Strategies for Effective Shilling Attacks against Recommender Systems
Citations
2,639 citations
Cites background from "Strategies for Effective Shilling A..."
...RS are still highly vulnerable to such attacks [191]....
[...]
273 citations
51 citations
50 citations
Cites background from "Strategies for Effective Shilling A..."
...RS are still highly vulnerable to such attacks (Ray & Mahanti, 2009)....
[...]
40 citations
References
8,634 citations
"Strategies for Effective Shilling A..." refers methods in this paper
...In item based collaborative filtering [ 10 ], similarities between the various items are computed....
[...]
2,686 citations
2,657 citations
"Strategies for Effective Shilling A..." refers methods in this paper
...This technique mainly relies on explicit ratings given by the user and is the most successful and widely used technique [ 3 ]....
[...]
639 citations
460 citations
"Strategies for Effective Shilling A..." refers background or methods in this paper
...However, it has been found that average attack is more effective compared to bandwagon and segmented attack [ 8 ]....
[...]
...An attack is also classified as a high-knowledge attack or low-knowledge attack [ 8 ]....
[...]
...It has been found that this model is not very effective [ 8 ]....
[...]
...A comprehensive study of different attack models can be found in [ 8 ]....
[...]
...As it is difficult to manipulate the similarities of two items compared to that of two users, item based recommender systems are found to be more robust that user based systems [ 8 ]....
[...]