参考文献
[1] Burke R, O’Mahony M P, Hurley N J. Robust Collaborative Recommendation[M]. New York, USA: Springer, 2011.
[2] Seminario C E, Wilson D C. Robustness and Accuracy Tradeoffs for Recommender Systems Under Attack[C]//Proc. of the 25th International Florida Artificial Intelligence Research Society Conference. Marco Island, USA: AAAI Press, 2012: 86-91.
[3] 李 聪, 骆志刚, 石金龙. 一种探测推荐系统托攻击的无监督算法[J]. 自动化学报, 2011, 37(2): 160-167.
[4] 魏 莎. 协同过滤推荐系统中攻击概貌检测算法研究[D]. 秦皇岛: 燕山大学, 2012.
[5] Lee J S, Zhu Dan. Shilling Attack Detection——A New Approach for a Trustworthy Recommender System[J]. INFORMS Journal on Computing, 2012, 24(1): 117-131.
[6] Chirita P A, Nejdl W, Zamfir C. Preventing Shilling Attacks in Online Recommender Systems[C]//Proc. of ACM Interna- tional Workshop on Web Information and Data Management. New York, USA: ACM Press, 2005: 67-74.
[7] Burke R, Mobasher B, Williams C, et al. Classification Features for Attack Detection in Collaborative Recommendation Systems[C]//Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Philadelphia, USA: ACM Press, 2006: 542-547.
[8] 伍之昂, 庄 毅, 王有权, 等. 基于特征选择的推荐系统托攻击检测算法[J]. 电子学报, 2012, 40(8): 1687-1693.
[9] Hurley N, Cheng Z, Zhang M. Statistical Attack Detection[C]// Proc. of ACM Conference on Recommender Systems. New York, USA: ACM Press, 2009: 149-156.
[10] Mehta B, Nejdl W. Unsupervised Strategies for Shilling Detection and Robust Collaborative Filtering[J]. User Modeling and User-adapted Interaction, 2009, 19(1/2): 65-97.
[11] Mehta B, Hofmann T, Fankauser P. Lies and Propaganda: Detection Spam Users in Collaborative Filtering[C]//Proc. of the 12th International Conference on Intelligent User Interfaces. New York, USA: ACM Press, 2007: 14-21.
[12] Bryan K, O’Mahony M P, Cunningham P. Unsupervised Retrieval of Attack Profiles in Collaborative Recommender Systems[C]//Proc. of 2008 ACM Conference on Recommender Systems. New York, USA: ACM Press, 2008: 155-162.
[13] 单明辉, 贡佳炜, 牛尔力, 等. RulerRep: 一种基于偏离度的过滤不实评价新方法[J]. 计算机学报, 2010, 33(7): 1226- 1235.
[14] Wu Zhiang, Wu Junjie, Cao Jie, et al. HySAD: A Semi- supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation[C]//Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. [S. l.]: ACM Press, 2012: 985-993.
[15] Peng Hanchuan, Long Fuhui, Ding C. Feature Selection Based on Mutual Information: Criteria of Max-dependency, Max- relevance, and Min-redundancy[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(8): 1226- 1238.
[16] 徐峻岭, 周毓明, 陈 林, 等. 基于互信息的无监督特征选择[J]. 计算机研究与发展, 2012, 49(2): 372-382.
[17] Lewis D D. A Sequential Algorithm for Training Text Class- ifiers[C]//Proc. of the 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, USA: ACM Press, 1994: 3-12.
编辑 金胡考 |