Articles with "shilling attacks" as a keyword



Photo by sajadnori from unsplash

Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2905862

Abstract: As the use of recommender systems becomes generalized in society, the interest in varying the orientation of their recommendations is increasing. There are shilling attacks’ strategies that introduce malicious profiles in collaborative filtering recommender systems… read more here.

Keywords: recommender systems; filtering recommender; collaborative filtering; reliability ... See more keywords
Photo by sebbill from unsplash

Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3022962

Abstract: The internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them. Recommendation System is a special type of information… read more here.

Keywords: attacks detection; understanding shilling; comprehensive survey; detection ... See more keywords