과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- J. Douceur, "The sybil attack," Proc. of 1st International Workshop on Peer-to-Peer Systems, pp. 251-260, 2002.
- H. Yu, C. Shi, M. Kaminsky, P. Gibbsons and F. Xiao, "Dsybil: Optimal Sybil-Resistance for Recommendation Systems," Proc. of the 2009 30th IEEE Symposium on Security and Privacy, pp. 283-298, 2009.
- N. Hurley, "Robustness of Recommender Systems," Proc. of the fifth ACM conference on Recommender systems, pp. 9-10, 2011.
- Z. Cheng and N. Hurley, "Robust Collaborative Recommendation by Least Trimmed Squares Matrix Factorization," Proc. of the 2010 22nd IEEE International Conference on Tools with Artificial Intelligence, Vol. 02, pp. 105-112, 2010.
- Y. Koren, R. bell, and C. Volinsky, "Matrix factorization techniques for recommender systems," Vol. 42, No. 8, pp. 30-37, Aug. 2009. https://doi.org/10.1109/MC.2009.263
- M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre, "Promoting recommendations: An attack on collaborative filtering," Proc. of the 13th International Conference on Database and Expert Systems Applications, pp. 494-503, 2002.
- R. Burke, B. Mobasher, and R. Bhaumik, "Limited knowledge shilling attacks in collaborative filtering systems," Proc. of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization, 2005.
- B. Mobasher, R. Burke, and J. Sandvig, "Modelbased collaborative filtering as a defense against profile injection attacks," Proc. of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of rtificial Intelligence Conference, Vol. 2, pp. 1388-1393, 2006.
- B. Mehta, "Unsupervised shilling detection for collaborative filtering," Proc. of the 22nd national conference on Artificial intelligence, pp. 1402-1407, 2007.
- Wei Zhou, Junhao Wen, Yun Sing Koh, Shafiq Alam and Gillian Dobbie, "Attack detection in recommender systems based on target item analysis," Proc. of the Neural Networks (IJCNN) and International Joint Conference, pp. 332-339, 2014.
- Zhuo Zhang, Sanjeev R. Kulkarni, "Detection of Shilling Attacks in Recommender Systems via Spectral Clustering," Proc. Information Fusion (FUSION) and 17th International Conference, pp. 1-8, 2014.
- P.-A. Chirita, W. Nejdl, and C. Zamfir, "Preventing shilling attacks in online recommender systems," Proc. 7th Annual ACM International Workshop on Web Information and Data Management, pp. 67-74, 2005.
- LAM, S. AND RIEDL, J., "Shilling recommender systems for fun and profit," Proc. of the 13th International WWW Conference, pp. 393-402, 2004.
- [Online]. Available: http://news.naver.com/main/read.nhn?mode=LSD&mid=sec&sid1=106&oid=038&aid=0002369632
피인용 문헌
- Bipartite Preference aware Robust Recommendation System vol.26, pp.4, 2016, https://doi.org/10.13089/JKIISC.2016.26.4.953
- Relationship Analysis between Malware and Sybil for Android Apps Recommender System vol.26, pp.5, 2016, https://doi.org/10.13089/JKIISC.2016.26.5.1235