Abstract
The recommender system based on collaborative filtering is vulnerable to shilling attacks due to its open nature. With the wide employment of recommender systems, an increasing number of attackers are disordering the system in order to benefit from the manipulated recommendation results. Therefore, how to effectively detect shilling attacks now becomes more and more crucial. Most existing detection models recognize attackers in statistics-based manners. However, they failed in capturing the fine-grained interactions between users and items, leading to a degradation in detection accuracy. In this paper, inspired by the success of word embedding models, we propose a collaborative shilling detection model, CoDetector, which jointly decomposes the user-item interaction matrix and the user-user co-occurrence matrix with shared user latent factors. Then, the learned user latent factors containing network embedding information are used as features to detect attackers. Experiments conducted on simulated and real-world datasets show that CoDetector has a good performance and generalization capacity and outperforms state-of-the-art methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: International Conference on World Wide Web, pp. 393–402. ACM (2004)
Yu, J., et al.: Hybrid attacks on model-based social recommender systems. Phys. Stat. Mech. Its Appl. 483, 171–181 (2017)
Levy, O., Goldberg, Y.: Neural word embedding as implicit matrix factorization. In: Advances in Neural Information Processing Systems, vol. 3, pp. 2177–2185 (2014)
Mikolov, T., et al. : Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26, pp. 3111–3119 (2013)
Burke, R., et al.: Classification features for attack detection in collaborative recommender systems. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542–547. ACM (2006)
Chirita, P.-A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management. ACM (2005)
Li, W., et al.: Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Trans. Inf. Syst. 99(10), 2600–2611 (2016)
Mobasher, B., Burke, R., Williams, C., Bhaumik, R.: Analysis and detection of segment-focused attacks against collaborative recommendation. In: Nasraoui, O., Zaïane, O., Spiliopoulou, M., Mobasher, B., Masand, B., Yu, P.S. (eds.) WebKDD 2005. LNCS (LNAI), vol. 4198, pp. 96–118. Springer, Heidelberg (2006). https://doi.org/10.1007/11891321_6
Burke, R., et al.: Segment-based injection attacks against collaborative filtering recommender systems. In: Fifth IEEE International Conference on Data Mining. IEEE (2005)
Cao, J., et al.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)
Zhang, Z., Kulkarni, S.R.: Graph-based detection of shilling attacks in recommender systems. In: 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP). IEEE (2013)
Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(8), 30–37 (2009)
Mikolov, T., et al.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)
Zhang, Y., et al.: Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: IJCAI (2015)
Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User Adapt. Interact. 19(1), 65–97 (2009)
Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31(1), 31–39 (2016)
Wu, Z.A., Wang, Y.Q., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Chin. Sci. Bull. 59(7), 551–560 (2014)
Wu, Z., et al.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM). IEEE (2015)
Li, X.-L., et al.: Positive unlabeled learning for data stream classification. In: Proceedings of the 2009 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics (2009)
Xu, C., et al.: Uncovering collusive spammers in Chinese review websites. In: ACM International Conference on Conference on Information and Knowledge Management, pp. 979–988. ACM (2013)
Acknowledgment
This research is supported by the National Key Basic Research Program of China (973) (2013CB328903), and the Graduate Scientific Research and Innovation Foundation of Chongqing (cys17035).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q. (2018). Collaborative Shilling Detection Bridging Factorization and User Embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-00916-8_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00915-1
Online ISBN: 978-3-030-00916-8
eBook Packages: Computer ScienceComputer Science (R0)