Identifying attack models for securing cluster-based recommendation system

被引:0
|
作者
Ahmad A. [1 ]
Ahmad T. [1 ]
Tripathi I. [1 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
来源
Recent Patents on Engineering | 2020年 / 14卷 / 03期
关键词
Attack models; Collaborative filtering; Game theory; Recommendation system; Security; Shapley value;
D O I
10.2174/1872212114666200403091053
中图分类号
学科分类号
摘要
The immense growth of information has led to the wide usage of recommender systems for retrieving relevant information. One of the widely used methods for recommendation is collaborative filtering. However, such methods suffer from two problems, scalability and sparsity. In the proposed research, the two issues of collaborative filtering are addressed and a cluster-based recommender system is proposed. For the identification of potential clusters from the underlying network, the Shapley value concept is used, which divides users into different clusters. After that, the recommendation algorithm is performed in every respective cluster. The proposed system recommends an item to a specific user based on the ratings of the item’s different attributes. Thus, it reduces the running time of the overall algorithm, since it avoids the overhead of computation involved when the algorithm is executed over the entire dataset. Besides, the security of the recommender system is one of the major concerns nowadays. Attackers can come in the form of ordinary users and introduce bias in the system to force the system function that is advantageous for them. In this paper, we identify different attack models that could hamper the security of the proposed cluster-based recommender system. The efficiency of the proposed research is validated by conducting experiments on student dataset. © 2020 Bentham Science Publishers.
引用
收藏
页码:324 / 338
页数:14
相关论文
共 50 条
  • [21] Unprecedented enantioselectivity in a cluster-based catalytic system
    Moberg, Viktor
    Haukka, Matti
    Koshevoy, Igor O.
    Ortiz, Roberto
    Nordlander, Ebbe
    ORGANOMETALLICS, 2007, 26 (17) : 4090 - 4093
  • [22] Cluster-based distributed data collecting system
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Gongcheng, 2006, 14 (46-48):
  • [23] Identifying and tracking climate change mitigation strategies with a cluster-based assessment
    D'Arcangelo, Filippo Maria
    Kruse, Tobias
    Pisu, Mauro
    NPJ CLIMATE ACTION, 2024, 3 (01):
  • [24] Cluster-based Technique for Detection and Prevention of Black-Hole Attack in MANETS
    Saurabh, Vidya Kumari
    Sharma, Roopesh
    Itare, Ravikant
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 489 - 494
  • [25] Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack
    Chang, Chunjie
    Zhu, Changhua
    Wang, Honggang
    Pei, Changxing
    INTERNET OF THINGS-BK, 2012, 312 : 126 - 132
  • [26] CELL GEOMETRY FOR CLUSTER-BASED QUASI-CRYSTAL MODELS
    HENLEY, CL
    PHYSICAL REVIEW B, 1991, 43 (01): : 993 - 1020
  • [27] Cluster-based fuzzy models for groundwater flow in the unsaturated zone
    Vernieuwe, H.
    Verhoest, N. E. C.
    De Baets, B.
    Hoeben, R.
    De Troch, F. P.
    ADVANCES IN WATER RESOURCES, 2007, 30 (04) : 701 - 714
  • [28] Cluster-based spectral models for a robust assessment of soil properties
    Ogen, Yaron
    Zaluda, Jacqueline
    Francos, Nicolas
    Goldshleger, Naftaly
    Ben-Dor, Eyal
    GEODERMA, 2019, 340 (175-184) : 175 - 184
  • [29] High-dimensional inference for cluster-based graphical models
    Eisenach, Carson
    Bunea, Florentina
    Ning, Yang
    Dinicu, Claudiu
    1600, Microtome Publishing (21):
  • [30] DIST-LEACH: A DETERMINISTIC KEY MANAGEMENT SCHEME FOR SECURING CLUSTER-BASED SENSOR NETWORKS
    Barad, Jaydeep
    Kadhiwala, Bintu
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,