. 2007a; Mobasher et al. 2007b; Ray and Mahanti 2009b)....
[...]
78 citations
Cites background from "Filler Item Strategies for Shilling..."
...Ray and Mahanti (2009) explore the importance of target item and filler items in mounting effective shilling attacks....
[...]
3 citations
3 citations
2 citations
Cites background from "Filler Item Strategies for Shilling..."
...[Sanjog R and Ambuj M (2009][72] proposed an approach for creating attack models and explores the importance of target item and filler items in mounting effective shilling attacks and the attack strategies are based on intelligent selection of filler items....
[...]
References
8,634 citations
"Filler Item Strategies for Shilling..." refers methods in this paper
...In item-based collaborative filtering [ 7 ], similarities between the various items are computed....
[...]
2,686 citations
2,657 citations
639 citations
460 citations
"Filler Item Strategies for Shilling..." refers background or methods in this paper
...We discuss below, some of the popular attack models on which much research is focused on. A comprehensive study of different attack models can be found in [ 3 ]....
[...]
...It has been shown that segmented attack is the most effective model against in-segment users [ 3 ]....
[...]
...It has been found that this model is not very effective [ 3 ]....
[...]
...However, it has been found that average attack is more effective compared to bandwagon and segmented attack when effectiveness is measured across all users [ 3 ]....
[...]
...For implementation of segmented attack we followed the same guidelines as stated in [ 3 ]....
[...]